Showing 4,361 - 4,380 results of 7,592 for search 'common (programme OR programs)', query time: 0.12s Refine Results
  1. 4361

    CAREGIVER TRAINING ON CARE FOR PEOPLE WITH DEMENTIA IN MEDAN, NORTH SUMATERA by Siska Evi Martina

    Published 2020-06-01
    “…Background: Dementia is a syndrome due to brain disease, usually chronic or progressive and there is a dysfunction of noble function. The most common type of dementia is alzheimer's dementia. Purpose: Improving the capability of caregiver for taking care people living with dementia. …”
    Get full text
    Article
  2. 4362

    Wkład Tomasza Cranmera w rozwój angielskiej reformacji by Wojciech Medwid

    Published 2013-11-01
    “…The largest participation of the Cranmer’s work in the English Reformation was the influence of the creation, edition and shape the Book of Common Prayer. As a part of his reform program he worked on the revision of canon law, a correction formula of the prayer book and formation of doctrine, which were ingrained in the Bible and the patristic thought. …”
    Get full text
    Article
  3. 4363

    When HSFs bring the heat—mapping the transcriptional circuitries of HSF-type regulators in Candida albicans by Sadri Znaidi

    Published 2025-01-01
    “…I highlight how they can regulate, in common, a crucial developmental program: filamentous growth.…”
    Get full text
    Article
  4. 4364

    Occurrence of fatalities in mountaineering: The case of Mt. Kenya by Nkatha Muthomi, Lucy-Joy Wachira, Shikuku Willy Ooko

    Published 2023-12-01
    “…It is important to study previous cases and learn from circumstances surrounding fatal incidences in programmes sharing some common elements. This paper is set to investigate the occurrences of fatal incidences in mountaineering, the case of Mt. …”
    Get full text
    Article
  5. 4365

    Aware but confused: conflicted between individual and collective responsibility. A grounded theory study of norms and organisational structures relating to sexual harassment among... by Jack Palmieri, Maria Emmelin, Pia Svensson, Anette Agardh

    Published 2025-12-01
    “…Questions remain about how sexual harassment is conceptualized and what implications these conceptualizations have for designing programmes to prevent and respond to sexual harassment in university settings. …”
    Get full text
    Article
  6. 4366

    The Role of Genetic Mutations in the Prevention of Malignant Tumours in a Healthy Population (A Review) by O. N. Lipatov, K. T. Akhmetgareeva

    Published 2020-12-01
    “…Population screening and genetic counselling programmes allow identification of not only precancerous conditions,  but also a genetic susceptibility to tumour diseases. …”
    Get full text
    Article
  7. 4367
  8. 4368
  9. 4369
  10. 4370
  11. 4371
  12. 4372

    Exploring Cardiac Rehabilitation Barriers Across Health Literacy Levels by Ana Paula Delgado Bomtempo, Gabriela Lima de Melo Ghisi

    Published 2025-04-01
    “…A cross-sectional study was conducted among individuals referred to a CR program. Participants completed online surveys assessing CR barriers using the Cardiac Rehabilitation Barriers Scale and health literacy using the Brief Health Literacy Screening Tool. …”
    Get full text
    Article
  13. 4373

    Webshell malicious traffic detection method based on multi-feature fusion by Yuan LI, Yunpeng WANG, Tao LI, Baoqiang MA

    Published 2021-12-01
    “…Webshell is the most common malicious backdoor program for persistent control of Web application systems, which poses a huge threat to the safe operation of Web servers.For most Webshell detection method based on the request packet data for training, the method for web-based Webshell recognition effect is poorer, and the model of training efficiency is low.In response to the above problems, a Webshell malicious traffic detection method based on multi-feature fusion was proposed.The method was characterized by the three dimensions of Webshell packet meta information, packet payload content and traffic access behavior.Combining domain knowledge, feature extraction of request and response packets in the data stream.Transformed into feature extraction information for information fusion, forming a discriminant model that could detect different types of attacks.Compared with the previous research method, the accuracy rate of the method here in the two classification of normal and malicious traffic has been improved to 99.25%.The training efficiency and detection efficiency have also been significantly improved, and the training time and detection time have been reduced by 95.73% and 86.14%.…”
    Get full text
    Article
  14. 4374

    Copula and Focus Marker in Central Yorùbá Dialects by Emmanuel Ọmọniyì Ọláńrewájú

    Published 2024-04-01
    “…CY dialects exhibit some common features with respect to how both focus markers and copula are operated.…”
    Get full text
    Article
  15. 4375

    An advanced Successive Derivative Shortest Path algorithm for concave cost network flow problems by Lu Yang, Zhouwang Yang

    Published 2025-06-01
    “…Existing nonlinear programming methods addressing the CCNFP often suffer from low efficiency and high computational cost, limiting their practical application. …”
    Get full text
    Article
  16. 4376

    Language Errors in the Thesis Title of Arabic Education Students by Mukroji Mukroji, Shobrun Jamil, Ahmad Taufiq

    Published 2022-06-01
    “…The purpose of this paper was to find language errors in the students' thesis of Arabic Language Education Study Program which was prepared by using Arabic in UIN Prof. …”
    Get full text
    Article
  17. 4377
  18. 4378

    Delay-constrained data aggregation scheduling in wireless sensor networks by Cheng Feng, Zhijun Li, Shouxu Jiang, Weipeng Jing

    Published 2017-06-01
    “…However, in fact it is more common that the topology of wireless sensor network is graph topology. …”
    Get full text
    Article
  19. 4379

    Interconnection between IP Networks and Wireless Sensor Networks by Brandon Keith Maharrey, Alvin S. Lim, Song Gao

    Published 2012-12-01
    “…It would be useful if an IP-based host could collect information from multiple remote data-centric networks via transparent communication among sensor nodes and IP-based hosts, using a common application programming interface (API). Two APIs are presented for efficiently producing data in WSN and retrieving the data from an IP network. …”
    Get full text
    Article
  20. 4380

    STATIC CHARACTERISTICS ANALYSIS OF INDIRECT CONTROL FLOW VALVE by V. I. Antonenko

    Published 2014-12-01
    “…A model of the indirect control flow divider for the steady state operation which maintains a twin-engined hydromechanical system in the synchronous common mode is considered. The divider is presented as an astatic regulator consisting of the sensor, amplifier, and regulating elements. …”
    Get full text
    Article