-
241
Drawing the Map: Siting Architecture
Published 2010-06-01“…These positions involve if not a pure scientific objectivity, at least the assumption that one may somehow sidestep the projection of the author's intentionality. Bringing these issues to light, the paper explores whether mapping could address temporality with an assumed depth that would re-responsibilize the architect mapmaker while still remaining open to the users' multiple readings in time. …”
Get full text
Article -
242
Advantages of the connective strategic narrative during the Russian–Ukrainian war
Published 2025-01-01“…Such a narrative is not intentionally constructed by elites but created by the “affective public” on social media—emotionally tied social media users, according to Papacharissi’s definition. …”
Get full text
Article -
243
Single stage auction clearing model for electricity market considering congestion
Published 2025-03-01“…Electric power grid liberalization is adapted worldwide with the intent to lower the electricity prices for end users. …”
Get full text
Article -
244
Feasibility and Acceptability of a Real-Time Adherence Device among HIV-Positive IDU Patients in China
Published 2013-01-01“…We collected data on feasibility and acceptability of a real-time web-linked adherence monitoring container among HIV-positive injection drug users (IDU) in China. “Wisepill” uses wireless technology to track on-time medication dosing. …”
Get full text
Article -
245
Technical Advancement in the Design of Interior Spaces for the Disabled
Published 2022-12-01“…The research community relied on the intentional selective method، and the sample was 20% of the population. …”
Get full text
Article -
246
Features of conducting a forensic commodity examination of furniture products
Published 2023-09-01“…In practice, there are cases of fraud on the part of companies and individuals, for example, when users intentionally damage parts or components of a product in order to return a product under warranty and receive monetary compensation for an allegedly defective product. …”
Get full text
Article -
247
Reflections of Foster Youth Engaging in the Co-Design of Digital Mental Health Technology: Duoethnography Study
Published 2025-01-01“…Co-design centers the intended end users during the design process, creating a direct relationship between potential users and developers. …”
Get full text
Article -
248
A composite improved attention convolutional network for motor imagery EEG classification
Published 2025-02-01“…Motor imagery electroencephalography (MI-EEG) signals are analyzed to infer users’ intentions during motor imagery. These signals hold potential for applications in rehabilitation training and device control. …”
Get full text
Article -
249
Longitudinal impact of past-year reproductive coercion on contraceptive use dynamics in Sub-Saharan Africa: evidence from eight population-based cohortsResearch in context
Published 2025-02-01“…Summary: Background: Reproductive coercion (RC) is a type of abuse where a partner intentionally attempts to interfere with fertility through deception or violence, often by manipulating one’s contraceptive use or reproductive decision-making. …”
Get full text
Article -
250
Problematic internet use and its relationship with eating disorders
Published 2025-01-01“…The continuous variation and removal of this content, and the health problems it poses, requires further study of these digital resources and how users access them, in order to establish preventive measures to ensure health in the future.…”
Get full text
Article -
251
Analisa Sentimen Financial Technology Peer To Peer Lending Pada Aplikasi Koinworks
Published 2022-12-01“…The benefits of this research are to help the management of Koinworks applications regarding positive or negative opinions of application users and can provide empirical evidence for related theories so that they can be contributed to the development of subsequent theories. …”
Get full text
Article -
252
A phenomenological study of knowledge concealment in country water and sewage engineering company
Published 2024-08-01“…Van & Hoff (2017) argued that knowledge hiding occurs when an individual does not intentionally disseminate his knowledge to other members of the organization (Kang et al, 2017; Hernaus et al, 2016). …”
Get full text
Article