Suggested Topics within your search.
Suggested Topics within your search.
- Torts 2
- Archaeological expeditions 1
- Archeology 1
- Brothers and sisters 1
- Cave ecology 1
- Collection and preservation 1
- Crimes against 1
- Dinosaurs 1
- Elias (Fictitious character) 1
- FICTION 1
- FICTION / Psychological 1
- FICTION / Thrillers 1
- Fantasy 1
- Fathers and daughters 1
- Fossils 1
- Fugitives from justice 1
- Historical 1
- History 1
- Laia (Fictitious character) 1
- Paleontologists 1
- Police 1
- Prisons 1
- Psychologists 1
- Romance fiction 1
- Thrillers 1
-
1401
The Reasons for Self-Medication from the Perspective of Iranian Nursing Students: A Qualitative Study
Published 2022-01-01“…Several factors are involved in self-medication. Given the dangers of self-medication, health policymakers must adopt strict policies for pharmacies that sell drugs without a prescription. …”
Get full text
Article -
1402
Arrhythmia Classification Techniques Using Deep Neural Network
Published 2021-01-01“…Cardiac arrhythmia can be dangerous, or in most cases, it can cause death. The arrhythmia can be of different types, and it can be detected by an ECG test. …”
Get full text
Article -
1403
Models and scenarios of implementation of threats for internet resources
Published 2020-12-01“…This review discusses two of the most dangerous vulnerabilities in the field of Web technologies: SQL injections and XSS attacks (cross-site scripting – XSS), as well as specific cases and examples of their application, as well as various approaches to identifying vulnerabilities in applications and threat prevention. …”
Get full text
Article -
1404
Initial Hypotheses for Modeling and Numerical Analysis of Rockfill and Earth Dams and Their Effects on the Results of the Analysis
Published 2018-01-01“…Since the behavior of earth dams is unreliable in different stages of construction, impounding, and exploitation, this matter is an unavoidable and essential issue with regard to the serious dangers caused by the failure of these important structures. …”
Get full text
Article -
1405
Analysis of Acoustic Signals of Footsteps from the Piezoelectric Sensor
Published 2023-12-01“…This preliminary study proposed a method as a sensor based piezoelectric security system to detect the acoustic signals that can indicate possible dangers to the safety of people or property. The source of the acoustic signal can be determined by matching it with the existing database using machine learning algorithms like face recognition systems for future goals.…”
Get full text
Article -
1406
History of the Second World War: Countering Attempts to Falsify and Distort to the Detriment of International Security
Published 2015-08-01“…Given these circumstances, the Military Doctrine of the Russian Federation noted that the trend of displacement of military dangers and military threats in the information space and the inner sphere of the Russian Federation. …”
Get full text
Article -
1407
Primary Screwworm Cochliomyia hominivorax (Coquerel) (Insecta: Diptera: Calliphoridae)
Published 2016-09-01“…This 5-page fact sheet provides more information about this dangerous pest and how to spot it, as well as what to do and whom to contact if you suspect an infestation in your livestock, pets, or in a wild animal. …”
Get full text
Article -
1408
مواقع التواصل الاجتماعیة الأکادیمیة
Published 2019-04-01“…The research deals with the definition of social networking sites foracademic purposes, the date of their launch, the intellectual production ofacademic communication sites, the need to use them, the dangers of using them,and the exclusion of the most popular social networking sites.(1) Research Gate, founded in 2008 in Berlin by Ijad Madisch, HorstFickenscher, and Sören Hofmayer, (2) the site of Academia.edu, which wasfounded in 2008 in San Francisco by Richard Price, (3) Mendeley, founded in2007 by three German doctoral students; and (4) the Zotero site, launched in2006.The study pointed out that it is advantageous to use social networkingsites for academics Such as: sharing and discovering sources, supportingcooperation, developing identity and self, and communication.The risk of using it to researchers: wasting time, lack of enough activeusers, inefficient use, and lack of digital identity management.The risk of using it on institutions: the spread of knowledge that can beused badly by competitors, and lack of control over the reputation of institutions.Finally, the study pointed to the existence of two views on the relationshipbetween the use of social networking sites and academic achievement: The firstpoint of view: confirms that the relationship is negative between social networkingsites and academic achievement, and the second view assumes a positiverelationship between them.…”
Get full text
Article -
1409
