Results 111 to 120 of about 12,942,505 (384)
The Legitimization of Improvement Science in Academe [PDF]
This article examines improvement science (Bryk, 2009) against the backdrop of traditional academic research methods. Improvement science is perhaps most closely aligned with design-based implementation research, and is typically applied to networked ...
Casey D. Cobb, Patricia Virella
doaj
We achieved cytoplasmic delivery of non‐cell‐penetrating IgGs by grafting a single functional complementarity‐determining region 1 (CDR1) from the light chain variable region (VL) of the cell‐internalizable 3D8 antibody. The engineered IgG acquired cell‐penetrating ability while maintaining antigen affinity, highlighting CDR1 grafting as a promising ...
Yerin Jeon+5 more
wiley +1 more source
Seminars in Proactive Artificial Intelligence for Cybersecurity (SPAIC): Consulting and Research [PDF]
The authors have designed a platform for research and consulting through a high-level collaborative seminar series to promote networking in proactive artificial intelligence (AI) for cybersecurity (SPAIC).
Ehsan Sheybani, Giti Javidi
doaj
Urine is a rich source of biomarkers for cancer detection. Tumor‐derived material is released into the bloodstream and transported to the urine. Urine can easily be collected from individuals, allowing non‐invasive cancer detection. This review discusses the rationale behind urine‐based cancer detection and its potential for cancer diagnostics ...
Birgit M. M. Wever+1 more
wiley +1 more source
The problems with design education in the UK. [PDF]
The objective of this paper is to explore the problems associated with design education in the UK. British Design has an enviable international reputation for excellence, however, has this reputation been gained at the expense of its student body? And is
International Association of Societies of Design Research.+7 more
core
Malicious User Experience Design Research for Cybersecurity
This paper explores the factors and theory behind the user-centered research that is necessary to create a successful game-like prototype, and user experience, for malicious users in a cybersecurity context.
Sharevski, Filipo+2 more
core +1 more source
Subpar reporting of pre‐analytical variables in RNA‐focused blood plasma studies
Pre‐analytical variables strongly influence the analysis of extracellular RNA (cell‐free RNA; exRNA) derived from blood plasma. Their reporting is essential to allow interpretation and replication of results. By evaluating 200 exRNA studies, we pinpoint a lack of reporting pre‐analytical variables associated with blood collection, plasma preparation ...
Céleste Van Der Schueren+16 more
wiley +1 more source
Are within-subjects designs transparent?
Researchers frequently argue that within-subjects designs should be avoided because they result in research hypotheses that are transparent to the subjects in the study.
Charles Lambdin, Victoria A. Shaffer
doaj +1 more source
Practice-centred approach to research in design [PDF]
This paper gives an overview of practice-centred research programmes at Sheffield Hallam University and discusses the principles behind practice-centred research, its place in the Design School, its effect on the regional economy and the community and ...
Chamberlain, C., Roddis, J., Rust, C.
core
Cancer‐associated fibroblasts (CAFs) promote cancer growth, invasion (metastasis), and drug resistance. Here, we identified functional and diverse circulating CAFs (cCAFs) in patients with metastatic prostate cancer (mPCa). cCAFs were found in higher numbers and were functional and diverse in mPCa patients versus healthy individuals, suggesting their ...
Richell Booijink+6 more
wiley +1 more source