Results 41 to 50 of about 19,326 (124)

The Effectiveness of Interventions Addressing Conspiracy Beliefs: A Meta‐Analysis

open access: yesEuropean Journal of Social Psychology, Volume 56, Issue 1, Page 275-291, February 2026.
ABSTRACT Reducing conspiracy beliefs through effective interventions may help mitigate potential harmful consequences, such as vaccine hesitancy and prejudice. Therefore, a systematic literature search was conducted in Web of Science, PsycINFO, and Google Scholar for experiments testing interventions that could potentially reduce conspiracy beliefs ...
Lukasz Stasielowicz
wiley   +1 more source

Accelerated Carbon and Water Cycles in the Amazon and Congo Basins Revealed From TRENDY Models and Remote Sensing Products

open access: yesGlobal Biogeochemical Cycles, Volume 40, Issue 2, February 2026.
Abstract Tropical forests play a vital role in the global carbon cycle and land–atmosphere interactions. Estimating tropical forest carbon–water dynamics is challenging due to observational and modeling uncertainties. This study leverages the “Trends and drivers of the regional scale terrestrial sources and sinks of carbon dioxide” (TRENDY) project ...
Mingjie Shi   +7 more
wiley   +1 more source

A Systematic Review Investigating the Psychosocial Factors Influencing Initiation, Use and Subjective Experience of Performance and Image‐Enhancing Drugs in Women Who Weight‐Train

open access: yesDrug and Alcohol Review, Volume 45, Issue 2, February 2026.
ABSTRACT Issue Performance and image‐enhancing drug (PIED) use among women is a growing phenomenon, particularly within weight‐training populations. Despite increasing prevalence, research on the psychosocial factors involved in women's PIED use remains emergent and fragmented.
Hannah C. Schuurs   +3 more
wiley   +1 more source

A certificateless and KGA-secure searchable encryption scheme with constant trapdoors in smart city

open access: yesDigital Communications and Networks
Smart cities, as a typical application in the field of the Internet of Things, can combine cloud computing to realize the intelligent control of objects and process massive data.
Hongjun Li   +4 more
doaj   +1 more source

Intersections between ethics and diversity, equity, and inclusion in engineering practice: Insights from practitioners' mental models

open access: yesJournal of Engineering Education, Volume 115, Issue 1, January 2026.
Abstract Background Ethics and diversity, equity, and inclusion (DEI) are critical aspects of engineering, and connections between ethics/DEI are becoming increasingly common place in engineering education and practice. For example, many engineering professional organizations have integrated DEI into their codes of ethics.
Justin L. Hess   +2 more
wiley   +1 more source

Public-Key Encryption With Keyword Search via Obfuscation

open access: yesIEEE Access, 2019
Public-key encryption with keyword search (PEKS) enables users to search on encrypted data, which is applicable to the scenario of sharing data in the cloud storage. In this paper, we focus on how to construct a PEKS scheme via obfuscation.
Chengyu Hu   +3 more
doaj   +1 more source

Blockchain‐Enabled Privacy‐Preserving Access Control for EHRs Sharing With Optimized User and Attribute Revocation

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy‐preserving access control mechanisms. Ciphertext policy attribute‐based encryption (CP‐ABE) is a widely recognized solution for secure access control in outsourced data environments.
Khanadech Worapaluk   +2 more
wiley   +1 more source

AMRerank: A Framework for Library Migration Recommendations Using Multi‐Agent Analysis and Data‐Driven Reranking

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Open‐source libraries are indispensable for modern software development but can create substantial maintenance burdens when they become deprecated or unmaintained. Selecting an appropriate replacement among many candidates remains challenging, since methods relying only on historical mining or similarity metrics often miss subtle differences in meaning.
Jie Luo   +3 more
wiley   +1 more source

Safety and Efficacy of Eslicarbazepine Acetate in Children Diagnosed With a Focal Seizure Disorder: A Systematic Review and Meta‐Analysis

open access: yesBrain and Behavior, Volume 15, Issue 12, December 2025.
ABSTRACT Background Epilepsy can have a negative impact on cognitive and social functioning. Eslicarbazepine acetate (ESL) is used to treat focal seizures, although its safety and efficacy, particularly as an additional treatment, warrant more study.
Neha Bhagwan Das   +9 more
wiley   +1 more source

Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record [PDF]

open access: yesJournal of Internet Services and Information Security, 2016
In an e-Health scenario, we study how the practitioners are authorized when they are requesting access to medical documents containing sensitive information. Consider the following scenario. A clinician wants to access and retrieve a patient’s Electronic
Clémentine Gritti   +2 more
doaj  

Home - About - Disclaimer - Privacy