Results 161 to 170 of about 26,683 (261)
ABSTRACT Mangroves are critical resources in sustaining coastal communities by providing essential ecosystem goods and services. Occurring within the interface of land and sea, they serve as critical ecological zones shaped by dynamic interactions between terrestrial and marine systems.
Menelisi Falayi +11 more
wiley +1 more source
Elites' perceptions of women's representation in the Omani media. [PDF]
Al-Wahaibi S.
europepmc +1 more source
Antibacterial Activity of Heteropolytungstates Against Proteus mirabilis
We investigated the in vitro antibacterial activity of several heteropolytungstates against P. mirabilis, a drug‐resistant pathogen. All tested polyanions inhibited bacterial growth, with the Preyssler–Pope–Jeannin polyanion P5W30 exhibiting the highest activity (MIC = 0.78 mg/mL).
Nour El Ghouch +5 more
wiley +1 more source
The impacts of climate change on violent conflict risk: a review of causal pathways. [PDF]
Xie X +12 more
europepmc +1 more source
Robust Control Using a Matrix Converter to Enhance Wind Turbine Systems
This study uses a more efficient and effective solution to improve the operational performance of a wind turbine‐based power system. This system uses a doubly fed induction generator and relies on a matrix converter and fractional‐order proportional–integral controller.
Sihem Ghoudelbourk +4 more
wiley +1 more source
Long-term wage inequality in imperial China: From 202 BCE to 1912 CE. [PDF]
Wu Q, Tong G, Zhou P.
europepmc +1 more source
This study introduces bipolar q‐fractional fuzzy sets and new aggregation operators to support renewable energy selection under uncertainty. The proposed decision‐making framework effectively integrates positive and negative evaluations, ensuring consistent ranking and robust performance, as demonstrated through practical analysis and comparative ...
Sagvan Y. Musa +3 more
wiley +1 more source
Psychological Projections in the Emergence of Hive Mind [PDF]
Dalley, Carolle
core +1 more source
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source

