Results 41 to 50 of about 130,608 (266)

Impact of a senior research thesis on students' perceptions of scientific inquiry in distinct student populations

open access: yesFEBS Open Bio, EarlyView.
This study addressed how a senior research thesis is perceived by undergraduate students. It assessed students' perception of research skills, epistemological beliefs, and career goals in Biochemistry (science) and BDC (science‐business) students. Completing a thesis improved confidence in research skills, resilience, scientific identity, closed gender‐
Celeste Suart   +4 more
wiley   +1 more source

Information space security as a regional economic security factor: assessment tool

open access: yesπ-Economy, 2023
The ambiguous impact of modern information and communication technologies on the economic and social environment actualizes attention to the information aspects of economic security. The purpose of the work is to develop and test a methodology for assessing the security of the information space as a factor in the economic security of the region. Within
Balog Mikhail, Babkin Aleksandr
openaire   +1 more source

Mycobacterial cell division arrest and smooth‐to‐rough envelope transition using CRISPRi‐mediated genetic repression systems

open access: yesFEBS Open Bio, EarlyView.
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point   +7 more
wiley   +1 more source

A collaborative ontology development tool for information security managers [PDF]

open access: yesProceedings of the 4th Symposium on Computer Human Interaction for the Management of Information Technology, 2010
This paper explores the need for a collaborative development tool to allow information security experts to capture their interrelated knowledge in an ontology. Such a tool would enable organisations to make more informed security policy decisions around shared security issues. However, population of ontologies can be time-consuming and error-prone, and
John C. Mace   +2 more
openaire   +1 more source

Tracking Motor Progression and Device‐Aided Therapy Eligibility in Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To characterise the progression of motor symptoms and identify eligibility for device‐aided therapies in Parkinson's disease, using both the 5‐2‐1 criteria and a refined clinical definition, while examining differences across genetic subgroups.
David Ledingham   +7 more
wiley   +1 more source

The Impact of Tilburg Frailty on Poststroke Fatigue in First‐Ever Stroke Patients: A Cross‐Sectional Study With Unified Measurement Tools and Improved Statistics

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Poststroke fatigue (PSF) and frailty share substantial overlap in their manifestations, yet previous research has yielded conflicting results due to the use of heterogeneous frailty assessment tools. Objective To evaluate the independent impact of frailty on PSF using a unified measurement system (Tilburg Frailty Indicator, TFI ...
Chuan‐Bang Chen   +6 more
wiley   +1 more source

Lessons Learned: Quality Analysis of Optical Coherence Tomography in Neuromyelitis Optica

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Introduction Optical coherence tomography (OCT)‐derived retina measurements are markers for neuroaxonal visual pathway status. High‐quality OCT scans are essential for reliable measurements, but their acquisition is particularly challenging in eyes with severe visual impairment, as often observed in neuromyelitis optica spectrum disorders ...
Hadi Salih   +40 more
wiley   +1 more source

Basic Approaches to Testing of Multifunctional Hardware Software Information Security Tools

open access: yesБезопасность информационных технологий, 2011
This paper aims of developing the technique of complex testing of multifunctional hardware-software information security tools based on hardware-software unites of trusted boot which enables testing of functional security while providing for the desired ...
E. A. Belyaeva
doaj  

Integralus informacijos saugumo valdymo modelis

open access: yesInformacijos Mokslai, 2012
Saugumo sąvoka yra daugialypė ir nevienareikšmiškai apibrėžiama, saugumas gali būti suprantamas kaip būsena, kuri gali reikšti ir apsisaugojimą nuo pavojaus (objektyvus saugumas), ir saugumo jausmą (subjektyvus saugumas). Siekiant sumažinti neapibrėžtumą,
Saulius Jastiuginas
doaj   +1 more source

Home - About - Disclaimer - Privacy