Suggested Topics within your search.
Suggested Topics within your search.
-
1361
Evaluate effects of the National Essential Public Health Service Program on hypertension control of Chinese community-dwelling people during the COVID-19 epidemic: a population-bas...
Published 2025-07-01“…Conclusion Hypertension control of the National Essential Public Health Service Program declined during the COVID-19 epidemic. Structural telemedicine systems should be predefined to ensure efficient delivery of hypertension care services during epidemics. …”
Get full text
Article -
1362
State Thought and Migration: Analysing the Ideological Underpinnings of Temporary Migration Programmes
Published 2025-03-01“…Sayad considers the State central to the migration system, shaping perceptions and practices around migration through its ideological and structural dominance. The paper first explores how the State constructs hegemonic ideologies around migration, emphasising the dichotomy between nationals and non-nationals. …”
Get full text
Article -
1363
-
1364
Supporting Academic Career Pathways for Graduate Student Instructors through Targeted Educational Development
Published 2025-06-01“…Given the expanding employment of GSIs and the influence of their teaching efficacy on undergraduate education, this research examined the effectiveness of a structured professional development program designed to enhance GSIs' teaching capabilities. …”
Get full text
Article -
1365
K to 12 implementation in Siquijor: The senior high school students’ lived experience
Published 2024-11-01“…Ten students from the 10 Senior High Schools in the Province of Siquijor, Philippines participated and were randomly selected and interviewed using a semi-structured interview guide. The following themes emerged: a) opportunities, b) challenges, and c) uncertainties. …”
Get full text
Article -
1366
The role of students’ leadership in environmental conservation at higher education institutions
Published 2025-08-01“…The study used a quantitative research design, data was collected through structured questionnaire from 331 students, and SEM-PLS was used to analyze the collected data. …”
Get full text
Article -
1367
The effect of automated accounting systems (AAS) on audit independence: Empirical Evidence from South West, Nigeria.
Published 2024-06-01“…A cross-sectional survey design with primary data sourced through a structured questionnaire drawn on four Likert scales and a total of 514 copies of the questionnaire physically/virtually administered to auditors (randomly selected) in private engagement in six states of South West, Nigeria. 362 valid questionnaires were descriptively analysed using percentages and mean. …”
Get full text
Article -
1368
-
1369
-
1370
Spanish Economy on the Trajectory of the Modernisation Process
Published 2023-06-01Get full text
Article -
1371
Modeling a Consistent Behavior of PLC-Sensors
Published 2014-08-01“…In constructing a PLC-program model, the approach to modeling a consistent behavior of PLC sensors allows to focus on modeling precisely these reactions without an extension of the program model by additional structures for realization of a realistic behavior of sensors. …”
Get full text
Article -
1372
APPLICATION OF FINITE ELEMENT METHOD TAKING INTO ACCOUNT PHYSICAL AND GEOMETRIC NONLINEARITY FOR THE CALCULATION OF PRESTRESSED REINFORCED CONCRETE BEAMS
Published 2017-07-01“…Objectives Modern building codes prescribe the calculation of building structures taking into account the nonlinearity of deformation. …”
Get full text
Article -
1373
Make me a match: Creating research partnerships to build capacity for the evaluation of community initiatives
Published 2025-01-01“…Data sources included program records, participant surveys administered at 3-, 6-, and 12-months post-match, and semi-structured interviews conducted at 12–18 months post-match. …”
Get full text
Article -
1374
Risk Analysis and Reducing Measures in the Tunneling Project of Tabriz Metro Line 2
Published 2025-06-01Get full text
Article -
1375
Faculty development for undergraduate student programmatic assessment: a Brazilian multi-centered longitudinal study
Published 2025-05-01“…One year later, participants were invited to complete an online structured questionnaire about the importance of the FD activities on 36 aspects of their work. …”
Get full text
Article -
1376
Go Source Code Vulnerability Detection Method Based on Graph Neural Network
Published 2025-06-01“…The core of this approach is to utilize GraphSAGE to extract the global structure and deep semantic information of each concurrent function, maximizing the learning of concurrency vulnerability features. …”
Get full text
Article -
1377
The ADDIE Model in Instructional Design: NUST MISIS Case Study
Published 2023-10-01“…The article gives insight into course description, structure and principles which reflect the coherent progress of Design, Development and Implementation stages. …”
Get full text
Article -
1378
Evaluating the feasibility of study methods for a future trial-based economic evaluation of a multistage shared decision-making program for type 2 diabetes mellitus: Protocol for a...
Published 2025-01-01“…We will also collect data on the usage behavior of patients when completing questionnaires of the primary and secondary outcomes (i.e., time needed to complete questionnaires). Semi-structured interviews with patients will be conducted to obtain insights into the understandability and usability of measurement tools. …”
Get full text
Article -
1379
Assessing Postgraduate Surgical Training Needs at Two Private Tertiary Care Hospitals: A Descriptive Study
Published 2025-06-01“… Objective: To assess the perceived learning needs and challenges faced by postgraduate surgical residents at two private tertiary care hospitals, with the aim of identifying areas for improvement in the structure and delivery of surgical training programs. …”
Get full text
Article -
1380
Secret Sharing Limitations Over Boolean Circuits
Published 2025-04-01“…This paper offers a gentle introduction into the realm of monotone span programs and their connection with linear secret sharing schemes and attribute-based encryption while emphasizing the cryptographic importance of finding efficient MSPs for representing complex access structures. …”
Get full text
Article