Results 71 to 80 of about 180,917 (343)
ANALISA DAN PERANCANGAN GAME EDUKASI STUDENT ADVENTURE 2D PADA SMK NEGERI 1 AL-MUBARKEYA
Penelitiant ini bertujuan merancang media belajar dalam bentuk game. penelitian ini menggunakan metode penelitian dan pengembangan ( Research and Dvelopment ). Dalam tahapan proses penelitian ini ada tahap analisis, desain, pengembangan, implementasi dan
Sulaiman Aula +2 more
doaj +1 more source
Functional and Structural Evidence of Neurofluid Circuit Aberrations in Huntington Disease
ABSTRACT Objective Disrupted neurofluid regulation may contribute to neurodegeneration in Huntington disease (HD). Because neurofluid pathways influence waste clearance, inflammation, and the distribution of central nervous system (CNS)–delivered therapeutics, understanding their dysfunction is increasingly important as targeted treatments emerge.
Kilian Hett +8 more
wiley +1 more source
Muddy rules for cyberspace: Musings of a she-blogger [PDF]
‘Muddy rules for cyberspace’: Musings of a she-blogger. Yvonne Downs Although referring specifically to intellectual property rights, the above quotation from Burk (1998) gives a sense of the complex, emergent, often ambiguous terms on which we enter ...
Downs, Yvonne
core
Epilepsy‐Associated Variants of a Single SCN1A Codon Exhibit Divergent Functional Properties
ABSTRACT Objective Pathogenic variants in SCN1A, which encodes the voltage‐gated sodium channel NaV1.1, are associated with multiple epilepsy syndromes exhibiting a range of clinical severity. SCN1A variants are reported in different syndromes, including Dravet syndrome, which is associated with loss‐of‐function, whereas neonatal/infantile‐onset ...
Lanie N. Liebovitz +3 more
wiley +1 more source
Due to the increasing sophistication of face forgery techniques, the images generated are becoming more and more realistic and difficult for human eyes to distinguish.
Hanxian Duan +7 more
doaj +1 more source
Women In The Web of Secondary Copyright Liability and Internet Filtering [PDF]
This Essay suggests possible explanations for why there is not very much legal scholarship devoted to gender issues on the Internet; and it asserts that there is a powerful need for Internet legal theorists and activists to pay substantially more ...
Bartow, Ann
core +1 more source
Multidimensional Profiling of MRI‐Negative Temporal Lobe Epilepsy Uncovers Distinct Phenotypes
ABSTRACT Objective Although hippocampal sclerosis (TLE‐HS) represents the most frequent cause of temporal lobe epilepsy (TLE), up to 30% of patients show no lesion on visual MRI inspection (TLE‐MRIneg). These cases pose diagnostic and therapeutic challenges and are underrepresented in surgical series.
Alice Ballerini +28 more
wiley +1 more source
The role of computer mediated environment and simulations in mediating consumers' personal and domestic life-worlds [PDF]
This thesis examines the impacts of consumption of simulations. Using ethnographic methods, it explores how Irish consumers are using simulated products in lieu of the real and tangible, and how consumption of these simulations impact on their lifeworlds.
Siddiqui, Shakeel
core
ABSTRACT Objective This analysis evaluates the effect of successful reperfusion on functional outcomes after MT, stratified by admission National Institutes of Health Stroke Scale (NIHSS) and Alberta Stroke Program Early CT Score (ASPECTS) as surrogates for clinical‐core mismatch, using multicenter registry data.
Felix Schlicht +53 more
wiley +1 more source
Honey password vaults tolerating leakage of both personally identifiable information and passwords
Honey vaults are useful tools for password management. A vault usually contains usernames for each domain, and the corresponding passwords, encrypted with a master password chosen by the owner.
Chao An +4 more
doaj +1 more source

