Results 161 to 170 of about 6,908 (279)

Religious‐Tailoring of Mental Health Services in Ontario: A Qualitative Study Exploring Service User and Provider Recommendations

open access: yesJournal of Community Psychology, Volume 53, Issue 7, September 2025.
ABSTRACT Aims This study aimed to explore the experiences of Muslim mental health service users and providers in Ontario, Canada. With a focus on understanding mental health service barriers and facilitators, the research also sought to identify service user and provider recommendations and highlight the capacity for addressing gaps within service ...
Syed Faruk   +2 more
wiley   +1 more source

Random Access Protocol with Channel Oracle Enabled by a Reconfigurable Intelligent Surface

open access: green, 2022
Victor Croisfelt   +5 more
openalex   +2 more sources

Picking Operations in Warehouses With Dynamically Arriving Orders: How Good is Reoptimization?

open access: yesNetworks, Volume 86, Issue 2, Page 157-173, September 2025.
ABSTRACT E‐commerce operations are essentially online, with customer orders arriving dynamically. However, very little is known about the performance of online policies for warehousing with respect to optimality, particularly for order picking and batching operations, which constitute a substantial portion of the total operating costs in warehouses. We
Catherine Lorenz   +2 more
wiley   +1 more source

Simon's Algorithm in the NISQ Cloud. [PDF]

open access: yesEntropy (Basel)
Robertson R   +3 more
europepmc   +1 more source

Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles

open access: bronze, 2008
Mihir Bellare   +3 more
openalex   +1 more source

Adaptive Online Learning Approaches for Detecting Unknown Attacks in Network Traffic: A Systematic Literature Review

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 5, September/October 2025.
ABSTRACT The increasing complexity and frequency of cyberattacks present significant challenges to Intrusion Detection Systems (IDS), mainly unknown (zero‐day) attacks. IDS are essential for safeguarding networks, but traditional systems struggle to detect unknown threats in dynamic and evolving network environments due to their reliance on predefined ...
Daniel Mourão Martins   +2 more
wiley   +1 more source

Environmental and human factors shape the trophic ecology of a widespread marine predator

open access: yesJournal of Animal Ecology, Volume 94, Issue 9, Page 1784-1799, September 2025.
Our study reveals how environmental factors and fishing pressure influence swordfish diet, highlighting trophic shifts under future climate scenarios. We provide a novel framework to strengthen our ability to plan for and manage the redistribution of species under global change ensuring that the energetic needs of predators are met.
Elena Fernández‐Corredor   +7 more
wiley   +1 more source

Knowledge graph-aided Bayesian active learning for top-K genetic interaction discovery. [PDF]

open access: yesSci Rep
Soper B   +7 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy