Showing 42,961 - 42,980 results of 68,962 for search 'of*', query time: 0.30s Refine Results
  1. 42961

    Deceptive Self-Presentation: The Role of Social Media User Motivation and the Dark Triad Personality by Ujam Jaenudin, Elis Anisah Fitriah, Mirna Devi

    Published 2023-12-01
    “…Online identity frauds such as love scams, catfishing, and fake content are associated with the freedom of personalization offered by social media platforms which can lead to deceptive self-presentation behavior and impressions. …”
    Get full text
    Article
  2. 42962

    Priority areas of police bodies’ activity in ensuring the citizens’ rights in the conditions of martial law legal regime in Ukraine by O. I. Bezpalova

    Published 2022-09-01
    “…Factors, due to which the police authorities significantly reduced the number of administrative and criminal offenses, the commission of which prevailed in peacetime have been established. …”
    Get full text
    Article
  3. 42963
  4. 42964

    Intersexual relationships in mandrills: dominance, sexual conflict and the influence of social integration by Nikolaos Smit

    Published 2024-07-01
    “…In species that live in polygynandrous groups, male-biased sexual size dimorphism often allows males to socially dominate and sexually coerce females. …”
    Get full text
    Article
  5. 42965

    Delay differential equations via the matrix lambert w function and bifurcation analysis: application to machine tool chatter by Sun Yi, Patrick W. Nelson, A. Galip Ulsoy

    Published 2007-01-01
    “…The bifurcation method combined with Sturmsequences provides an algorithm for determining the stability ofDDEs without restrictive geometric analysis. With this approach, onecan obtain the critical values of delay, which determine thestability of a system and hence the preferred operating spindlespeed without chatter. …”
    Get full text
    Article
  6. 42966
  7. 42967

    Hierarchische und dynamische Einheit. Kontext-Eigenschaften und ›metrische Pfade‹ als Kategorien der Syntaxanalyse bei Mozart by Michael Polth

    Published 2015-01-01
    “…Jahrhunderts jedoch gibt es Formabschnitte, die zwar als einheitlich erfahren werden, deren Einheit aber offensichtlich nicht auf den Bezug zu einer einzigen umfassenden Struktur, sondern auf einen dynamischen ›Zug‹ gründet, der durch alle Ereignisse hindurch zu gehen scheint. …”
    Get full text
    Article
  8. 42968
  9. 42969
  10. 42970

    Surgical Practice in Resource‐Limited Settings: Perspectives of Medical Students and Early Career Doctors: A Narrative Review by BillSmith Anyinkeng Achanga, Christian Wabene Bisimwa, Victor Oluwafemi Femi‐Lawal, Nnoko Sona Akwo, Tohson Falake Toh

    Published 2025-01-01
    “…ABSTRACT Introduction Surgical practices in low‐resource countries often fail to meet established standards. Both doctors and medical students have limited exposure to surgical cases, which hinders training and the development of surgical specialization. …”
    Get full text
    Article
  11. 42971

    L’historien et le jeu-vidéo by Julien Lalu

    Published 2018-10-01
    “…When they speak about historical representations in video games, it’s often thought of war and, whatever is the type of game. …”
    Get full text
    Article
  12. 42972
  13. 42973

    Digital interventions for self-management of prediabetes: A scoping review. by Melanie Stowell, Rosie Dobson, Katie Garner, Mirza Baig, Norma Nehren, Robyn Whittaker

    Published 2024-01-01
    “…While these interventions are effective, they are often delivered face-to-face, which may pose a barrier to those with limited access to healthcare. …”
    Get full text
    Article
  14. 42974

    Use of telehealth for facilitating the diagnostic assessment of Autism Spectrum Disorder (ASD): A scoping review. by Manahil Alfuraydan, Jodie Croxall, Lisa Hurt, Mike Kerr, Sinead Brophy

    Published 2020-01-01
    “…Telehealth potentially offers a way of improving the diagnostic pathway for ASD. …”
    Get full text
    Article
  15. 42975

    Building Academic Integrity: Evaluating the Effectiveness of a New Framework to Address and Prevent Contract Cheating by Deepani B. Guruge, Rajan Kadel, Samar Shailendra, Aakanksha Sharma

    Published 2025-01-01
    “…Current approaches to managing contract cheating often lack the comprehensive structure needed to address the complexities of modern cheating methods. …”
    Get full text
    Article
  16. 42976

    PERAN SUMUT SEJAHTERA PT.BANK SUMUT DALAM PEMBERDAYAAN PEREMPUAN DI KANTOR CABANG PEMBANTU PASAR MELATI KECAMATAN MEDAN SUNGGAL KOTA MEDAN by Kaswinata UMA

    Published 2016-03-01
    “…Bank of North Sumatera in offers UMKM loans through credit programs aimed Sumatera Prosperous empower women through PT. …”
    Get full text
    Article
  17. 42977

    Knockdown of zebrafish tmem242 enhances the production of ROS that signals to increase f9a expression resulting in DIC-like condition by Afnan Deebani, Jabila Mary, Sanchi Dhinoja, Ayah Al Qaryoute, Weam Fallatah, Pudur Jagadeeswaran

    Published 2025-01-01
    “…Abstract Transmembrane proteins (TMEMs) are embedded in cell membranes and often have poorly understood functions. Our RNAseq analysis identified 89 tmem genes in zebrafish thrombocytes, leading to further investigation through knockdown experiments and gill bleeding assays. …”
    Get full text
    Article
  18. 42978

    Research on seed node mining algorithm in large-scale temporal graph by Xiaohong ZOU, Chengwei XU, Jing CHEN, Biao SONG, Mingyue WANG

    Published 2022-09-01
    “…Most of the existing maximizing influence algorithms based on temporal graph were not applicable for large-scale networks due to the low time efficiency or narrow influence range.Therefore, the seed node mining algorithm named CHG combining heuristic algorithm and greedy strategy was proposed.Firstly, based on the time sequence characteristics of information diffusion in temporal graph, the concept of two-order degree of nodes was given, and the influence of nodes was heuristically evaluated.Secondly, the nodes were filtered according to the influence evaluation results, and the candidate seed node set was constructed.Finally, the marginal effect of candidate seed nodes was calculated to solve the overlap of influence ranges between nodes to ensure the optimal combination of seed nodes.The experiments were carried out on three different scale data sets, and the results show that the proposed algorithm can ensure the high influence of the seed node set even though its running time is relatively shorter.And it can achieve a better trade-off between the time efficiency and the influence range of the seed node set.…”
    Get full text
    Article
  19. 42979
  20. 42980

    Narrowing the semantic gap in virtual machine introspection by Chao-yuan CUI, Yun WU, Ping LI, Xiao-ming ZHANG

    Published 2015-08-01
    “…Virtual machine introspection(VMI)has been widely used in areas such as intrusion detection and malware analysis.However,due to the existence of semantic gap,the generality and the efficiency of VMI were partly influenced while getting internal information of a virtual machine.By analyzing the deficiencies of existing technology of semantic gap restoration,a method called ModSG was proposed to bridge the semantic gap.ModSG was a modularity system,it divided semantic restoration into two parts.One was online phase that interact directly with user to construct semantic views,the other was offline phase that only interact with operating system to parse high-level semantic knowledge.Both were implemented via independent module,and the latter provided the former with necessary kernel information during semantic view construction.Experiments on different virtual machine states and different kernel versions show that the ModSG is accurate and efficient in narrowing semantic gap.The modular design and deployment also make ModSG easily to be extended to other operating systems and virtualization platforms.…”
    Get full text
    Article