Results 131 to 140 of about 26,866 (284)
Service Work as Lived Experience: A Problematizing Review
ABSTRACT Between employee burnout and growing recruitment challenges, a systemic crisis confronts the service industry. One reason lies in the scope of received human resource management (HRM) approaches, which often emphasize organizational performance metrics at the expense of the emotional, social, and material experiences of doing frontline service
Kushagra Bhatnagar +2 more
wiley +1 more source
ABSTRACT This paper examines the impact of regulatory controls on Bitcoin's excess returns and volatility. The paper innovates by proxying changes in the regulatory environment using global Google search volume intensity data. The generated regulatory indices accurately identify episodes of regulatory tightening within cryptocurrency markets.
Robert Mullings
wiley +1 more source
Uncovering the role of genetic polymorphisms in cervical insufficiency
Pathways and genes implicated in CI pathogenesis. Abstract Cervical insufficiency (CI) is characterized by spontaneous dilation of the cervix in the absence of painful uterine contractions in the mid‐trimester, leading to premature delivery. It is responsible for up to 20% of second trimester pregnancy losses, mostly <24 weeks.
Kallirhoe Kalinderi +3 more
wiley +1 more source
Barriers to contraception access and use among youth: A scoping review in high‐income countries
Abstract Background The United Nations (UN) has a target for universal contraception access by 2030. Youth (aged 15–29) still have limited contraception access and lower usage. A unified understanding of the barriers youth face in high‐income countries (HIC) remains unclear.
Bronte K. Johnston +9 more
wiley +1 more source
Fast bootstrap and reliable readout using hidden references for DNA data storage
This study provides a bootstrap readout framework for DNA data storage based on multiple‐fold hidden references. We employ a multi‐stage alignment and error correction strategy, transforming the de novo readout into a resequencing‐like workflow. Correlation to the hidden watermark reference identifies low‐error‐rate reads, and bit‐wise consensus ...
Weigang Chen +6 more
wiley +1 more source
Software deobfuscation methods: analysis and implementation
This paper describes the work on development of the deobfuscation software. The main target of the developed software is the analysis of the obfuscated malware code.
Sh. F. Kurmangaleev +5 more
doaj
ABSTRACT Objectives Mental health service users are responsible and autonomous individuals who can comprehend their own illness and recovery and therefore engage healthcare professionals in their care. Studies have demonstrated how service users feel more dignified, safe, and respected during mental health treatment when they are listened to by their ...
Matthew S. Johnston +3 more
wiley +1 more source
Impact of a Modular Escape Game on Undergraduate and Continuing Dental Education
ABSTRACT Purpose This study aimed to assess the educational impact and perceived relevance of a pedagogical escape game designed to reinforce key concepts related to dental biomaterials. Methods In 2023, a modular escape game comprising four mandatory stations and one bonus station was developed and integrated into two pedagogical settings: a ...
Sara Bergman +24 more
wiley +1 more source
ABSTRACT Purpose To evaluate 6‐month knowledge retention and long‐term satisfaction after two pedagogical escape games (PEGs) addressing foundational (3D printing) and clinical (pediatric dentistry) content in a dental curriculum. Methods In this monocentric serial cross‐sectional study, immediate post‑PEG knowledge was assessed in fifth‑year dental ...
Lina Grich +8 more
wiley +1 more source
Analysis of obfuscated CIL code
Abstract This thesis focuses on a technique known as obfuscation. The area has been given much attention in recent years as a low cost technique for software protection. There are already numerous papers concerned with techniques for both obfuscation and deobfuscation, but there are still many untouched issues, and little have been done in practice ...
openaire +1 more source

