Suggested Topics within your search.
Suggested Topics within your search.
- History 7
- Atlases 6
- Human anatomy 6
- Social conditions 5
- methods 5
- Anesthesia 4
- Histology 4
- Women 4
- Atmospheric physics 3
- Attitude to Health 3
- Chemistry, Physical and theoretical 3
- Climatology 3
- Diseases 3
- Leadership 3
- Medicine 3
- Meteorology 3
- Politics and government 3
- atlases 3
- Behavioral Medicine 2
- Children 2
- Christianity 2
- Civilization 2
- Colonial influence 2
- Contracts 2
- Customer relations 2
- Customer services 2
- Cytodiagnosis 2
- Health 2
- Health and hygiene 2
- Manners and customs 2
-
48441
Strategies and Barriers to Technological Innovation in the Hospitality Industry: A Qualitative Exploration
Published 2024-09-01“…The concept of technological innovation in the hospitality industry has attracted great attention, especially due to the widespread impact of emerging technologies on organizations. …”
Get full text
Article -
48442
Presença ausente e ausência presente do Estado na produção do espaço para o turismo no Vale do Ribeira paulista
Published 2010-07-01“…Ribeira Valley Region, located in the southern State of Sao Paulo, has 20% of the remaining Atlantic Forest of Brazil and has the lowest human development indices of this State which has the highest density of technical-scientific-informational environment and capital. …”
Get full text
Article -
48443
Hazardous geological processes at incomplete construction sites
Published 2023-10-01“…The subject of the study was the natural and technical system formed in the process of destruction of incomplete construction objects. Special attention was paid to the territories surrounding the long-term abandoned buildings, where no work had been carried out for many years.Results. …”
Get full text
Article -
48444
Unraveling the Relationship between Oral Habits and Anxiety: A Narrative Review
Published 2024-12-01“…Psychological factors, such as cognitive-behavioral factors, emotional regulation, and attentional biases, further influence the manifestation and maintenance of both oral habits and anxiety. …”
Get full text
Article -
48445
How Did Imam At-Thabari's Interpretation with Tafsir bil Ma'tsur Style Influence Qur'anic Exegesis and Ulama During the Abbasid Dynasty Era?
Published 2025-02-01“…In the Abbasid era, this method developed rapidly along with the increasing attention to the science of interpretation and codification of hadith. …”
Get full text
Article -
48446
An Anonymous Routing Protocol with Authenticated Key Establishment in Wireless Ad Hoc Networks
Published 2014-01-01“…ARAKE can prevent packet analysis attack as well as most active attacks that are based on route information. …”
Get full text
Article -
48447
Innovative bean sprouts basket (iBSB): A conceptual paper on a new dimension of low-cost bean sprout cultivation among agro-community
Published 2025-01-01“…Moreover, sprout quality is influenced by the length, thickness, colour, and texture of the hypocotyl and roots, as well as by maintaining characteristics and little water loss after harvest. A modified atmosphere with high carbon dioxide and low oxygen can be used as a sprouting environment to control sprout growth. …”
Get full text
Article -
48448
-
48449
Love Addiction - Current Diagnostic and Therapeutic Paradigms in Clinical Psychology.