Study of Dyes and Methods of Their Removal, with a Focus on Studying Their Removal using Photocatalysts Based on Polyoxometalates: Review
Published 2024-12-01“…They are also solid materials that are easy to separate, quickly dissolve in water, non-toxic, and do not release dangerous gases, which led to the need to use them in removing dyes, as they gave high efficiency. …”
Get full text
Article -
1410
Appartenenze ed esclusioni
Published 2021-11-01“… From the second half of the 16th century onwards, Venice ordered the cities of its mainland dominions (Terraferma) to adopt substantial legislation and to create special magistrates aimed at countering the dangers posed by »disruptors of the quiet and peaceful life«: foreigners, beggars, pauperes, vagrants and bandits. …”
Get full text
Article -
1411
Acoustic calculation of process pipelines of a compressor station for assessing low-frequency pressure pulsations in dead-end branches
Published 2025-01-01“…Such measures allow increasing the service life of objects, but due to high static stresses and the occurrence of intense dynamic loads characteristic of process pipelines, this is not a sufficient condition for identifying potentially dangerous areas. In this regard, recently, engineering tools for calculating dynamic processes have been increasingly used to help solve such complex problems in order to study these processes in real systems and operating modes. …”
Get full text
Article -
1412
PREDICTION OF MULTIAXIAL LOAD FATIGUE LIFE FOR RUBBER BUSHING
Published 2020-01-01“…It is found that the five damage parameters can be calculated only by outputting the deformation gradient tensor of the dangerous area in the finite element analysis. Based on the fatigue crack initiation theory and the fatigue test data of dumbbell rubber test piece,the life prediction models are established by the above five damage parameters,and the accuracy of the five life prediction models is measured by the goodness of fit value. …”
Get full text
Article -
1413
Passive Radar-Based Parameter Estimation of Low Earth Orbit Debris Targets
Published 2025-01-01“…Major space agencies such as NASA and the ESA have long reported the growing dangers caused by resident space objects orbiting our planet. …”
Get full text
Article -
1414
Higher Education in the Age of Artificial Intelligence
Published 2024-05-01“…This definition identifies five critical characteristics of higher education: 1) the professor and the student continue to be in a subject-subject relationship and learn from each other; 2) higher education should prepare for life in conditions of “human-machine” interdependence; 3) these conditions imply choice in situations of uncertainty; 4) the spread of AI technologies brings enormous opportunities and 5) almost unpredictable dangers, risks and threats to humans. The authors consider general principles and specific problems associated with entering AI tools into society and higher education. …”
Get full text
Article -
1415
Effect of Latitude of Sunspots on Earth-Intersecting Trajectory of Plasma
Published 2020-10-01“…From analysis, 27% of dangerous events on the Sun should have trajectories towards Earth. …”
Get full text
Article -
1416
Numerical Modeling of Local Scour Depth at Non-Uniform Piers
Published 2024-12-01“…One of the most dangerous issues in river engineering is erosion brought on by the flow around bridge piers, which causes failure. …”
Get full text
Article -
1417
Images of War in Late Victorian War and Adventure Novels for Children
Published 2007-12-01“…Through a number of formulized conventions and strategies, the narratives downplay the dangers of war and stress the inevitability of British victories. …”
Get full text
Article -
1418
Repenser le risque et les catastrophes dans les régions de montagne
Published 2012-03-01“…Developments in transportation, resource extraction and tourism that serve state and international agendas can increase rather than reduce risks for mountain populations, and undermine pre-existing strategies to minimise environmental dangers. Above all, we see rapid urbanisation in mountains generally and the Himalaya in particular as highly implicated in exacerbating risks and creating new types of vulnerabilities. …”
Get full text
Article -
1419
A dexterous and compliant aerial continuum manipulator for cluttered and constrained environments
Published 2025-01-01“…Abstract Aerial manipulators can manipulate objects while flying, allowing them to perform tasks in dangerous or inaccessible areas. Advanced aerial manipulation systems are often based on rigid-link mechanisms, but the balance between dexterity and payload capacity limits their broader application. …”
Get full text
Article -
1420
Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method
Published 2015-01-01“…Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. …”
Get full text
Article