Showing 48,441 - 48,460 results of 81,006 for search 'AT*', query time: 0.35s Refine Results
  1. 48441

    Strategies and Barriers to Technological Innovation in the Hospitality Industry: A Qualitative Exploration by Aslı Ersoy

    Published 2024-09-01
    “…The concept of technological innovation in the hospitality industry has attracted great attention, especially due to the widespread impact of emerging technologies on organizations. …”
    Get full text
    Article
  2. 48442

    Presença ausente e ausência presente do Estado na produção do espaço para o turismo no Vale do Ribeira paulista by Carolina Todesco

    Published 2010-07-01
    “…Ribeira Valley Region, located in the southern State of Sao Paulo, has 20% of the remaining Atlantic Forest of Brazil and has the lowest human development indices of this State which has the highest density of technical-scientific-informational environment and capital. …”
    Get full text
    Article
  3. 48443

    Hazardous geological processes at incomplete construction sites by A. L. Suzdaleva, M. Yu. Slesarev, I. Yu. Yakovleva

    Published 2023-10-01
    “…The subject of the study was the natural and technical system formed in the process of destruction of incomplete construction objects. Special attention was paid to the territories surrounding the long-term abandoned buildings, where no work had been carried out for many years.Results. …”
    Get full text
    Article
  4. 48444

    Unraveling the Relationship between Oral Habits and Anxiety: A Narrative Review by Ramya V. Jathanna, Ritesh Bangera, Mithun K. Naik, Vinod R. Jathanna, Sharanya Adhikari, Shivangi Vats

    Published 2024-12-01
    “…Psychological factors, such as cognitive-behavioral factors, emotional regulation, and attentional biases, further influence the manifestation and maintenance of both oral habits and anxiety. …”
    Get full text
    Article
  5. 48445

    How Did Imam At-Thabari's Interpretation with Tafsir bil Ma'tsur Style Influence Qur'anic Exegesis and Ulama During the Abbasid Dynasty Era? by Diana Durrotul Lumah, N Nasrullah, Bilqist Adna Salsabila, Faruk Almaliki

    Published 2025-02-01
    “…In the Abbasid era, this method developed rapidly along with the increasing attention to the science of interpretation and codification of hadith. …”
    Get full text
    Article
  6. 48446

    An Anonymous Routing Protocol with Authenticated Key Establishment in Wireless Ad Hoc Networks by Wei Yuan

    Published 2014-01-01
    “…ARAKE can prevent packet analysis attack as well as most active attacks that are based on route information. …”
    Get full text
    Article
  7. 48447

    Innovative bean sprouts basket (iBSB): A conceptual paper on a new dimension of low-cost bean sprout cultivation among agro-community by Yusuf Munifah Siti Amira, Takrim Aiman, Lazim Siti Saripa Rabiah Mat

    Published 2025-01-01
    “…Moreover, sprout quality is influenced by the length, thickness, colour, and texture of the hypocotyl and roots, as well as by maintaining characteristics and little water loss after harvest. A modified atmosphere with high carbon dioxide and low oxygen can be used as a sprouting environment to control sprout growth. …”
    Get full text
    Article
  8. 48448
  9. 48449

    Love Addiction - Current Diagnostic and Therapeutic Paradigms in Clinical Psychology. by Marilena Giovanna Maglia, Ines Lanzafame, Maria C Quattropani, Pasquale Caponnetto

    Published 2023-04-01
    “… # Conclusions Group psychotherapy has proved to be a valid alternative, in fact the scientific landscape suggests that most group therapies are successful because these dynamics involve the reward and attachment systems in the brain in most subjects. Although there is currently no official classification for this type of addiction, the continuing interests of clinical psychology open up new scenarios for achieving greater psychophysical well-being.…”
    Get full text
    Article
  10. 48450

    SQLite Encryption Method for Embedded Databases Based on Chaos Algorithm by Junlong Shi

    Published 2023-01-01
    “…It can be seen that the key space is sufficient to prevent various conventional attacks. When the key is the wrong key, decryption will not yield any data. …”
    Get full text
    Article
  11. 48451

    Fazer Extensão no semiárido: o caso do Campus Icó da UFCA by Wagner Pires da Silva, Erlene Pereira Barbosa, Jucieldo Ferreira Alexandre

    Published 2018-12-01
    “…O curso de história ofertado pela UFCA na cidade, uma das mais antigas do Ceará, através do curso de extensão Entre as Páginas da História do Icó, procura, através dos registros históricos da cidade, dialogar com a população, procurando entender o passado do município e assim valorizar e proteger seu patrimônio histórico e cultural, representado pelo sítio urbano tombado pelo IPHAN. …”
    Get full text
    Article
  12. 48452

    Management of an Oral Ingestion of Transdermal Fentanyl Patches: A Case Report and Literature Review by Andrew C. Faust, Ralph Terpolilli, Darrel W. Hughes

