Results 51 to 60 of about 2,031,041 (194)

Do National Histories Affect National Identities? Ancient Athens, Byzantium and Greece Today, a Survey Experiment

open access: yesNations and Nationalism, EarlyView.
ABSTRACT Do national histories affect national identities? Most nations have complex and multiple pasts. Nationalist historians can smooth over discontinuities by either merging them into an unbroken national narrative or by skipping over pasts that do not fit the story.
Peter Gries   +2 more
wiley   +1 more source

Spiritual and religious information experiences: An Annual Review of Information Science and Technology (ARIST) paper

open access: yesJournal of the Association for Information Science and Technology, Volume 77, Issue 1, Page 40-61, January 2026.
Abstract This chapter examines the contours of the religious and spiritual information experiences subfield through a review and content analysis of selected contributions from the past two decades in both information science and related fields. The research question that guides this review is: How have spirituality and religion been conceptualized in ...
Nadia Caidi   +4 more
wiley   +1 more source

Historical imprints and virtual representation issues in Mid-Byzantine Acrocorinth Castle

open access: yesVirtual Archaeology Review, 2017
Fortified architecture of medieval times in Greece is a research field with several challenges for the scholars such as the absent of plans and written sources.
Demetrios Athanasoulis   +2 more
doaj   +1 more source

XRFitVis: A Cloud‐Based Visualization Tool for μXRF Mapping Datasets

open access: yesX-Ray Spectrometry, Volume 55, Issue 1, Page 76-82, January/February 2026.
ABSTRACT X‐ray fluorescence (XRF) spectroscopy is a versatile tool employed in various fields like biomedicine, nanotechnology, and cultural heritage, providing comprehensive elemental maps that combine spectrographic, spatial, and morphological data.
George Kourousias   +5 more
wiley   +1 more source

Communication‐Security Co‐Design for Federated Learning in Grant‐Free NOMA IoT Networks

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
This article presents SA‐PPO, a Security‐Aware Proximal Policy Optimisation framework for federated learning over grant‐free NOMA (non‐orthogonal multiple access) in IoT networks. By jointly optimising access control, resource allocation, and trust‐weighted aggregation using cross‐layer indicators, SA‐PPO enhances both communication reliability and ...
Emmanuel Atebawone   +5 more
wiley   +1 more source

The development of the interior architecture of Coptic Church in the twentieth century

open access: yesJournal of Architecture, Art & Humanistic Science, 2020
The research deals with the development of Coptic architecture in the twentieth century and some of the most important features of this development followed by the Coptic church architecture, although in a simple way did not reach the full maturity in ...
George Isaac   +2 more
doaj   +1 more source

Serbian architecture of the Morava period: A local school or an epilogue to the leading trends in late Byzantine architecture: A study in methodology

open access: yes, 2006
U radu se razmatraju metodoloski problemi proucavanja poznovizantijske arhitekture i uticaj koji su njena dosadasnja tumacenja imala na predstavu o crkvenom graditeljstvu Moravske Srbije.
Ivan Stevović
semanticscholar   +1 more source

Design and Implementation of XGBoost‐Based Cyberattack Detection and Blockchain‐Enabled Charging Station

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
The charging station (CS) plays a crucial role in charging electric vehicles. Therefore, it is necessary to protect the CS from cyberattacks. This paper proposes an architecture for the security of the EV fleet during charging using the XGBoost model and Hyperledger Fabric to protect battery management systems (BMS) from cyberattacks.
Gaurav Kumar, Suresh Mikkili
wiley   +1 more source

Directed Acyclic Graph‐Based Blockchain Performance Analysis and Its Secure Operation in Opportunistic Networks

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Directed acyclic graph (DAG)‐based blockchain is a promising paradigm of a blockchain system. During DAG‐based consensus processes, nodes generate blocks in parallel, as well as voting YES on the previous blocks. It makes the DAG‐based blockchain a performance advantage in terms of confirmation delay and transaction throughput.
Ruilin Lai   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy