Results 61 to 70 of about 1,500,333 (340)

Trends and Insights in Arab Audit Research: A Bibliometric Exploration

open access: yesCanadian Journal of Administrative Sciences / Revue Canadienne des Sciences de l'Administration, EarlyView.
ABSTRACT This study employs bibliometric analysis to investigate audit research trends across five Arab countries—Jordan, Saudi Arabia, Egypt, Tunisia and the United Arab Emirates—each reflecting distinct sociopolitical, economic and legal contexts.
Zouhour Ben Hamadi, Peter Ghattas
wiley   +1 more source

A systematic approach for identifying drivers of critical safety and establishing their hierarchy

open access: yesThe Canadian Journal of Chemical Engineering, EarlyView.
Abstract Learning from incidents is a crucial step in preventing and mitigating adverse events. Incident databases offer valuable insights for safety management improvements by cause and contributing factors. However, extracting meaningful information from incident investigation reports poses a significant challenge. This study introduces a data‐driven
Mohammad Zaid Kamil   +2 more
wiley   +1 more source

A continuous 500‐year sediment record of inundation by local and distant tsunamis in South‐Central Chile (40.1°S)

open access: yesThe Depositional Record, EarlyView.
Tsunami events over the past 500 years inundated Laguna Gemela West (Chile), leading to distinct sandy deposits in the lake record. This provides a complete perspective on tsunami inundation, including giant tsunamis, small local tsunamis and tsunamis that originated >100 km away from the site.
Jasper Moernaut   +8 more
wiley   +1 more source

Infant Death due to Cannabis Ingestion

open access: yesDrug Testing and Analysis, EarlyView.
ABSTRACT A child died in the emergency room of a local hospital a few hours after ingesting a substance the color of cork and the consistency of earth. At home, a modest amount of resinous substance was found. At the hospital, the child exhibited alterations in walking, balance, and consciousness.
Donata Favretto   +9 more
wiley   +1 more source

A Distance-Encoded Bloom Filter for Fast NDN Name Lookup

open access: yesApplied Sciences
Named data networking (NDN) is a content-centric network architecture that requires efficient name lookup to forward packets based on hierarchical content names.
Junghwan Kim, Myeong-Cheol Ko
doaj   +1 more source

Accurate querying of frequent subgraphs in power grid graph data

open access: yesGlobal Energy Interconnection, 2019
With the development of information technology, the amount of power grid topology data has gradually increased. Therefore, accurate querying of this data has become particularly important. Several researchers have chosen different indexing methods in the
Aihua Zhou   +3 more
doaj   +1 more source

A Novel Improvement With an Effective Expansion to Enhance the MD5 Hash Function for Verification of a Secure E-Document

open access: yesIEEE Access, 2020
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage.
Ammar Mohammed Ali, Alaa Kadhim Farhan
doaj   +1 more source

IoT Technology as an Effective Strategy Enhances Food Authentication for Current Fresh Fruit Supply Chain

open access: yesFuture Postharvest and Food, EarlyView.
ABSTRACT With trade globalization, food fraud such as tampering, substituting, and falsifying, challenges human health and the management of food supply chain. As a food type that only processed at primary level, the authenticity of fruit supply information has become a guarantee for its edible safety.
Yiqin Zhang   +6 more
wiley   +1 more source

Optimize data-driven multi-agent simulation for COVID-19 transmission

open access: yesBMC Bioinformatics, 2022
Background Multi-Agent Simulation is an essential technique for exploring complex systems. In research of contagious diseases, it is widely exploited to analyze their spread mechanisms, especially for preventing COVID-19.
Chao Jin   +4 more
doaj   +1 more source

A Parallel Compact Hash Table

open access: yes, 2012
We present the first parallel compact hash table algorithm. It delivers high performance and scalability due to its dynamic region-based locking scheme with only a fraction of the memory requirements of a regular hash table.
Steven van der Vegt, Alfons Laarman
openaire   +3 more sources

Home - About - Disclaimer - Privacy