Published 2023-04-01“… # Conclusions Group psychotherapy has proved to be a valid alternative, in fact the scientific landscape suggests that most group therapies are successful because these dynamics involve the reward and attachment systems in the brain in most subjects. Although there is currently no official classification for this type of addiction, the continuing interests of clinical psychology open up new scenarios for achieving greater psychophysical well-being.…”
Get full text
Article -
48450
SQLite Encryption Method for Embedded Databases Based on Chaos Algorithm
Published 2023-01-01“…It can be seen that the key space is sufficient to prevent various conventional attacks. When the key is the wrong key, decryption will not yield any data. …”
Get full text
Article -
48451
Fazer Extensão no semiárido: o caso do Campus Icó da UFCA
Published 2018-12-01“…O curso de história ofertado pela UFCA na cidade, uma das mais antigas do Ceará, através do curso de extensão Entre as Páginas da História do Icó, procura, através dos registros históricos da cidade, dialogar com a população, procurando entender o passado do município e assim valorizar e proteger seu patrimônio histórico e cultural, representado pelo sítio urbano tombado pelo IPHAN. …”
Get full text
Article -
48452
Management of an Oral Ingestion of Transdermal Fentanyl Patches: A Case Report and Literature Review
Published 2011-01-01“…A 32-year-old man was brought to the emergency department (ED) via emergency medical services for toxic ingestion and suicide attempt. The patient chewed and ingested two illegally purchased transdermal fentanyl patches. …”
Get full text
Article -
48453
Gradient diffusion entropy corrected ALNS optimization for vegetation topology interaction networks
Published 2025-01-01“…The GDEO-ALNS optimized interaction structure slows down the ECV drop rate in topological attacks by 0.03 and 0.02, respectively, compared to the original interaction structure, which provides better immunity to interference compared to the optimized structure of ALNS. …”
Get full text
Article -
48454
Daily Functionality of People with Low Vision: The Impact of Visual Acuity, Depression, and Life Orientation—A Cross-Sectional Study
Published 2024-01-01“…The study could serve as a useful guide and may urge clinicians to pay attention to the psychological evaluation of these patients, supporting their unique emotional needs. …”
Get full text
Article -
48455
ŞİDDET MAĞDURU KADINLARIN ERKEKLİK TANIMLAMALARI: BURDUR İLİ ÖZELİNDE BİR ÇALIŞMA - MASCULINITY DEFINITION OF WOMEN VICTIMS OF VIOLENCE: A CASE STUDY IN BURDUR, TURKEY
Published 2018-03-01“…Böylecetoplumsal iktidar örüntüleri, ataerkil sistem, erkeklik ve şiddete ilişkinalgılamaları yine kadınların kendi anlatılarından hareketle gündelik yaşampratikleri, şiddetle baş etme yöntemleri, sosyal yaşamda kullandıkları,strateji ve pazarlıklar toplumsal cinsiyet anlamındaki iktidar ilişkileribağlamında çözümlenmektedir. …”
Get full text
Article -
48456
A Review and Analysis of Language Curriculum Design
Published 2021-03-01“…However, neglecting some of the principles of writing and editing, not paying attention to some grammatical points, using some incorrect equivalents for some technical terms, and being inconsistent in using the equivalents for some terms are among the negative points which could somewhat prevent the readers of the book from getting the essence of some parts of the book that much. …”
Get full text
Article -
48457
Media representations of sexuality in an era of pornification
Published 2024-12-01“…This Special Issue aims to encourage communication science to devote more attention to sexually explicit communication and to help close existing gaps in research.…”
Get full text
Article -
48458
Secure and verifiable multi-keyword searchable encryption scheme in cloud
Published 2021-04-01“…Due to the advantages of cloud computing, such as virtualization and high scalability, individuals and enterprises are willing to outsource local data storage and computing to cloud servers.However, encryption breaks the linkability between the data.Although searchable encryption (SE) enables cloud servers to provide retrieval services of the encrypted data for data owners, cloud servers who are untrusted, may tamper and delete data, or learn information of the newly added encrypted files with previous trapdoors.Besides, single-keyword search inevitably incurs many unrelated results, resulting in a waste of bandwidth and computing resources.To address the problems above, an efficient and verifiable multi-keyword search encryption scheme was proposed, which could not only supported multiple-keyword search, but also realized the privacy of search pattern and forward security of the outsourced files.In the meanwhile, it also ensured the integrity check of the outsourced data.Through rigorous security verification, the proposed scheme was proved to be secure under the standard mode, and could resist offline keyword guesswork attack (KGA) on untrusted cloud servers.Finally, by comparing the efficiency and performance with the recent three searchable encryption schemes, the experimental results show that the proposed scheme has the best comprehensive performance in terms of function and efficiency among the four schemes.…”
Get full text
Article -
48459
Home management of malaria among caregivers of under-five children in Owo, Ondo State, Nigeria
Published 2017-11-01“…Our study aimed to assess home management of fever among mothers and other caregivers of underfive children attending Federal Medical Centre in Owo, Ondo State, Nigeria. …”
Get full text
Article -
48460
Creating a place for us: an overview of the FICE young people's conference 2004
Published 2004-08-01“…It is safe to say that this conference was a life-affirming event for all who took part, including the adults. I will attempt to give a flavour of those few precious days and will hopefully emphasise the importance of hearing the voice of the children and young people who should be at the core of our work.…”
Article