Results 241 to 250 of about 144,919 (285)

Contested heritage landscapes for Arabic language learning in a postcolonial France

open access: yesJournal of Linguistic Anthropology, Volume 36, Issue 1, May 2026.
Abstract This article analyzes the contested and multiple meanings of “heritage” that emerge for advanced Arabic language learners in a postcolonial France. A linguistic life histories approach reveals a fraught duality of privileged access and exclusionary adversity for heritage students of Arabic.
Chantal Tetreault   +2 more
wiley   +1 more source

Data Clustering Method for Fault‐Tolerant Privacy Protection of Smart Grid Based on BGN Homomorphic Encryption Algorithm

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
Smart meter (SM): Collect the data of users' electricity consumption periodically, and preprocess the noise reduction by using the Robust Local Weighted Regression algorithm, then encrypt the private data in it by Boneh‐Goh‐Nissim homomorphic encryption, and submit the encrypted private data to the fog node.
Jiangtao Guo   +5 more
wiley   +1 more source

Behavioral intervention for mental health of pregnant women experiencing domestic violence: a randomized controlled trial. [PDF]

open access: yesFront Public Health
Mahapatro M   +6 more
europepmc   +1 more source

From commons to commoning as resistance efforts to blue injustice: A sociohistorical and ethnographical approach

open access: yesPeople and Nature, Volume 8, Issue 4, Page 835-853, April 2026.
Abstract Over the last 20 years, collaborative efforts have emerged with the intention of going beyond the pure capitalist economy, seeking to generate transformative community‐based changes that guarantee blue equity, fair distribution and well‐being.
Sílvia Gómez, Alfons Garrido
wiley   +1 more source

Co-infection with two α-synuclein strains reveals novel synergistic interactions. [PDF]

open access: yesActa Neuropathol
Holec SAM   +4 more
europepmc   +1 more source

Accelerating m‐Invariance for Continuous Big Data Publishing

open access: yesIEEJ Transactions on Electrical and Electronic Engineering, Volume 21, Issue 4, Page 568-579, April 2026.
To prevent personal information leakage from the collection and publication of big data, anonymization techniques that protect privacy while preserving data utility are essential. In particular, m‐invariance provides privacy protection for dynamic datasets that are continuously published as records are updated.
Kentaro Morise, Hiroaki Nishi
wiley   +1 more source

Political violence in democracies: An Introduction. [PDF]

open access: yesJ Peace Res
Ruggeri A, Daxecker U, Prasad N.
europepmc   +1 more source

Weighted Answer Similarity Analysis. [PDF]

open access: yesAppl Psychol Meas
Trout N, Gorney K.
europepmc   +1 more source

Home - About - Disclaimer - Privacy