Results 91 to 100 of about 4,916,142 (279)
Semantic search engines are continuously beset by lexical vagueness, fuzzy mapping of intent, and computational inefficiency, typically leading to suboptimal recall and relevance.
V. Mageshwari, J. Shrijith
doaj +1 more source
The subject of the article is description of the reserves for improving the efficiency of teaching foreign language vocabulary. The identification of effective strategies for mastering new words and supporting elements used in this case has been carried ...
Оlga Klimkina
doaj +1 more source
Cognitive safety under epicranial cortex stimulation of the epileptic focus
Abstract Epicranial focal cortex stimulation (FCS) is a new CE‐certified treatment for pharmacoresistant focal epilepsy. In a multicenter observational trial, we report cognitive tolerability in 11 patients with pharmacoresistant epilepsy undergoing epicranial focal cortex stimulation (eFCS) over the predominant seizure focus (left temporal (N = 4 ...
Kathrin Wagner +10 more
wiley +1 more source
Authorship Identification is the task of identifying who wrote a given piece of text from a given set of candidate authors (suspects). The increasingly large volumes of texts on the Internet enhance the great yet urgent necessity for authorship ...
Kale Sunil Digamberrao, R. Prasad
semanticscholar +1 more source
Reflective Pathways: Integrating Empathy Into the STEM Student Experiences
ABSTRACT The growing demand for a globally competent STEM workforce showcases the importance of embedding empathy into undergraduate education. As a core dimension of global competence, empathy enables individuals to engage diverse perspectives and navigate collaborative challenges.
Aparajita Jaiswal +3 more
wiley +1 more source
Recreating relevance: translated Arabic idioms through a relevance theory lens
This study uses relevance theory as an insightful heuristic model for translation quality assessment. As translation inherently involves communicating across contextual boundaries, the notion of relevance optimization continues to be a fruitful approach ...
Raja Lahiani
doaj +1 more source
Phishing continues to pose a significant cybersecurity threat by deceiving users into disclosing sensitive information through maliciously crafted URLs.
Tirth Doshi +5 more
doaj +1 more source
Talent Management in SMEs: Unraveling the Role of Contextual Factors
ABSTRACT Employing a multiple case study analysis, this paper explores the contextual factors—internal, external, and relational—that affect small and medium‐sized enterprises (SMEs) in designing their approaches to talent management (TM). Results underscore the significance of two prominent internal variables—namely, organizational size and ownership ...
Franca Cantoni +2 more
wiley +1 more source
ABSTRACT Background The teaching of occlusal splint therapy in dental education is evolving with the integration of digital workflows. Although digital tools offer operational advantages, conventional methods remain pedagogically relevant. Understanding students’ perceptions of both approaches is essential for guiding curriculum innovation.
Marcelo José Palma‐Fernandes +6 more
wiley +1 more source
ABSTRACT Intravoxel incoherent motion (IVIM) MRI allows for simultaneous assessment of tissue microcirculation (perfusion) and diffusion of water. In single‐center studies, IVIM has shown great potential for diagnosis, treatment outcome prediction, and treatment monitoring for many different diseases and organs.
Eric E. Sigmund +23 more
wiley +1 more source

