What checkers actually check: an eye tracking study of inhibitory control and working memory. [PDF]
BackgroundNot only is compulsive checking the most common symptom in Obsessive Compulsive Disorder (OCD) with an estimated prevalence of 50-80% in patients, but approximately ∼15% of the general population reveal subclinical checking tendencies that ...
Ben Harkin +2 more
doaj +6 more sources
Application of Microwaves to Reduce Checking in Low-Fat Biscuits: Impact on Sensory Characteristics and Energy Consumption [PDF]
The use of microwaves (MWs) has been proposed as an energy-efficient method for reducing checking. Along with understanding moisture distribution, it is essential to consider structural characteristics to explain how MWs reduce checking. The influence of
Raquel Rodríguez +4 more
doaj +2 more sources
An initial psychometric evaluation and exploratory cross-sectional study of the body checking questionnaire among Brazilian women. [PDF]
Body checking is considered an expression of an excessive preoccupation with appearance. The first aim of this study was to evaluate the psychometric properties of a Brazilian Portuguese version of the Body Checking Questionnaire (BCQ).
Angela Nogueira Neves Betanho Campana +4 more
doaj +5 more sources
A Novel Binary Hybrid PSO-EO Algorithm for Cryptanalysis of Internal State of RC4 Cipher
Cryptography protects privacy and confidentiality. So, it is necessary to guarantee that the ciphers used are secure and cryptanalysis-resistant. In this paper, a new state recovery attack against the RC4 stream cipher is revealed.
Rizk M. Rizk-Allah +6 more
doaj +1 more source
Spanish Fact-Checking Services: An Approach to Their Business Models
The proliferation of fact-checking services is a fast-growing global phenomenon, especially in Western countries. These services are the response of journalism to disinformation, that has transformed a common internal procedure of journalistic work in ...
Miguel-Ángel Esteban-Navarro +3 more
doaj +1 more source
In order to standardize “The Problem situations” as a forensic instrument, a study was conducted with the aim to identify the parameters of the assessment and to check the internal consistency of the instrument.
O.A. Rusakovskaya
doaj +1 more source
Tabu Search Against Permutation Based Stream Ciphers [PDF]
Encryption is one of the most effective methods of securing data confidentiality, whether stored on hard drives or transferred (e.g. by e-mail or phone call). In this paper a new state recovery attack with tabu search is introduced. Based on research and
Iwona Polak, Marcin Boryczka
doaj +1 more source
Algoriths and Procedures for Investment Audit Using a Risk-Based Approach
The research discusses the features of the investment audit at various stages of implementing investment projects. The subject of the study is a methodological approach to its implementation.
V. А. Yakimova, S. V. Pankova
doaj +1 more source
Structural Aspect of Checking the Continuity of the Enterprise during Internal Audit
The article presents the results of the study and the further development of approaches to assessing the continuity risks associated with the internal audit of the enterprise.
S. V. Selishchev
doaj +1 more source
Checking the parameters of the internal environment by calculated simulation of measurements with a ball thermometer [PDF]
According to the regulatory documents in force in the Russian Federation, the measurement of the normalized indoor environment indicators should be carried out with a ball thermometer.
Malyavina Elena, Landyrev Sergey
doaj +1 more source

