Results 91 to 100 of about 26,866 (284)

Moving beyond neurophobia to cultivate the neuroquisitive learner

open access: yesAnatomical Sciences Education, EarlyView.
Abstract “Neurophobia,” a pervasive fear of the neurological sciences, poses a significant barrier in medical education, affecting learners and physicians worldwide. Its consequences are far‐reaching, contributing to a limited neurology workforce and diminished confidence among non‐specialists in managing neurological conditions.
Joanna R. Appel   +1 more
wiley   +1 more source

“Basic human things”: Investigating vehicle residents' continually fractured (information) landscapes

open access: yesJournal of the Association for Information Science and Technology, EarlyView.
Abstract This ethnographic study explores vehicle residents' information practices in the United States (US). Vehicle residents are people whose primary means of housing is a vehicle. This work builds on previous research encompassing transitions and fractured (information) landscapes. Using fractured information landscapes as the theoretical framework,
Kaitlin E. Montague
wiley   +1 more source

Security Assessment of Code Obfuscation Based on Dynamic Monitoring in Android Things

open access: yesIEEE Access, 2017
Android-based Internet-of-Things devices with excellent compatibility and openness are constantly emerging. A typical example is Android Things that Google supports.
Taejoo Cho, Hyunki Kim, Jeong Hyun Yi
doaj   +1 more source

Morphing engines classification by code histogram [PDF]

open access: yes, 2011
Morphing engines or mutation engines are exploited by metamorphic virus to change the code appearance in every new generation. The purpose of these engines is to escape from the signature-based scanner, which employs a unique string signature to detect ...
Babak Bashari Rad,   +3 more
core  

Listening to young children with disabilities: Experiences of quality in mainstream primary education

open access: yesBritish Educational Research Journal, EarlyView.
Abstract All children should have access to quality education through a child‐centred pedagogy. An inclusive, child‐centred pedagogy uses a strength‐based view of children that recognises each child as unique and competent, providing children with multiple opportunities to explore and learn at their own pace.
Katherine Gulliver
wiley   +1 more source

An Approach to Reconstruction of Control Flow of an Obfuscated Program

open access: yesТруды Института системного программирования РАН, 2018
Control flow obfuscation is one of widespread methods used to protect application binary code from analysis. The obfuscation transformations dramatically increase the complexity of separation and recognition of the algorithm and data structures.
Ilya N. Ledovskikh, Maxim G. Bakulin
doaj  

Learner emotions and performance in hypercasual VR games with adaptive AI difficulty

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Hypercasual virtual reality games (HVRGs) are widely regarded as cost‐effective tools for rapid skill acquisition, yet the mechanisms that optimise their effectiveness and user acceptance remain insufficiently explored. This mixed‐methods empirical study investigates how playful emotions, characterised by engagement, enjoyment and anxiety ...
Zeeshan Ahmed, Faizan Ahmad, Chen Hui
wiley   +1 more source

Disingenuous ‘box‐ticking’: Undergraduate students' attitudes towards university mental health awareness efforts

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Mental health problems are common among UK undergraduate students. In response, many universities have put considerable effort into raising awareness about student mental health problems and avenues of support (e.g., via workshops, posters, email newsletters and social media posts).
Sorcha Finan, Lucy Foulkes
wiley   +1 more source

Can LLMs Obfuscate Code? A Systematic Analysis of Large Language Models into Assembly Code Obfuscation

open access: yesProceedings of the AAAI Conference on Artificial Intelligence
Malware authors often employ code obfuscations to make their malware harder to detect. Existing tools for generating obfuscated code often require access to the original source code (e.g., C++ or Java), and adding new obfuscations is a non-trivial, labor-intensive process.
Mohseni, Seyedreza   +7 more
openaire   +2 more sources

Strategies teachers use to support students' self‐regulation skill development in mainstream primary schools: A scoping review

open access: yesBritish Educational Research Journal, EarlyView.
Abstract This scoping review has explored the interventions and approaches used by teachers in mainstream (general education) primary schools (students aged 4–11) to support self‐regulation skill development in the classroom. The review followed the PRISMA Extension for Scoping Reviews (PRISMA‐ScR) guidelines for reporting and was guided by the Joanna ...
Kim Griffin   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy