News
Ndonky, A. , Ka, S. and Ndiaye, I. (2025) Contribution of GIS and Multi-Criteria Analysis to the Assessment and Prevention of ...
With the development of AI technologies, the sensitivity of lung cancer detection using LDCT has significantly improved. AI ...
Means, Vehicle Crashes, Dunn’s Partition Coefficient, Machine Learning Share and Cite: Abdulhafedh, A. (2025) Applying K-Means Clustering and Fuzzy C-Means Clustering in Vehicle Crashes. Open Access ...
Milk from small-scale dairy farms in Northern Ghana plays a vital role in food security and nutrition but remains highly ...
The Tunguska explosion occurred on June 30, 1908 over Siberia. It was a cosmic body explosion that was accompanied by an ...
Shen, T. (2025) Research on the Design of Data Asset Valuation Platform Based on WEB. Open Access Library Journal, 12, 1-12. doi: 10.4236/oalib.1113225 .
In this article, our focus lies on a Schrödinger equation incorporating a Hardy term. To identify the global minimizers of the functional I under a mass constraint, we ...
Designing an Intelligent Virtual Assistant for Preventing Bullying and Cyberbullying in Education ()
Fluid Bullying, Cyberbullying, Intelligent Virtual Assistant, Educational Environments, Artificial Intelligence, Conversational Design, Reporting Tool, School Violence Share and Cite: Romero, C. (2025 ...
Human-Robot Collaboration, Speed and Separation Monitoring, Safety Zones, Industrial Robot Share and Cite: Verschueren, G. , Noens, R. , Nica, W. , Accoto, D. and Juwet, M. (2025) Advancing ...
The Creation of English Classroom Teaching Environment. Open Access Library Journal, 12, 1-1. doi: 10.4236/oalib.1113324 . As educational ecology has received more and more attention in the field of ...
Pattern of Tooth Wear Lesions and Associated Risk Factors among Adults in Port Harcourt. Journal of Biosciences and Medicines, 13, 75-85. doi: 10.4236/jbm.2025.134008 . The human teeth are composed ...
Enhancing Microsoft CyberBattleSim for Enterprise Cybersecurity Simulations. Journal of Information Security, 16, 270-282. doi: 10.4236/jis.2025.162014 . Quantifying the effectiveness of cyber defense ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results