Results 81 to 90 of about 19,937 (276)
Nasal soft‐tissue anatomy of Triceratops and other horned dinosaurs
Abstract Although ceratopsid dinosaurs possess a characteristically hypertrophied narial region, soft‐tissue anatomy associated with such a skeletal structure and their biological significance remain poorly understood. The present study provides the first comprehensive hypothesis on the soft‐tissue anatomy in the ceratopsid rostrum based on the Extant ...
Seishiro Tada +5 more
wiley +1 more source
Abstract Active learning strategies enhance medical education by fostering self‐directed learning, communication, and problem‐solving skills. The paper puzzle, a game‐based learning approach, provides an engaging way to reinforce anatomical knowledge and promote collaboration.
Ricardo Tello‐Mendoza +6 more
wiley +1 more source
In our digitalized modern society where cyber-physical systems and internet-of-things (IoT) devices are increasingly commonplace, it is paramount that we are able to assure the cybersecurity of the systems that we rely on.
Sampsa Rauti, Samuli Laato
doaj +1 more source
A Tutorial on Software Obfuscation [PDF]
Protecting a digital asset once it leaves the cyber trust boundary of its creator is a challenging security problem. The creator is an entity which can range from a single person to an entire organization. The trust boundary of an entity is represented by all the (virtual or physical) machines controlled by that entity.
openaire
Abstract According to Nietzsche, “In every real [adult], a child is hidden that wants to play.” In everyday life, playfulness and competition can make routine or dull tasks more engaging and can offer educators opportunities to engage a learner in a more entertaining or interactive manner.
Judi Laprade
wiley +1 more source
Abstract Anatomy is a foundational component of various medical and paramedical disciplines. Existing research has suggested that games or game elements can improve student interest in musculoskeletal (MSK) anatomy. This project builds on previous gamification and serious game work and incorporates new anatomy‐based games into undergraduate anatomy ...
Emmeline Berger +2 more
wiley +1 more source
Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods
The Identifier Renaming Method (IRM) is a well-used obfuscation method since almost obfuscation tools use the algorithm, and easy to implement. The IRM transforms the identifier names in the programs to meaningless names in order to hard to understand ...
Yosuke Isobe, Haruaki Tamada
doaj +1 more source
Aims The aim of this study was to introduce a new assessment method for pharmacy students' real‐life competence in reviewing medications after obligatory advanced‐level practical internship in Finland. Methods The new medication review (MR) competence assessment method consisted of (1) a self‐assessment by pharmacy students and (2) a performance ...
Katja Leiman +5 more
wiley +1 more source
Metamorphic Code Generation from LLVM IR Bytecode [PDF]
Metamorphic software changes its internal structure across generations with its functionality remaining unchanged. Metamorphism has been employed by malware writers as a means of evading signature detection and other advanced detection strate- gies ...
Sjsu Scholarworks +4 more
core +3 more sources
RETRACTED: Learner emotions and performance in hypercasual VR games with adaptive AI difficulty
Abstract Hypercasual virtual reality games (HVRGs) are widely regarded as cost‐effective tools for rapid skill acquisition, yet the mechanisms that optimise their effectiveness and user acceptance remain insufficiently explored. This mixed‐methods empirical study investigates how playful emotions, characterised by engagement, enjoyment and anxiety ...
Zeeshan Ahmed, Faizan Ahmad, Chen Hui
wiley +1 more source

