Results 71 to 80 of about 617,080 (246)

Breaking Down Online and Digital Reporting Practices: A Research Map From Websites to Social Media

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT This paper adopts a mixed research methodology, integrating bibliometric and systematic literature review (SLR) tools, to systematise the academic contributions and the different bodies of knowledge generated over the last decades on online and digital reporting practices, ranging from websites to social media.
Giuseppe Nicolò   +3 more
wiley   +1 more source

Political and non- political actors in the 2014 presidential election campaign

open access: yesSfera Politicii, 2015
The fall 2014 Romanian presidential elections have shown the involvement in the electoral campaign of all influential factors, parties, the church, intelligence agencies and citizens, thus the result of the vote was unpredictable till the moment it was ...
Florin Grecu
doaj  

Effect of Reaction Time and Temperature on the Impurity Profile of Amphetamine in the Leuckart Method

open access: yesDrug Testing and Analysis, EarlyView.
This study investigates the effect of the reaction temperature (step 1) and reaction time (step 1 and 2) on the conversion efficiency and impurity profile of amphetamine synthesized via the Leuckart method. Conversion efficiency and impurity profile were assessed using gas chromatography–flame ionization detection (GC–FID) and GC–mass spectrometry (GC ...
Maartje C. M. Verhoeven   +7 more
wiley   +1 more source

Insulating Universal Human Rights from the ‘Ethical Foreign Policy’ Threat [PDF]

open access: yes, 2014
At the heart of the notion of an ethical foreign policy is the assumption that foreign policy can help deliver liberty and security around the globe. Yet, as Conor Gearty has argued, in our contemporary ‘neo-democratic’ world, liberty and security are ...
Blakeley, Ruth, Raphael, Sam
core  

Checking and Enforcing Security through Opacity in Healthcare Applications

open access: yes, 2017
The Internet of Things (IoT) is a paradigm that can tremendously revolutionize health care thus benefiting both hospitals, doctors and patients. In this context, protecting the IoT in health care against interference, including service attacks and ...
A Bourouis   +8 more
core   +1 more source

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

An assessment of stress and production rate of sucker rod heat pipes in oil well pumping system

open access: yesDeep Underground Science and Engineering, EarlyView.
The sucker rod pumping system is the preferred oil extraction technique. The concept about equipping the hollow vacuum space in solid sucker rods with heat pipe has been scrutinized in terms of stress and oil production evaluation. Abstract The implementation of the heat pipe concept in sucker rods for oil pumping systems negates the requirement for an
R. S. Anand   +5 more
wiley   +1 more source

Repatriation from Lithuania SSR in 1956–1959 and Poland secret services.

open access: yesGenocidas ir Rezistencija, 2010
In the mid-1950s, following successful negotiations between the authorities of the People's Republic of Poland and the leadership of the Soviet Union, the process of repatriation from the USSR to the PRP was renewed.
Vitalija Stravinskienė
doaj   +1 more source

Security and Privacy Issues in Wireless Mesh Networks: A Survey

open access: yes, 2013
This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different ...
A. Gupta   +73 more
core   +1 more source

Semi‐analytical solution for the stability of deep vertical shaft considering time‐dependent rock‐structure interaction

open access: yesDeep Underground Science and Engineering, EarlyView.
A novel cavity contraction solution and multilayer shaft wall model were developed to analyze deep shaft stability, considering rock viscosity, support structures, and water pressure, with successful validation through a Hulusu Coal Mine case study.
Bin Chen   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy