Results 41 to 50 of about 431,551 (305)

04-08-1980 Per Curiam [PDF]

open access: yes, 1980
The judgment of the Court of Appeals is vacated and the ease is remanded to that court for further proceedings in light of the decision of the Court announced today in the City of Mobile v. Bolden, ante, at.
Stewart, Potter
core   +1 more source

Organic Photoelectrochemical Cells Beyond Performance: Interface and Catalyst Engineering for Durability

open access: yesAdvanced Energy Materials, EarlyView.
Organic photoelectrochemical cells based on π‐conjugated semiconductors offer a versatile platform for solar fuel generation. This review outlines operating principles, device architectures, and key metrics, and highlights advances in p‐ and n‐type photoelectrodes, interfacial engineering, and catalyst integration.
Jaehyeong Kim   +8 more
wiley   +1 more source

Crossed Signals in a Wireless World: The Seventh Circuit’s Misapplication of the Complete Preemption Doctrine [PDF]

open access: yes, 2004
As the number of wireless telephone users continues to proliferate, so does the number of lawsuits against wireless service providers. While consumers seek to utilize various consumer-friendly state law causes of action, the wireless industry continues ...
Kleiman, Matthew J.
core   +1 more source

Do outgrower schemes enhance technology adoption and productivity? Evidence from maize farmers in Northern Ghana

open access: yesAgribusiness, EarlyView.
Abstract Nucleus outgrower schemes are contractual arrangements where well‐resourced large‐scale farmers (nucleus farmers) are empowered by development support agencies to take charge of smallholder farmers, by providing them with market access and the necessary training on agronomic practices and farm inputs for production.
Dominic Tasila Konja, Awudu Abdulai
wiley   +1 more source

Competition Order and Innovation Behaviors of Enterprise in China

open access: yesDiscrete Dynamics in Nature and Society, 2020
This study addresses the apparent puzzle that China made great progress in mobile phone manufacturing despite weak intellectual property protection.
Weijun Cui, Guang Chen, Yu Fu
doaj   +1 more source

A Review on Recent Trends of Bioinspired Soft Robotics: Actuators, Control Methods, Materials Selection, Sensors, Challenges, and Future Prospects

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
This article reviews the current state of bioinspired soft robotics. The article discusses soft actuators, soft sensors, materials selection, and control methods used in bioinspired soft robotics. It also highlights the challenges and future prospects of this field.
Abhirup Sarker   +2 more
wiley   +1 more source

Overcoming stumbling blocks of tobacco control in Bangladesh

open access: yesTobacco Induced Diseases, 2018
Background and challenges to implementation Tobacco leads to grave detriments on health. Bangladesh is among top ten countries of the world where tobacco use is most prevalent.
Sheikh Mohammad Mahbubus Sobhan   +4 more
doaj   +1 more source

Device‐Level Implementation of Reservoir Computing With Memristors

open access: yesAdvanced Intelligent Systems, EarlyView.
Reservoir computing (RC) is an emerging computing scheme that employs a reservoir and a single readout layer, which can be actualized in the nanoscale with memristors. As a comprehensive overview, the principles of RC and the switching mechanisms of memristors are discussed, followed by actual demonstrations of memristor‐based RC and the remaining ...
Sunbeom Park, Hyojung Kim, Ho Won Jang
wiley   +1 more source

Treating HPHD disorder—Shakespeare, law, and public life

open access: yesCogent Arts & Humanities, 2016
The serious play of the Shakespeare Moot Project—a graduate course at McGill University in Montreal that choreographed a cross-over genre involving students and faculty in both Law and Literary Studies—provides a space for creative thought about how to ...
Desmond Manderson, Paul Yachnin
doaj   +1 more source

Digital Forensics Investigation Approaches in Mitigating Cybercrimes: A Review

open access: yesJournal of Information Science Theory and Practice, 2023
Cybercrime is a significant threat to Internet users, involving crimes committed using computers or computer networks. The landscape of cyberspace presents a complex terrain, making the task of tracing the origins of sensitive data a formidable and often
Abdullahi Aminu Kazaure   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy