Results 51 to 60 of about 2,752,311 (329)

Women in the Context of Disasters: A Bibliometric Analysis of Global Research Over Three Decades [PDF]

open access: yesE3S Web of Conferences
As natural hazard risks escalate globally, growing attention has been directed toward understanding how disasters affect women. This study applies a bibliometric analysis of publications between 2005 and 2025 retrieved from Scopus, focusing on gender and
Amri Ikhwan   +2 more
doaj   +1 more source

Using an Evolving Thematic Clustering in a Text Segmentation Process

open access: yesJ. Univers. Comput. Sci., 2008
JUCS - Journal of Universal Computer Science Volume Nr.
Lamprier, Sylvain   +3 more
openaire   +2 more sources

Hierarchical structuring of Cultural Heritage objects within large aggregations

open access: yes, 2013
Huge amounts of cultural content have been digitised and are available through digital libraries and aggregators like Europeana.eu. However, it is not easy for a user to have an overall picture of what is available nor to find related objects. We propose
C. Gennaro   +6 more
core   +1 more source

Pediatric Oncology Nursing Competencies in Latin America and the Caribbean: A Scoping Review to Inform Practice, Education, and Research

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Nurses are central to cancer care for children and adolescents, yet no comprehensive synthesis has defined essential core competencies for pediatric oncology nursing (PON) practice internationally, particularly in Latin America and the Caribbean (LAC).
Luís Carlos Lopes‐Júnior   +7 more
wiley   +1 more source

From Dots and Lines to Connections: Re-Evaluation of Relational Thinking in Architecture

open access: yesBuildings
Relational thinking, as both an ontological and epistemological approach, is inherently intertwined with the discipline of architecture. Yet, despite its growing visibility in the information age, its conceptual depth and theoretical implications remain ...
Ömür Kararmaz   +1 more
doaj   +1 more source

Neural connectivity in syntactic movement processing [PDF]

open access: yes, 2019
Linguistic theory suggests non-canonical sentences subvert the dominant agent-verb-theme order in English via displacement of sentence constituents to argument (NP-movement) or non-argument positions (wh-movement).
Europa, Eduardo   +3 more
core   +2 more sources

Protein pyrophosphorylation by inositol pyrophosphates — detection, function, and regulation

open access: yesFEBS Letters, EarlyView.
Protein pyrophosphorylation is an unusual signaling mechanism that was discovered two decades ago. It can be driven by inositol pyrophosphate messengers and influences various cellular processes. Herein, we summarize the research progress and challenges of this field, covering pathways found to be regulated by this posttranslational modification as ...
Sarah Lampe   +3 more
wiley   +1 more source

Scientometric analysis of domestic dissertation research, containing the category of «patriotic education» in their titles

open access: yesВестник Майкопского государственного технологического университета
The relevance of the research is due to the increased interest and need of specialists of various categories in studying the problems of patriotic education in the modern sociocultural situation.
P. P. Pivnenko, N. P. Vitenko
doaj   +1 more source

Pacifier overuse and conceptual relations of abstract and emotional concepts [PDF]

open access: yes, 2017
This study explores the impact of the extensive use of an oral device since infancy (pacifier) on the acquisition of concrete, abstract, and emotional concepts.
Barca, Laura   +2 more
core   +1 more source

Network divergence analysis identifies adaptive gene modules and two orthogonal vulnerability axes in pancreatic cancer

open access: yesMolecular Oncology, EarlyView.
Tumors contain diverse cellular states whose behavior is shaped by context‐dependent gene coordination. By comparing gene–gene relationships across biological contexts, we identify adaptive transcriptional modules that reorganize into distinct vulnerability axes.
Brian Nelson   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy