Results 71 to 80 of about 19,819 (285)

Nasal soft‐tissue anatomy of Triceratops and other horned dinosaurs

open access: yesThe Anatomical Record, EarlyView.
Abstract Although ceratopsid dinosaurs possess a characteristically hypertrophied narial region, soft‐tissue anatomy associated with such a skeletal structure and their biological significance remain poorly understood. The present study provides the first comprehensive hypothesis on the soft‐tissue anatomy in the ceratopsid rostrum based on the Extant ...
Seishiro Tada   +5 more
wiley   +1 more source

Software Homology Detection With Software Motifs Based on Function-Call Graph

open access: yesIEEE Access, 2018
Software homology plays an important role in intellectual property protection, malware analysis, and network attack traceback. Among many methods proposed by researchers, the structure-based method has been proved to have better detection and anti ...
Peng Wu, Junfeng Wang, Bin Tian
doaj   +1 more source

Eight years of rider measurement in the Android malware ecosystem: evolution and lessons learned [PDF]

open access: yes, 2018
Despite the growing threat posed by Android malware, the research community is still lacking a comprehensive view of common behaviors and trends exposed by malware families active on the platform.
Stringhini, Gianluca   +1 more
core  

Multi‐omic profiling reveals immune cell priming signature linked to lupus prognosis

open access: yesArthritis &Rheumatology, Accepted Article.
Objective Systemic lupus erythematosus (SLE) is a multi‐organ disease with widespread immune dysregulation and significant unmet clinical need. Blood‐based gene expression studies have advanced our understanding of SLE pathogenesis but may overlook critical tissue‐specific mechanisms that drive disease heterogeneity and progression.
Michael A. Smith   +23 more
wiley   +1 more source

Description of the approach to development of the obfuscating compiler

open access: yesТруды Института системного программирования РАН, 2018
Nowadays protecting intellectual property rights for created software is very important because of many competing companies and ubiquitous piracy. The powerful technique for this protection is to obfuscate program code.
Sh. F. Kurmangaleev   +2 more
doaj   +1 more source

The paper puzzle as an active learning tool in the teaching of anatomy: A qualitative study of perceptions in students and near‐peer teachers

open access: yesAnatomical Sciences Education, EarlyView.
Abstract Active learning strategies enhance medical education by fostering self‐directed learning, communication, and problem‐solving skills. The paper puzzle, a game‐based learning approach, provides an engaging way to reinforce anatomical knowledge and promote collaboration.
Ricardo Tello‐Mendoza   +6 more
wiley   +1 more source

Beyond Kahoot! Reflections and guidelines from a serial gamifying educator on when and how to effectively use games and game elements in anatomical education

open access: yesAnatomical Sciences Education, EarlyView.
Abstract According to Nietzsche, “In every real [adult], a child is hidden that wants to play.” In everyday life, playfulness and competition can make routine or dull tasks more engaging and can offer educators opportunities to engage a learner in a more entertaining or interactive manner.
Judi Laprade
wiley   +1 more source

Novel application of gamification to support undergraduate anatomy: Student perceptions and performance

open access: yesAnatomical Sciences Education, EarlyView.
Abstract Anatomy is a foundational component of various medical and paramedical disciplines. Existing research has suggested that games or game elements can improve student interest in musculoskeletal (MSK) anatomy. This project builds on previous gamification and serious game work and incorporates new anatomy‐based games into undergraduate anatomy ...
Emmeline Berger   +2 more
wiley   +1 more source

Vectorization, Obfuscation and P4 LLVM Tool-chain [PDF]

open access: yes, 2018
This thesis broadly focuses on three different areas: Loop Vectorization, Code Obfuscation, and P4LLVM compiler. The work in Loop vectorization starts with a comparison of Auto-vectorization of GCC, ICC and LLVM compilers and show their strengths and ...
Kumar, Dangeti Tharun   +1 more
core  

Blended and digital approaches in histology and pathology teaching: A scoping review

open access: yesAnatomical Sciences Education, EarlyView.
Abstract Histology and pathology education is evolving, driven by the integration of digital microscopy with other technological advances. Gaining insight into the impact of this transition, while understanding the perspectives of both students and educators, is important for improving teaching practices. This includes mapping teaching methods, digital
Eleonora Nava   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy