Results 81 to 90 of about 18,529,160 (216)

“I'm all there for her”: Perspectives of Arab mothers in Israel on mother–daughter relationships in young adulthood

open access: yesFamily Relations, EarlyView.
Abstract Objective This study aimed to explore how Arab mothers in Israel perceive their intergenerational relationships with young adult daughters within the sociocultural context of Arab society and their intersecting marginalized positions as women and ethnic minority members.
Haneen Karram‐Elias
wiley   +1 more source

Flood risk assessment in data-scarce South Sudan using a flood modeling framework

open access: yesJournal of Hydrology: Regional Studies
Study area: Wetlands of South Sudan Study focus: In recent years, South Sudan has faced escalating flood impacts, exacerbated by a lack of comprehensive hydrological data and modeling tools. This study addresses this critical gap by developing a national
Tianyan Zhang   +10 more
doaj   +1 more source

Do Large-Scale Inhomogeneities Explain Away Dark Energy?

open access: yes, 2005
Recently, new arguments (astro-ph/0501152, hep-th/0503117) for how corrections from super-Hubble modes can explain the present-day acceleration of the universe have appeared in the literature.
Daniel J. H. Chung   +5 more
core   +1 more source

How Violence Shapes Place: The Rise of Neo‐Authoritarianism in the Global Value Chain and the Emergence of an ‘Infernal Place’ in the Bangladesh Garment Industry

open access: yesJournal of Management Studies, EarlyView.
Abstract This article examines how and to what extent violence has become a pivotal tool for conducting business in places integrated into the global value chain. It also explores the roles stakeholders play in silencing workers' resistance within these places.
Shoaib Ahmed
wiley   +1 more source

An Exploratory Study on Human-Centric Video Anomaly Detection through Variational Autoencoders and Trajectory Prediction [PDF]

open access: yes2024 IEEE/CVF Winter Conference on Applications of Computer Vision Workshops (WACVW)
Video Anomaly Detection (VAD) represents a challenging and prominent research task within computer vision. In recent years, Pose-based Video Anomaly Detection (PAD) has drawn considerable attention from the research community due to several inherent ...
Ghazal Alinezhad Noghre   +2 more
semanticscholar   +1 more source

Zirconia, titanium, and polyetheretherketone implant abutments show equal long‐term clinical success—A systematic review and network meta‐analysis

open access: yesPeriodontology 2000, EarlyView.
Abstract Hundreds of millions of people have one or more missing teeth. Consequently, a substantial number of patients undergo implant therapy each year. However, technical complications and soft tissue inflammation associated with the implant abutment or the type of restoration can lead to bone loss and, ultimately, implant failure.
Yasir Nabeel Al‐Mohammad   +13 more
wiley   +1 more source

Analyzing the Dialogue Between Text and Audience in Rumi’s Ghazals Based on Gadamer’s Theory [PDF]

open access: yesMatn/Pizhūhī-i Adabī
Gadamer's hermeneutics is fundamentally tied to the concept of dialogue. He argues that without genuine dialogue, meaningful communication between text and reader cannot occur, making interpretation impossible.
Sharafat Naseri   +3 more
doaj   +1 more source

Innovative Nanomaterial‐Based Approaches for the Recognition of Amphetamine in Attention Deficit Hyperactivity Disorder Management

open access: yesAnalytical Science Advances, Volume 7, Issue 1, June 2026.
ABSTRACT The rising incidence of amphetamine misuse, particularly in the context of attention deficit hyperactivity disorder treatment, underscores the urgent need for sensitive and effective detection methods. This review examines innovative nanomaterial‐based approaches for AMP detection, emphasizing their advantages over conventional analytical ...
Ilghar Zeinaly   +5 more
wiley   +1 more source

A Critical Review of Artificial Intelligence Based Approaches in Intrusion Detection: A Comprehensive Analysis

open access: yesJurnal Engineering
Intrusion detection (ID) is critical in securing computer networks against various malicious attacks. Recent advancements in machine learning (ML), deep learning (DL), federated learning (FL), and explainable artificial intelligence (XAI) have drawn ...
Salman Muneer   +5 more
semanticscholar   +1 more source

The color of transformation: Investigations into heat treatment of Natufian artifacts from Hayonim Terrace (Israel) [PDF]

open access: yes, 2016
In the Natufian lithic component at Hayonim, both in the cave and the terrace, numerous artifacts of pink/red color may be recognized. Cherts with similar appearance are not present in the geological environment surrounding the site in Northern Israel ...
Delage, C, Sunseri, JU
core   +1 more source

Home - About - Disclaimer - Privacy