Results 21 to 30 of about 1,299,743 (266)

USING CANVA AS MEDIA FOR ENGLISH LANGUAGE TEACHING (ELT) IN DEVELOPING CREATIVITY FOR INFORMATICS STUDENTS’

open access: yesELT Echo: The Journal of English Language Teaching in Foreign Language Context, 2022
This research simulates the use of Canva as a medium for English Language Teaching (ELT) in developing the creativity of Informatics Students in English for Working Course at ITB AAS Indonesia. This research is descriptive qualitative.
Tira Nur Fitria
doaj   +1 more source

The Herschel Virgo Cluster Survey: I. Luminosity functions [PDF]

open access: yes, 2010
We describe the Herschel Virgo Cluster Survey (HeViCS) and the first data obtained as part of the Science Demonstration Phase (SDP). The data cover a central 4x4 sq deg region of the cluster. We use SPIRE and PACS photometry data to produce 100, 160, 250,
A. Boselli   +61 more
core   +3 more sources

Highlighting continued uncertainty in global land cover maps for the user community [PDF]

open access: yes, 2011
In the last 10 years a number of new global datasets have been created and new, more sophisticated alorithms have been designed to classify land cover.
Achard, F.   +8 more
core   +1 more source

Covering Letter

open access: yesEuropasian Journal of Medical Sciences, 2020
COvering ...
openaire   +1 more source

The number of guards needed by a museum: A phase transition in vertex covering of random graphs

open access: yes, 2000
In this letter we study the NP-complete vertex cover problem on finite connectivity random graphs. When the allowed size of the cover set is decreased, a discontinuous transition in solvability and typical-case complexity occurs.
Hartmann, Alexander K., Weigt, Martin
core   +1 more source

DNA Sequences as a Medium for Steganography Method of Codon Frequency with Character Frequency [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2012
The present study included an application of new method of steganography using DNA sequence as a medium for hiding. This method is considered as a secret cover for the secret message (text, image), avoid attention of unauthorized person in addition to be
Sadoon Abdullah, Ahmed Nori
doaj   +1 more source

Typical solution time for a vertex-covering algorithm on finite-connectivity random graphs

open access: yes, 2000
In this letter, we analytically describe the typical solution time needed by a backtracking algorithm to solve the vertex-cover problem on finite-connectivity random graphs.
Hartmann, Alexander K., Weigt, Martin
core   +1 more source

Will\u27s Pennies [PDF]

open access: yes, 1993
The March 1993 issue of Games magazine Pencilwise Extra presented the following puzzle by Will Shortz. Cover one letter with a penny, then take the other six letters on the two lines intersecting at the point and anagram them into a word. For example,
Gordon, Leonard
core   +1 more source

Blinatumomab Utilization in Pediatric B‐Cell Acute Lymphoblastic Leukemia: Experience From the Mountain West

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Blinatumomab is a bispecific T‐cell engager approved for the treatment of pediatric B‐cell acute lymphoblastic leukemia (B‐ALL). Outpatient home infusion reduces hospitalization burden and optimizes resource utilization, but is logistically challenging.
Angela Parra del Riego   +10 more
wiley   +1 more source

A linguistic steganography framework using Arabic calligraphy

open access: yesJournal of King Saud University: Computer and Information Sciences, 2021
In linguistic steganography, languages’ features are employed to hide information. The Arabic language has a rich set of features which have not been utilized until now in this area.
Ali.A. Hamzah   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy