An Anti-Range-Deception-Jamming Method for Networked Moving Radar Based on Trajectory Optimization. [PDF]
Han X +6 more
europepmc +1 more source
How Do Investors React to Supplier Exploitation? Event Study and Experimental Evidence
ABSTRACT Supplier exploitation, including financial squeezing, payment delays, and non‐contractual demands, is a pervasive form of corporate misconduct. This multi‐method study examines how investors interpret supplier exploitation amid competing ethical and financial considerations.
Seongtae Kim, Sangho Chae, Han Kyul Oh
wiley +1 more source
Quantum Negotiation Games: Toward Ethical Equilibria. [PDF]
Smoliński R +3 more
europepmc +1 more source
Predictability of a dental implant prognosis system: A retrospective study
Abstract Background This study aimed to evaluate the predictability of the dental implant prognosis system proposed by Kwok et al. in 2023 by assessing implant survival rates across different initial prognosis categories over a 5‐year period. Methods Data were retrospectively collected from patients who received at least one dental implant from 2013 ...
Kristen Young +4 more
wiley +1 more source
The HBCU Climate and Heterosexual Black College Students: Gender Norms as Predictors of Sexual Deception. [PDF]
Jones JM, Hall NM.
europepmc +1 more source
Integrating AI and Into Dental Hygiene Documentation Education
Journal of Dental Education, EarlyView.
Leonardo M. Nassani +3 more
wiley +1 more source
ABSTRACT Background The availability of fertile land suitable for agriculture is limited. In the European Union, political demand for self‐sufficiency in staple food production currently competes with increasing ambitions for nature restoration and green energy. Meanwhile, the overall agricultural area shrinks due to land sealing.
David Emde +3 more
wiley +1 more source
Neural network topology in children's deceptive behaviors: The role of cognitive control and reward processing. [PDF]
Yu L +10 more
europepmc +1 more source
Visual Strategies of Avoidantly Attached Individuals: Attachment Avoidance and Gaze Behavior in Deceptive Interactions. [PDF]
Hypšová P, Seitl M, Popelka S.
europepmc +1 more source
Examining embedded lies through computational text analysis. [PDF]
Loconte R, Kleinberg B.
europepmc +1 more source

