Results 111 to 120 of about 45,874 (260)
Combining Higher-Order Logic with Set Theory Formalizations. [PDF]
Kaliszyk C, Pąk K.
europepmc +1 more source
Seismic analysis and design of tunnels within fault ground: A review
The research methods of seismic response of tunnels within fault ground, including field investigations, analytical solutions, physical experiments, and numerical simulations, and seismic countermeasures are discussed. The present study examines the shortcomings and limitations of the current research and design, and puts forward proposals for future ...
Xingda Wang +6 more
wiley +1 more source
Trigonometric words ranking model for spam message classification
Abstract The significant increase in the volume of fake (spam) messages has led to an urgent need to develop and implement a robust anti‐spam method. Several of the current anti‐spam systems depend mainly on the word order of the message in determining the spam message, which results in the system's inability to predict the correct type of message when
Suha Mohammed Hadi +7 more
wiley +1 more source
Logics and admissible rules of constructive set theories. [PDF]
Iemhoff R, Passmann R.
europepmc +1 more source
ABSTRACT Does street‐level bureaucrats' (SLBs) willingness to sacrifice their own self‐interests to meet the needs of their clients vary depending on their contexts? To date, it has been very challenging to empirically examine how SLBs who have different orientations toward social values might act in different institutional and administrative contexts.
Nissim Cohen, Teddy Lazebnik
wiley +1 more source
Modelling and verification of post-quantum key encapsulation mechanisms using Maude. [PDF]
García V +4 more
europepmc +1 more source
Abstract The artificial intelligence (AI) revolution is upon us. It will inevitably form a central component of epilepsy workflows and patient advocacy. Therefore, it behooves us as health care providers to ride the crest of this wave and guide its direction for the benefit of all people with epilepsy.
Colin B. Josephson +13 more
wiley +1 more source
A Review of Functional Encryption in IoT Applications. [PDF]
Shahzad K, Zia T, Qazi EU.
europepmc +1 more source
ABSTRACT Recognising the importance of addressing teacher development in the early career stages, our study examined programmatic considerations within teacher education programmes in Canada to determine the extent to which teacher preparation included support for and promotion of teacher well‐being as part of their pre‐service teaching development ...
Benjamin Kutsyuruba +6 more
wiley +1 more source
A conceptual framework of virtual water showing its sources, major applications, components of the virtual water footprint, and emerging future directions. The diagram emphasizes the growing role of virtual water in global sustainability and resource planning.
Priti Bhowmik +2 more
wiley +1 more source

