Suggested Topics within your search.
Suggested Topics within your search.
- Criminal law 8
- Anesthesia 3
- Deception 3
- History 3
- Actions and defenses 2
- Administrative law 2
- English language 2
- Law 2
- Philosophy 2
- Truthfulness and falsehood 2
- foundations 2
- medicine 2
- methods 2
- roof 2
- water supply 2
- Anesthesiology 1
- Automobiles 1
- Biochemical Phenomena 1
- Biochemistry 1
- Breach of contract 1
- Breast 1
- Cancer 1
- Cardiac Surgical Procedures 1
- Child 1
- Civil law 1
- Civil procedure 1
- Clinical biochemistry 1
- Commercial art 1
- Communication in rehabilitation 1
- Constitutional law 1
-
16421
Scientific Publication Ethics
Published 2015-06-01“…Their most important difference from the other kinds is showing conscious deceptive intention. Duplication, salamislicing, publications aiming partiality, partiality in choice of sources, authorship rights violations (Author concealment, Gift Autorship, Honory Autorship or Ghost Autorship,author addition changing the order of author list), and not thanking to the contributers are other irregular applications. …”
Get full text
Article -
16422
Emotion-Induced Memory Distortions: Insights from Deese-Roediger-McDermott and Misinformation Paradigms—A Comprehensive Review
Published 2025-03-01“…The presence of intense emotional experiences within these environments, combined with the presence of multiple sources of deceptive information, increases the likelihood of the formation of false memories induced by suggestion. …”
Get full text
Article -
16423
-
16424
Influence of indole acetic acid, arginine and mango fruit waste biochar on nutrients, chlorophyll contents and antioxidants of Fenugreek in salt affected soil
Published 2025-01-01“…L-arginine, an amino acid, is crucial for plant defense mechanisms, forming proline, polyamines, and nitric oxide, which regulate biological activities and prevent oxidative damage. …”
Get full text
Article -
16425
In the scientific research of prof. dr. bekir chobanzadeh opinions on m. fuzūlīʼs language
Published 2024-12-01“…Chobanzadehʼs ideas were compared with the views of contemporary Turkologists, the discussions around the problem in question were mentioned in detail, and these were essentially determined that the idea that Azerbaijani language is at the center of gravity of the language of Fuzuliʼs works is more defended in researches. …”
Get full text
Article -
16426
Notice of suspicion: procedural significance and influence on the methodology of pre-trial investigation
Published 2024-12-01“…he purpose of the article is to determine the essence of the notification of suspicion as an intermediate procedural decision; the possibility of its appeal by the defense; the impact of the notification of suspicion on the methodology of the pre-trial investigation. …”
Get full text
Article -
16427
Can Jurors Disregard Inadmissible Evidence? Using the Multiphase Optimization Strategy to Test Interventions Derived from Cognitive and Social Psychological Theories
Published 2024-12-01“…Appeals courts repeatedly affirm instructions to disregard as a sufficient safeguard of defendants’ constitutional rights, despite research finding that jurors do not disregard when instructed. …”
Get full text
Article -
16428
The Role of Quercetin, a Flavonoid in the Management of Pathogenesis Through Regulation of Oxidative Stress, Inflammation, and Biological Activities
Published 2025-01-01“…Its role in the prevention of various pathogenesis has been well-documented, primarily through its ability to inhibit oxidative stress, inflammation, and enhance the endogenous antioxidant defense mechanisms. Electronic databases such as Google Scholar, Scopus, PubMed, Medline, and Web of Science were searched for information regarding quercetin and its role in various pathogeneses. …”
Get full text
Article -
16429
-
16430
Ictiose como uma manifestação de sarcoidose: um relato de caso
Published 2024-12-01“…As etiologias são as mais variadas, incluindo desde defeitos genéticos hereditários até formas secundárias a doenças sistêmicas. …”
Get full text
Article -
16431
Genome-wide association study for charcoal rot resistance in soybean harvested in Kazakhstan
Published 2023-11-01“…Candidate genes within the identified genomic regions were explored for their functional annotations and potential roles in plant defense responses. The findings from this study may further contribute to the development of molecular breeding strategies for enhancing CR resistance in soybean cultivars. …”
Get full text
Article -
16432
Personal Peacefulness and Cyber-Bystanding of Internet Users in Indonesia
Published 2024-06-01“…Findings – Results revealed a significant relationship between personal peacefulness and defender bystander behavior. However, no significant relationships were found with passive or reinforcer bystander behaviors. …”
Get full text
Article -
16433
Genotype-dependent resilience mediated by melatonin in sweet corn
Published 2025-01-01“…Under severe water deprivation (12% PEG), melatonin increased root length by 75%, peroxidase activity by 31% while reducing malondialdehyde content by 34% in genotype Dessert indicating enhanced antioxidant defense and reduced oxidative damage. Likewise in genotype Royalty, stomatal conductance increased by 68%, with increasing specific area by 125% on melatonin treatment under severe water deprivation. …”
Get full text
Article -
16434
A Novel AI-Based Integrated Cybersecurity Risk Assessment Framework and Resilience of National Critical Infrastructure
Published 2025-01-01“…These results illustrate the effectiveness of ML and DL in identifying cybersecurity threats, highlighting their potential to enhance defenses against emerging cyber risks.…”
Get full text
Article -
16435
Expression of catecholaminergic genes in the midbrain and prepulse inhibition in rats with a genetic catatonia
Published 2017-12-01“…The GC rat strain (from the words “genetic” and “catatonia”) was created by selection for predisposition to passive-defensive reaction of catatonic freezing in response to stressing stimuli. …”
Get full text
Article -
16436
Hanibal, un dușman „exemplar” (glose pe marginea Istoriilor lui Titus Livius
Published 2007-12-01“…Carthaginois exemplaire, qui pousse à l’excès les qualités (force, courage, habileté) et les défauts (cruauté, perfidie, impiété) de son ethnie, Hannibal n’est pas envisagé dans une lumière exclussivement défavorable. …”
Get full text
Article -
16437
El artesano y el artista : aspectos de la iconografía de San José
Published 2010-06-01“…La figuration du patron des peintres, le pinceau à la main, vient appuyer la revendication corporatiste de la défense de l’artiste et l’affirmation du caractère intellectuel de la peinture.Ces complexes variations sur le travail des deux saints font se croiser bon nombre d’images significatives (œuvres du Greco, Ribalta, Carducho, Murillo, Valdès Leal...) et de textes célébratifs (traités religieux, sermons, comedias ou poésies). …”
Get full text
Article -
16438
El género y el futuro de la macroeconomía: una perspectiva evolutiva
Published 2021-01-01“…Permite, además, sentar las bases para defender la igualdad de género, tanto en derechos como en resultados. …”
Get full text
Article -
16439
Effects of different Lys/Met ratios on the antioxidant capacity, tissue morphology, and fatty acid composition of subcutaneous fat in Tibetan sheep on low-protein diets: a lipidomi...
Published 2025-01-01“…Furthermore, the findings showed that the upregulation of PPARγ, FASN, FAD4, CPT1A, and GPX4 can enhance adipocyte differentiation and lipid accumulation, thereby improving metabolic function in subcutaneous adipose tissue via the regulation of lipid metabolism and oxidative defense mechanisms.DiscussionIn summary, this study provides a theoretical foundation for optimizing precision feeding strategies for Tibetan sheep, offering crucial data to support enhancements in production efficiency and meat quality.…”
Get full text
Article -
16440
Research on network risk assessment based on attack graph of expected benefits-rate
Published 2022-08-01“…As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.…”
Get full text
Article