Results 81 to 90 of about 19,937 (276)

Nasal soft‐tissue anatomy of Triceratops and other horned dinosaurs

open access: yesThe Anatomical Record, EarlyView.
Abstract Although ceratopsid dinosaurs possess a characteristically hypertrophied narial region, soft‐tissue anatomy associated with such a skeletal structure and their biological significance remain poorly understood. The present study provides the first comprehensive hypothesis on the soft‐tissue anatomy in the ceratopsid rostrum based on the Extant ...
Seishiro Tada   +5 more
wiley   +1 more source

The paper puzzle as an active learning tool in the teaching of anatomy: A qualitative study of perceptions in students and near‐peer teachers

open access: yesAnatomical Sciences Education, EarlyView.
Abstract Active learning strategies enhance medical education by fostering self‐directed learning, communication, and problem‐solving skills. The paper puzzle, a game‐based learning approach, provides an engaging way to reinforce anatomical knowledge and promote collaboration.
Ricardo Tello‐Mendoza   +6 more
wiley   +1 more source

Enhancing resilience in IoT cybersecurity: the roles of obfuscation and diversification techniques for improving the multilayered cybersecurity of IoT systems

open access: yesData & Policy
In our digitalized modern society where cyber-physical systems and internet-of-things (IoT) devices are increasingly commonplace, it is paramount that we are able to assure the cybersecurity of the systems that we rely on.
Sampsa Rauti, Samuli Laato
doaj   +1 more source

A Tutorial on Software Obfuscation [PDF]

open access: yes, 2016
Protecting a digital asset once it leaves the cyber trust boundary of its creator is a challenging security problem. The creator is an entity which can range from a single person to an entire organization. The trust boundary of an entity is represented by all the (virtual or physical) machines controlled by that entity.
openaire  

Beyond Kahoot! Reflections and guidelines from a serial gamifying educator on when and how to effectively use games and game elements in anatomical education

open access: yesAnatomical Sciences Education, EarlyView.
Abstract According to Nietzsche, “In every real [adult], a child is hidden that wants to play.” In everyday life, playfulness and competition can make routine or dull tasks more engaging and can offer educators opportunities to engage a learner in a more entertaining or interactive manner.
Judi Laprade
wiley   +1 more source

Novel application of gamification to support undergraduate anatomy: Student perceptions and performance

open access: yesAnatomical Sciences Education, EarlyView.
Abstract Anatomy is a foundational component of various medical and paramedical disciplines. Existing research has suggested that games or game elements can improve student interest in musculoskeletal (MSK) anatomy. This project builds on previous gamification and serious game work and incorporates new anatomy‐based games into undergraduate anatomy ...
Emmeline Berger   +2 more
wiley   +1 more source

Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2018
The Identifier Renaming Method (IRM) is a well-used obfuscation method since almost obfuscation tools use the algorithm, and easy to implement. The IRM transforms the identifier names in the programs to meaningless names in order to hard to understand ...
Yosuke Isobe, Haruaki Tamada
doaj   +1 more source

Fostering medication review competence of pharmacy students: An assessment by students and their preceptors after advanced‐level practical internship

open access: yesBritish Journal of Clinical Pharmacology, EarlyView.
Aims The aim of this study was to introduce a new assessment method for pharmacy students' real‐life competence in reviewing medications after obligatory advanced‐level practical internship in Finland. Methods The new medication review (MR) competence assessment method consisted of (1) a self‐assessment by pharmacy students and (2) a performance ...
Katja Leiman   +5 more
wiley   +1 more source

Metamorphic Code Generation from LLVM IR Bytecode [PDF]

open access: yes, 2013
Metamorphic software changes its internal structure across generations with its functionality remaining unchanged. Metamorphism has been employed by malware writers as a means of evading signature detection and other advanced detection strate- gies ...
Sjsu Scholarworks   +4 more
core   +3 more sources

RETRACTED: Learner emotions and performance in hypercasual VR games with adaptive AI difficulty

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Hypercasual virtual reality games (HVRGs) are widely regarded as cost‐effective tools for rapid skill acquisition, yet the mechanisms that optimise their effectiveness and user acceptance remain insufficiently explored. This mixed‐methods empirical study investigates how playful emotions, characterised by engagement, enjoyment and anxiety ...
Zeeshan Ahmed, Faizan Ahmad, Chen Hui
wiley   +1 more source

Home - About - Disclaimer - Privacy