Suggested Topics within your search.
Suggested Topics within your search.
- Criminal law 7
- Business 4
- Computer programs 4
- History 4
- History and criticism 4
- Finance 3
- Financial statements 3
- Hospitality industry 3
- Mass media 3
- Methodology 3
- Moral and ethical aspects 3
- Pediatrics 3
- Philosophy 3
- Psychological aspects 3
- Public administration 3
- Standards 3
- Biochemistry 2
- Communicable diseases 2
- Congresses 2
- Cultural property 2
- French language 2
- Historic preservation 2
- Information technology 2
- Internet in public administration 2
- Law 2
- Management 2
- Medicine 2
- Mental retardation 2
- Office practice 2
- Officials and employees 2
-
42961
Deceptive Self-Presentation: The Role of Social Media User Motivation and the Dark Triad Personality
Published 2023-12-01“…Online identity frauds such as love scams, catfishing, and fake content are associated with the freedom of personalization offered by social media platforms which can lead to deceptive self-presentation behavior and impressions. …”
Get full text
Article -
42962
Priority areas of police bodies’ activity in ensuring the citizens’ rights in the conditions of martial law legal regime in Ukraine
Published 2022-09-01“…Factors, due to which the police authorities significantly reduced the number of administrative and criminal offenses, the commission of which prevailed in peacetime have been established. …”
Get full text
Article -
42963
Analysis of Water Quality Variation Trend in Seagoing Waterways in the Pearl River Delta
Published 2009-01-01Get full text
Article -
42964
Intersexual relationships in mandrills: dominance, sexual conflict and the influence of social integration
Published 2024-07-01“…In species that live in polygynandrous groups, male-biased sexual size dimorphism often allows males to socially dominate and sexually coerce females. …”
Get full text
Article -
42965
Delay differential equations via the matrix lambert w function and bifurcation analysis: application to machine tool chatter
Published 2007-01-01“…The bifurcation method combined with Sturmsequences provides an algorithm for determining the stability ofDDEs without restrictive geometric analysis. With this approach, onecan obtain the critical values of delay, which determine thestability of a system and hence the preferred operating spindlespeed without chatter. …”
Get full text
Article -
42966
-
42967
Hierarchische und dynamische Einheit. Kontext-Eigenschaften und ›metrische Pfade‹ als Kategorien der Syntaxanalyse bei Mozart
Published 2015-01-01“…Jahrhunderts jedoch gibt es Formabschnitte, die zwar als einheitlich erfahren werden, deren Einheit aber offensichtlich nicht auf den Bezug zu einer einzigen umfassenden Struktur, sondern auf einen dynamischen ›Zug‹ gründet, der durch alle Ereignisse hindurch zu gehen scheint. …”
Get full text
Article -
42968
Rediscovery of the waterlily Nymphaea thermarum Eb. Fisch. in Rwanda
Published 2024-09-01Get full text
Article -
42969
-
42970
Surgical Practice in Resource‐Limited Settings: Perspectives of Medical Students and Early Career Doctors: A Narrative Review
Published 2025-01-01“…ABSTRACT Introduction Surgical practices in low‐resource countries often fail to meet established standards. Both doctors and medical students have limited exposure to surgical cases, which hinders training and the development of surgical specialization. …”
Get full text
Article -
42971
L’historien et le jeu-vidéo
Published 2018-10-01“…When they speak about historical representations in video games, it’s often thought of war and, whatever is the type of game. …”
Get full text
Article -
42972
-
42973
Digital interventions for self-management of prediabetes: A scoping review.
Published 2024-01-01“…While these interventions are effective, they are often delivered face-to-face, which may pose a barrier to those with limited access to healthcare. …”
Get full text
Article -
42974
Use of telehealth for facilitating the diagnostic assessment of Autism Spectrum Disorder (ASD): A scoping review.
Published 2020-01-01“…Telehealth potentially offers a way of improving the diagnostic pathway for ASD. …”
Get full text
Article -
42975
Building Academic Integrity: Evaluating the Effectiveness of a New Framework to Address and Prevent Contract Cheating
Published 2025-01-01“…Current approaches to managing contract cheating often lack the comprehensive structure needed to address the complexities of modern cheating methods. …”
Get full text
Article -
42976
PERAN SUMUT SEJAHTERA PT.BANK SUMUT DALAM PEMBERDAYAAN PEREMPUAN DI KANTOR CABANG PEMBANTU PASAR MELATI KECAMATAN MEDAN SUNGGAL KOTA MEDAN
Published 2016-03-01“…Bank of North Sumatera in offers UMKM loans through credit programs aimed Sumatera Prosperous empower women through PT. …”
Get full text
Article -
42977
Knockdown of zebrafish tmem242 enhances the production of ROS that signals to increase f9a expression resulting in DIC-like condition
Published 2025-01-01“…Abstract Transmembrane proteins (TMEMs) are embedded in cell membranes and often have poorly understood functions. Our RNAseq analysis identified 89 tmem genes in zebrafish thrombocytes, leading to further investigation through knockdown experiments and gill bleeding assays. …”
Get full text
Article -
42978
Research on seed node mining algorithm in large-scale temporal graph
Published 2022-09-01“…Most of the existing maximizing influence algorithms based on temporal graph were not applicable for large-scale networks due to the low time efficiency or narrow influence range.Therefore, the seed node mining algorithm named CHG combining heuristic algorithm and greedy strategy was proposed.Firstly, based on the time sequence characteristics of information diffusion in temporal graph, the concept of two-order degree of nodes was given, and the influence of nodes was heuristically evaluated.Secondly, the nodes were filtered according to the influence evaluation results, and the candidate seed node set was constructed.Finally, the marginal effect of candidate seed nodes was calculated to solve the overlap of influence ranges between nodes to ensure the optimal combination of seed nodes.The experiments were carried out on three different scale data sets, and the results show that the proposed algorithm can ensure the high influence of the seed node set even though its running time is relatively shorter.And it can achieve a better trade-off between the time efficiency and the influence range of the seed node set.…”
Get full text
Article -
42979
-
42980
Narrowing the semantic gap in virtual machine introspection
Published 2015-08-01“…Virtual machine introspection(VMI)has been widely used in areas such as intrusion detection and malware analysis.However,due to the existence of semantic gap,the generality and the efficiency of VMI were partly influenced while getting internal information of a virtual machine.By analyzing the deficiencies of existing technology of semantic gap restoration,a method called ModSG was proposed to bridge the semantic gap.ModSG was a modularity system,it divided semantic restoration into two parts.One was online phase that interact directly with user to construct semantic views,the other was offline phase that only interact with operating system to parse high-level semantic knowledge.Both were implemented via independent module,and the latter provided the former with necessary kernel information during semantic view construction.Experiments on different virtual machine states and different kernel versions show that the ModSG is accurate and efficient in narrowing semantic gap.The modular design and deployment also make ModSG easily to be extended to other operating systems and virtualization platforms.…”
Get full text
Article