Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 20 of 360)
A 360° View of Psychiatric Boarding in the Emergency Department
A Breadcrumb Network for Assisting with Autonomous Robot Localization
A Cold Pot Does Not Boil: A Case Study Of The Virginia Beach City Municipal Center Shooting To Understand Disgruntled Employee Violence
A Comprehensive Study of Drinking Water Coagulation with Aluminum Sulfate
A Critical, Empirical, and Reflexive Investigation of the Promise of Democratization in the Making Phenomenon
A Dynamic Approach to Optimizing Interventions and Mitigating Contagion Impacts in Financial Networks
A Legal Analysis of the Effects of Morse V. Frederick on Student Speech in K-12 Education
A Multiple Case Study on the Lived Experiences of Five Upper Elementary School Teachers Who Transitioned from Traditional Grading Practices to Standards-Based Grading Practices
A Phenomenological Content Analysis of Siblings' Lived Experiences Related to Having a Sibling with Substance Use Problems
A Phenomenological Study of African American College Students' Recovery Experiences In A Collegiate Recovery Program
A Photocatalytic Air Cleaning System Breaking Down Volatile Organic Compounds to Improve Health and Productivity of Occupants
A Pilot Study of Gastro-Intestinal Parasites in Two U.S. Captive Free-Ranging Lemur Populations
A TARGETED APPROACH TO PROVIDE WEATHER GUIDANCE FOR GENERAL AVIATION PILOTS BASED ON ESTIMATED TIME OF DEPARTURE AND PERSONAL WEATHER MINIMUMS
A Window into My Mirror: An Autoethnography of Culturally Sustaining Pedagogy with LGBTQ+ Students
A novel machine learning framework for comparison of viral COVID-19–related Sina Weibo and Twitter posts : workflow development and content analysis
A path dependent quantum approximate optimization algorithm optimized by pairwise correlation of angles
AI Based Realistic Multi-Hop Wireless Simulation
APE2 is a Critical Regulator of the DNA Damage Response to Maintain Genome Integrity in Mammalian Cells
Abusive Supervision and Subordinate Characteristics: A Relative Importance Analysis
Access Control Design and Implementation for Direct Memory Access Attack