Search alternatives:
ceers » cheers (Expand Search), beers (Expand Search), cers (Expand Search)
hackers » trackers (Expand Search)
ceers » cheers (Expand Search), beers (Expand Search), cers (Expand Search)
hackers » trackers (Expand Search)
-
81
Prevalence of sleep disturbance in patients with ankylosing spondylitis: a systematic review and meta-analysis
Published 2023“…Heterogeneity among the identified studies was checked using the I2 index, and the Begg and Mazumdar correlation test examined the existence of published bias. …”
Get full text
Article -
82
Furniture form innovation and human–machine comfort evaluation model based on genetic algorithm
Published 2024“…In the give-up, the advised model’s viability is checked by means of looking at how fixtures from the product’s layout picks had been carried out to assist designers give us fresh thoughts.…”
Get full text
Article -
83
A Multi-tier Model and Filtering Approach to Detect Fake News Using Machine Learning Algorithms
Published 2024“…The best performance of sequence for both datasets is LR_DT_RF which yields 0.9892 F1-Score, 0.9895 Accuracy, and 0.9790 Matthews Correlation Coefficient (MCC) for ISOT Fake News Dataset, and 0.9913 F1-Score, 0.9853 Accuracy, and 0.9455 MCC for CHECKED Dataset. This research could give researchers an approach for fake news detection on different social platforms and feature-based.…”
Get full text
Article -
84
Student poster conferences as a formative, authentic, inclusive and sustainable assessment practice
Published 2025“…Of primary importance, the poster conference is a safe-to-fail formative experiential learning opportunity, with opportunities for feedback from peers and key stakeholders. It is a form of authentic assessment that replicates a ‘real world’ conference experience and aspects of public scholarship and peer review. …”
Journal article -
85
Exploring career realities: elevating graduate employability through job shadowing
Published 2024“…Overall, the performance of program participants surpassed that of their non-participating peers, underscoring the program’s impact on bridging the gap between academic theory and practical application.…”
Get full text
Article -
86
Enumeration, isolation, identification and probiotic characterisation of lactic acid bacteria from Nigerian human breast milk
Published 2019“…Again all eleven LAB produced antibacterial metabolites that inhibited the growth of all the four indicator bacteria (Bacillus cereus, Escherichia coli, Salmonella Enteritidis and Staphylococcus aureus) in both unbuffered and buffered agar spot tests. …”
Get full text
Thesis -
87
Encrypted smartphone with advanced encryption standard 256
Published 2011“…However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. In today’s market, various encryption suites are available for mobile users to send their SMS “safely” and offer different ways of encryption and decryption such as symmetry cryptography and asymmetric cryptography. …”
Get full text
Final Year Project (FYP) -
88
The Inspiration Design Toolkit: A Human-Centered Design Tool for a System Engineering Course
Published 2024“…The aim of the IDT is to improve the participants’ learning experience and course engagement, increase opportunities for them to interact with their peers and teaching team, enable them to practice and reinforce the concepts through the creation of their own IDT cards, and share the cards in the discussion to increase learners’ engagement with course material and peers. …”
Get full text
Article -
89
Facial expression quantification and analysis
Published 2008“…This dissertation mentions some of the latest techniques available in the above field and proposes two design techniques that exceed the performance of their peers in both technical aspects and applications.…”
Get full text
Thesis -
90
Normal People /
Published 2018“…Well-off Marianne blossoms at university, becoming pretty and popular, while Connell struggles for the first time in his life to fit in properly with his peers. The two weave in and out of each other's lives during their university years, developing an intense bond that exposes their traumas and insecurities.…”
Get full text
software, multimedia -
91
TDSF: Two-phase tamper detection in semi-fragile watermarking using two-level integer wavelet transform
Published 2025“…The initial phase will check four segments to determine the tampered bit or not. …”
Get full text
Article -
92
Tea leaf [Camellia sinensis (L.) Kuntze] extract-synthesized silver nanoparticles as antimicrobial agent against foodborne pathogens
Published 2018“…The antibacterial activity of silver nanaoparticles was tested against 12 foodborne pathogens namely Escherichia coli, Escherichia coli O157:H7, Klebsiella pneumoniae, Staphylococcus aureus, Bacillus cereus, Salmonella Typhimurium, Salmonella Enteritidis, Enterococcus faecalis, Enterococcus durans, Listeria monocytogenes, Bacillus subtilissubsp. spizizenii, and Methicillin-resistant Staphylococcus aureus. …”
Get full text
Thesis -
93
Promoting strategic internal communication in governance to enhance employee creativity in organization
Published 2024“…The results indicate that when internal communication and leadership communication in governance are symmetrical, individuals are more likely to receive feedback from a variety of interpersonal sources, including supervisors, colleagues, and peers from different departments. This enhances creativity. …”
Get full text
Article -
94
Perceptions of gifted adolescents in Singapore towards the "gifted" label and its effects on their social relationships
Published 2008“…Some of the disadvantages include high expectations from parents and teachers and being discriminated by peers in the mainstream. Results of case studies parallel these findings.…”
Get full text
Thesis -
95
Signalling through deviance
Published 2013“…Stimuli were presented in a 2X2 mixed-model design, by manipulating the subjects, whether they are more successful or less successful than their peers, and if the question presented encompasses an identity threat or not. …”
Get full text
Final Year Project (FYP) -
96
Finite element analysis on post-buckling of thin-walled structures using ANSYS
Published 2015“…The results obtained were checked against experimental data and led to the development and the revision of design procedures for the pin-ended lipped column and hollow box section.…”
Get full text
Final Year Project (FYP) -
97
Investigating the impact of the stratified cognitive apprenticeship model on high school students’ math performance
Published 2024“…The results indicated that students instructed using the SCTM outperformed their peers in mathematical achievement, thereby validating SCTM’s effectiveness as a comprehensive educational strategy for mathematics education at the senior high school level.…”
Get full text
Article -
98
Mothers’ social networks and socioeconomic gradients of isolation
Published 2024“…Wealthier women and women from more-advantaged castes and tribes have smaller networks than their less-advantaged peers, primarily because they know fewer women within their own socioeconomic group. …”
Journal article -
99
Social network structure in autistic individuals: a systematic review
Published 2025“…Results indicate that autistic children experience greater isolation with more peripheral status and lower peer acceptance compared with their neurotypical peers. …”
Journal article -
100
How to choose a law review: an empirical study
Published 2023“…The optimal publication strategy for authors depends on whether they want to maximize prestige among peers or rather their impact on the discipline, as well as on authors’ career stage and risk averseness. …”
Journal article