Results 91 to 100 of about 19,937 (276)
Abstract Vocational interests are traditionally conceived as stable preferences for different activities. However, recent theorizing suggests their intraindividual variability. This preregistered experience sampling study examined intraindividual variation in selected vocational interests states and related situation and person factors (N = 237 ...
Lena Roemer +3 more
wiley +1 more source
The current state of much of the Wuhan pneumonia virus (severe acute respiratory syndrome coronavirus 2 [SARS-CoV-2]) research shows a regrettable lack of data sharing and considerable analytical obfuscation.
Dannon Baker +17 more
doaj +1 more source
Abstract This scoping review has explored the interventions and approaches used by teachers in mainstream (general education) primary schools (students aged 4–11) to support self‐regulation skill development in the classroom. The review followed the PRISMA Extension for Scoping Reviews (PRISMA‐ScR) guidelines for reporting and was guided by the Joanna ...
Kim Griffin +3 more
wiley +1 more source
The Technique of Binary Code Decompilation and Its Application in Information Security Sphere
The authors describes a new technique of binary code decompilation and its application possibility in information security such as software protection against reverse engineering and code obfuscation analyze in malware.
M. O. Shudrak +2 more
doaj
On the Prediction of pDNA Productivity Across Diverse Bioprocesses Using Ensemble Hybrid Models
ABSTRACT The global demand for plasmid DNA (pDNA) is rapidly increasing due to its key role in the manufacture of mRNA vaccines and advanced therapy medicinal products (ATMPs). However, the reliance on suboptimal batch and/or fed‐batch processes, as well as the diversity and increasing complexity of plasmid constructs pose significant challenges during
Nikolaos Stratis +2 more
wiley +1 more source
Obfuscation-Based Watermarking for Mobile Service Application Copyright Protection in the Cloud
The contributions of cloud computing in the prevention of software piracy are inadequate, and there are still rampant piratical mobile service applications in the cloud.
Sun Guang +4 more
doaj +1 more source
ABSTRACT In response to growing global challenges, this study explores how social entrepreneurship within the Edible City movement contributes to building resilient, sustainable, and equitable urban food systems. Drawing on semistructured interviews with over 70 stakeholders across five cities—Berlin, Andernach, Oslo, Rotterdam, and Havana—we ...
Ina Säumel +6 more
wiley +1 more source
Internationalization and ESG Controversies: Do Foreign Directors on Corporate Boards Matter?
ABSTRACT This study examines the relationship between internationalization and environmental, social, and governance (ESG) controversies, focusing on whether foreign directors on corporate boards influence this relationship. Drawing on resource dependence theory, we argue that internationalization increases ESG controversies due to the complexity of ...
Mohamed Elsayed +4 more
wiley +1 more source
ABSTRACT The study examines how narrative disclosure tones (NDTs) and corporate governance mechanisms (CGMs) affect sustainability reporting practices (SRP) in an emerging economy. Data from 125 non‐financial firms in Pakistan, spanning 2011–2022, are utilized. SRP is measured using both GRI and the novel IFRS S1 standards‐based indices. Three NDTs are
Arshad Hasan +2 more
wiley +1 more source
Software deobfuscation methods: analysis and implementation
This paper describes the work on development of the deobfuscation software. The main target of the developed software is the analysis of the obfuscated malware code.
Sh. F. Kurmangaleev +5 more
doaj

