Showing 3,661 - 3,680 results of 81,006 for search 'at*', query time: 0.19s Refine Results
  1. 3661

    Prevalence of Postpartum Depression among Women in Childbearing Age Attending Primary Health Care Centres, Qassim Region. by Huda G. Alonazi, Saulat Jahan

    Published 2022-05-01
    “… # Methods This was a cross sectional study including 204 mothers aged 18-45 years in postpartum period attending primary health care centres in Buraidah during April to August 2021. …”
    Get full text
    Article
  2. 3662

    Global Attractor for the Generalized Dissipative KDV Equation with Nonlinearity by Zai-yun Zhang, Zhen-hai Liu

    Published 2011-01-01
    “…We discuss global attractor for the generalized dissipative KDV equation with nonlinearity under the initial condition u(x,0)=u0(x). …”
    Get full text
    Article
  3. 3663

    Southern Ocean control on atmospheric CO<sub>2</sub> changes across late Pliocene Marine Isotope Stage M2 by S. Hou, L. Toebrock, M. van der Linden, F. Rothstegge, M. Ziegler, L. J. Lourens, P. K. Bijl

    Published 2025-01-01
    “…<p>During the Pliocene, atmospheric <span class="inline-formula">CO<sub>2</sub></span> concentrations (<i>p</i><span class="inline-formula">CO<sub>2</sub></span>) were probably sometimes similar to today's, and global average temperature was <span class="inline-formula">∼3 °C</span> higher than preindustrial. …”
    Get full text
    Article
  4. 3664

    Shannon entropy and energy of H-atom confined in fullerene cage: Effect of External electric field by Brijender Dahiya, Bhavna Vidhani, Norberto Aquino, Vinod Prasad

    Published 2025-06-01
    “…This study examines the energy and entropic properties of a hydrogen atom confined within a fullerene cage, using two potential models: the Square Well (SW) and Gaussian Potential (GP). …”
    Get full text
    Article
  5. 3665
  6. 3666
  7. 3667
  8. 3668
  9. 3669

    Study of Row Hammer attack by Wenwei WANG, Peishun LIU

    Published 2018-01-01
    “…The related technologies and defense methods of the current Row Hammer vulnerabilities were analyzed and summarized,and the security problems and possible precautions were pointed out.At the end,the current research work both at home and abroad is summarized.Two valuable directions for security research in the future are pointed out:Row Hammer exploit techniques and precautions in the ARM architecture,and accurate and controlled attacks on Row Hammer vulnerabilities.…”
    Get full text
    Article
  10. 3670
  11. 3671

    A Survey of Audience Reception of Atọ́ka, A Yorubá Photoplay Magazine by Clement Adéníyi Akangbé

    Published 2021-12-01
    “… Atokạ́ is a Yorubá photodrama magazine produced in Lagos, Southwest Nigeria from 1967-1991. …”
    Get full text
    Article
  12. 3672

    Determining Attitudes of Nursing Students on Premarital Sex by Nursel Alp Dal, Kerime Derya Beydağ

    Published 2022-12-01
    “…An introductory survey form and Premarital Sex Attitude Scale (PMSAS) were used to obtain the data. …”
    Get full text
    Article
  13. 3673

    Novel Machine Learning-Based Brain Attention Detection Systems by Junbo Wang, Song-Kyoo Kim

    Published 2025-01-01
    Subjects: “…brain attention…”
    Get full text
    Article
  14. 3674
  15. 3675

    The Creeping Attachment Induced Technique (CAIT) in Natural and Restored Teeth: Case Reports with 24 Months of Follow-Up by Michele Perelli, Roberto Abundo, Giuseppe Corrente, Paolo Giacomo Arduino

    Published 2019-01-01
    “…After 6 months, the gingival margins appeared thicker and a creeping attachment was achieved in both cases, obtaining gingival symmetry, related to the adjacent or contralateral teeth, and root coverage. …”
    Get full text
    Article
  16. 3676
  17. 3677

    Distributed Energy Management for Port Power System under False Data Injection Attacks by Qihe Shan, Xin Zhang, Qiongyue Zhang, Qiuye Sun

    Published 2022-01-01
    “…This paper investigates a distributed energy management strategy for the port power system under false data injection attacks. The attacker can tamper with the interaction information of energy equipment, penetrate the boundary between port information system and port power system, and cause serious operation failure of port energy equipment. …”
    Get full text
    Article
  18. 3678

    Transient Voltage Information Entropy Difference Unit Protection Based on Fault Condition Attribute Fusion by Zhenwei Guo, Ruiqiang Zhao, Zebo Huang, Yongyan Jiang, Haojie Li, Yingcai Deng

    Published 2025-01-01
    “…Aimed at the susceptibility of transient protection to the influence of fault condition attributes, composite fault characteristics containing fault attribute information were obtained by integrating fault characteristics with fault condition attributes to overcome the adverse influence of fault condition attributes on transient protection and improve the reliability of the protection. …”
    Get full text
    Article
  19. 3679

    Nadir İbrahimi’nin Ateş Bedun-i Dûd Romanında Türkmenlerin Var Olma ve Birlik Mücadelesi by Ayşe Sosar

    Published 2024-11-01
    “… Ateş Bedun-i Dûd (Dumansız Ateş), modern İran edebiyatının önde gelen isimlerinden romancı, öykü yazarı, senarist ve yönetmen Nadir İbrahimi’nin İran Türkmenleriyle ilgili kaleme aldığı yedi ciltlik eseridir. …”
    Get full text
    Article
  20. 3680