Results 61 to 70 of about 1,500,333 (340)
Trends and Insights in Arab Audit Research: A Bibliometric Exploration
ABSTRACT This study employs bibliometric analysis to investigate audit research trends across five Arab countries—Jordan, Saudi Arabia, Egypt, Tunisia and the United Arab Emirates—each reflecting distinct sociopolitical, economic and legal contexts.
Zouhour Ben Hamadi, Peter Ghattas
wiley +1 more source
A systematic approach for identifying drivers of critical safety and establishing their hierarchy
Abstract Learning from incidents is a crucial step in preventing and mitigating adverse events. Incident databases offer valuable insights for safety management improvements by cause and contributing factors. However, extracting meaningful information from incident investigation reports poses a significant challenge. This study introduces a data‐driven
Mohammad Zaid Kamil+2 more
wiley +1 more source
Tsunami events over the past 500 years inundated Laguna Gemela West (Chile), leading to distinct sandy deposits in the lake record. This provides a complete perspective on tsunami inundation, including giant tsunamis, small local tsunamis and tsunamis that originated >100 km away from the site.
Jasper Moernaut+8 more
wiley +1 more source
Infant Death due to Cannabis Ingestion
ABSTRACT A child died in the emergency room of a local hospital a few hours after ingesting a substance the color of cork and the consistency of earth. At home, a modest amount of resinous substance was found. At the hospital, the child exhibited alterations in walking, balance, and consciousness.
Donata Favretto+9 more
wiley +1 more source
A Distance-Encoded Bloom Filter for Fast NDN Name Lookup
Named data networking (NDN) is a content-centric network architecture that requires efficient name lookup to forward packets based on hierarchical content names.
Junghwan Kim, Myeong-Cheol Ko
doaj +1 more source
Accurate querying of frequent subgraphs in power grid graph data
With the development of information technology, the amount of power grid topology data has gradually increased. Therefore, accurate querying of this data has become particularly important. Several researchers have chosen different indexing methods in the
Aihua Zhou+3 more
doaj +1 more source
MD5 is a one-way cryptographic function used in various fields for maintaining data integrity. The application of a Hash function can provide much protection and privacy and subsequently reduce data usage.
Ammar Mohammed Ali, Alaa Kadhim Farhan
doaj +1 more source
ABSTRACT With trade globalization, food fraud such as tampering, substituting, and falsifying, challenges human health and the management of food supply chain. As a food type that only processed at primary level, the authenticity of fruit supply information has become a guarantee for its edible safety.
Yiqin Zhang+6 more
wiley +1 more source
Optimize data-driven multi-agent simulation for COVID-19 transmission
Background Multi-Agent Simulation is an essential technique for exploring complex systems. In research of contagious diseases, it is widely exploited to analyze their spread mechanisms, especially for preventing COVID-19.
Chao Jin+4 more
doaj +1 more source
We present the first parallel compact hash table algorithm. It delivers high performance and scalability due to its dynamic region-based locking scheme with only a fraction of the memory requirements of a regular hash table.
Steven van der Vegt, Alfons Laarman
openaire +3 more sources