Results 61 to 70 of about 1,803,633 (138)
A Bibliometric Analysis of Four Decades of Shareholder Activism Research
ABSTRACT Research Questions/Issue In this bibliometric review of shareholder activism literature spanning 1983–2021, we pursue two objectives. Firstly, we investigate the degree of interdisciplinarity in the field, and second, we scrutinize publication trends, foundational knowledge, core topics, and emerging thematic trends, exploring the trajectory ...
Dionysia Katelouzou+2 more
wiley +1 more source
Abstract This paper addresses linguistic and epistemic justice by exploring multilingual practices in tertiary contexts in an English‐dominant linguistic ecology. The paper argues that the university linguistic space (linguascene) governs language choices toward English monolingualism, and this has implications for epistemic justice in multilingual ...
Anikó Hatoss, Eliot Allport
wiley +1 more source
Optimal energy management of water networks under quality conditions
Abstract In the context of sustainability, which has become fundamental today, we aim to optimize (reduce) the energy consumption due to the use of pumps that bring water from all the different reservoirs to the nodes of the distribution network. The proposed model allows us, thanks to the use of smart meters and new 5G technologies, to determine the ...
Gabriella Colajanni+2 more
wiley +1 more source
ABSTRACT Biodiversity resilience relies on genetic diversity, which sustains the evolutionary potential of organisms in dynamic ecosystems. Genomics is a powerful tool for accurately estimating genetic diversity across genomes of species and populations.
Elena Buzan+13 more
wiley +1 more source
Abstract figure legend Both ATP synthase and adenine nucleotide translocator (ANT) play key roles in mediating the permeability transition. The contribution of ANT becomes evident in the presence of atractylate (ATR) at pH 6.5, a condition that prevents ATP synthase channel activity. At pH 7.4, this effect is minimal, suggesting a critical role for ATP
Ludovica Tommasin+7 more
wiley +1 more source
Abstract figure legend A pre‐existing fibroblast signalling model was enhanced by integrating atrial‐specific components and reactions linked to atrial fibrosis and atrial fibrillation (AF). The analysis highlights the central role of Ca2⁺ signalling in driving profibrotic responses to AF‐relevant stimuli, angiotensin‐II and transforming growth factor ...
Najme Khorasani+5 more
wiley +1 more source
ABSTRACT This work addresses the problem of developing a nonfragile sliding mode observer for fractional‐order complex networked systems (FO‐CNS) under stochastic network attacks. The proposed approach employs a combination of event‐triggered techniques. First, a nonfragile fractional‐order state observer is developed, enabling the design of a suitable
Xin Meng+2 more
wiley +1 more source
Abstract There has been a notable increase in bibliometric research studying gender in academia. This narrative review aims to organize and synthesize this extensive body of work to uncover new insights into gender disparities in science. We begin by analyzing key methodological elements, including gender assignment techniques, units of analysis, and ...
Elvira González‐Salmón+2 more
wiley +1 more source
Integration of Physics‐Based and Data‐Driven Approaches for Landslide Susceptibility Assessment
ABSTRACT Rainfall‐triggered landslides pose a significant threat to communities and infrastructure around the world. Various data‐driven and machine learning (ML) based algorithms have been applied to assess landslide susceptibility. However, purely data‐driven methods are affected by issues such as uncertainty in the selection of landslide ...
Yi Han, Shabnam J. Semnani
wiley +1 more source
Automated Risk‐Based Cryptoperiod Calculation in ICSs: Analytical Framework and Software Tool
ABSTRACT Internal network and system reconnaissance is one of the first crucial stages of most cyber attacks, though it plays an especially important role in attacks on complex industrial control systems (ICSs) that span both IT and OT environments. Frequently, besides device enumeration and scanning, a malicious ICS reconnaissance campaign will also ...
Gabriele Cianfarani+2 more
wiley +1 more source