    Published 2011-01-01
    “…A 32-year-old man was brought to the emergency department (ED) via emergency medical services for toxic ingestion and suicide attempt. The patient chewed and ingested two illegally purchased transdermal fentanyl patches. …”
    Get full text
    Article
  13. 48453

    Gradient diffusion entropy corrected ALNS optimization for vegetation topology interaction networks by Shengwei Wang, Hongquan Chen, Yulin Guo, Wenjing Su, Yurong Xu, Shuohao Cui, Zhiqiang Zhou

    Published 2025-01-01
    “…The GDEO-ALNS optimized interaction structure slows down the ECV drop rate in topological attacks by 0.03 and 0.02, respectively, compared to the original interaction structure, which provides better immunity to interference compared to the optimized structure of ALNS. …”
    Get full text
    Article
  14. 48454

    Daily Functionality of People with Low Vision: The Impact of Visual Acuity, Depression, and Life Orientation—A Cross-Sectional Study by Mara Gkioka, Stavroula Almpanidou, Niki Lioti, Diamantis Almaliotis, Vasileios Karampatakis

    Published 2024-01-01
    “…The study could serve as a useful guide and may urge clinicians to pay attention to the psychological evaluation of these patients, supporting their unique emotional needs. …”
    Get full text
    Article
  15. 48455

    ŞİDDET MAĞDURU KADINLARIN ERKEKLİK TANIMLAMALARI: BURDUR İLİ ÖZELİNDE BİR ÇALIŞMA - MASCULINITY DEFINITION OF WOMEN VICTIMS OF VIOLENCE: A CASE STUDY IN BURDUR, TURKEY by Gönül Demez, Hale Nur Seval

    Published 2018-03-01
    “…Böylecetoplumsal iktidar örüntüleri, ataerkil sistem, erkeklik ve şiddete ilişkinalgılamaları yine kadınların kendi anlatılarından hareketle gündelik yaşampratikleri, şiddetle baş etme yöntemleri, sosyal yaşamda kullandıkları,strateji ve pazarlıklar toplumsal cinsiyet anlamındaki iktidar ilişkileribağlamında çözümlenmektedir. …”
    Get full text
    Article
  16. 48456

    A Review and Analysis of Language Curriculum Design by Maryam Danaye Tous

    Published 2021-03-01
    “…However, neglecting some of the principles of writing and editing, not paying attention to some grammatical points, using some incorrect equivalents for some technical terms, and being inconsistent in using the equivalents for some terms are among the negative points which could somewhat prevent the readers of the book from getting the essence of some parts of the book that much. …”
    Get full text
    Article
  17. 48457

    Media representations of sexuality in an era of pornification by Nicola Döring, Nicole Krämer, Dan J. Miller, Thorsten Quandt, Gerhard Vowe

    Published 2024-12-01
    “…This Special Issue aims to encourage communication science to devote more attention to sexually explicit communication and to help close existing gaps in research.…”
    Get full text
    Article
  18. 48458

    Secure and verifiable multi-keyword searchable encryption scheme in cloud by Jianhong ZHANG, Menglong WU, Jing WANG, Pei LIU, Zhengtao JIANG, Changgen PENG

    Published 2021-04-01
    “…Due to the advantages of cloud computing, such as virtualization and high scalability, individuals and enterprises are willing to outsource local data storage and computing to cloud servers.However, encryption breaks the linkability between the data.Although searchable encryption (SE) enables cloud servers to provide retrieval services of the encrypted data for data owners, cloud servers who are untrusted, may tamper and delete data, or learn information of the newly added encrypted files with previous trapdoors.Besides, single-keyword search inevitably incurs many unrelated results, resulting in a waste of bandwidth and computing resources.To address the problems above, an efficient and verifiable multi-keyword search encryption scheme was proposed, which could not only supported multiple-keyword search, but also realized the privacy of search pattern and forward security of the outsourced files.In the meanwhile, it also ensured the integrity check of the outsourced data.Through rigorous security verification, the proposed scheme was proved to be secure under the standard mode, and could resist offline keyword guesswork attack (KGA) on untrusted cloud servers.Finally, by comparing the efficiency and performance with the recent three searchable encryption schemes, the experimental results show that the proposed scheme has the best comprehensive performance in terms of function and efficiency among the four schemes.…”
    Get full text
    Article
  19. 48459

    Home management of malaria among caregivers of under-five children in Owo, Ondo State, Nigeria by Liasu Adeagbo Ahmed, Olubankole Akinboboye, Olayinka Stephen Ilesanmi, David Akintayo Oguntuase

    Published 2017-11-01
    “…Our study aimed to assess home management of fever among mothers and other caregivers of underfive children attending Federal Medical Centre in Owo, Ondo State, Nigeria. …”
    Get full text
    Article
  20. 48460

    Creating a place for us: an overview of the FICE young people's conference 2004 by Irene Stevens

    Published 2004-08-01
    “…It is safe to say that this conference was a life-affirming event for all who took part, including the adults. I will attempt to give a flavour of those few precious days and will hopefully emphasise the importance of hearing the voice of the children and young people who should be at the core of our work.…”
    Article