Results 91 to 100 of about 3,180 (309)

Trauma‐Informed Practice in Welfare‐to‐Work and Employment Services: A Scoping Review

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT There is increasing recognition within welfare services, including employment services, that many participants may have histories of trauma. Research suggests that experiences of trauma not only impact individuals' psychosocial health but also vocational elements such as job performance, employability, career progression, and financial ...
Emily Corbett   +3 more
wiley   +1 more source

Universal Entanglement and an Information‐Complete Quantum Theory

open access: yesAdvanced Physics Research, EarlyView.
This Perspective summarize an informationcomplete quantum theory which describes a fully quantum world without any classical systems and concepts. Here spacetime/gravity, having to be a physical quantum system, universally entangles matter (matter fermions and their gauge fields) as an indivisible trinity, and encodes information‐complete physical ...
Zeng‐Bing Chen
wiley   +1 more source

Multiple-Feature Extracting Modules Based Leak Mining System Design

open access: yesThe Scientific World Journal, 2013
Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern.
Ying-Chiang Cho, Jen-Yi Pan
doaj   +1 more source

Dr. Hans Kohn and the political takeover of the Berlin Medical Society by the National Socialist regime in 1933

open access: yesThe Anatomical Record, EarlyView.
Abstract To solidify their power over society, totalitarian regimes will usually eliminate any dissent, any perceived threats early on. These threats include not only political enemies but also educated and independent segments of society, such as professional associations.
Michael Hortsch
wiley   +1 more source

Why we age

open access: yesBiological Reviews, EarlyView.
ABSTRACT Three categories of explanations exist for why we age: mechanistic theories, which omit reference to evolutionary forces; weakening force of selection theories, which posit that barriers exist that prevent evolutionary forces from optimising fitness in ageing; and optimisation theories, which posit that evolutionary forces actually select for ...
Michael S. Ringel
wiley   +1 more source

Algorithms and software solutions for SQL injection vulnerability testing in web applications

open access: yesВісник Національного технічного університету "ХПÌ": Системний аналіз, управління та інформаційні технології, 2018
Software security gains importance day by day and developers try to secure web applications as much as possible to protect confidentiality, integrity and availability that are described in the fundamental security model so-called CIA triad. SQL injection
Arslan Berk   +3 more
doaj   +1 more source

The spread of non‐native species

open access: yesBiological Reviews, EarlyView.
ABSTRACT The global redistribution of species through human agency is one of the defining ecological signatures of the Anthropocene, with biological invasions reshaping biodiversity patterns, ecosystem processes and services, and species interactions globally.
Phillip J. Haubrock   +16 more
wiley   +1 more source

Reading hominin life history in fossil bones and teeth: methods to test hypotheses regarding its evolution

open access: yesBiological Reviews, EarlyView.
ABSTRACT Human life history is derived compared to that of our closest living relatives, the great apes. It has been suggested that these derived traits are causally related to aspects of our ecology, social behaviour and cognitive abilities. However, resolving this requires that we know the evolutionary trajectory of our distinctive pattern of growth,
Paola Cerrito   +2 more
wiley   +1 more source

Combating Web Tracking: Analyzing Web Tracking Technologies for User Privacy

open access: yesFuture Internet
Behind everyday websites, a hidden shadow world tracks the behavior of Internet users. Web tracking analyzes online activity based on collected data and delivers content tailored to users’ interests.
Kyungmin Sim, Honyeong Heo, Haehyun Cho
doaj   +1 more source

Home - About - Disclaimer - Privacy