Results 111 to 120 of about 2,629 (205)

Periumbilical Pain with Radiation to Both Legs Following Tarantula Bite; a Case Report

open access: yesEmergency, 2015
Tarantulas have recently become as pets in most parts of the world that increased the probability of encountering emergency physicians with patients hurt with these spiders. Their attacks usually do not cause general manifestation, however there are some
Mahboob Pouraghaei   +3 more
doaj  

Debunking war information disorder: A case study in assessing the use of multimedia verification tools

open access: yesJournal of the Association for Information Science and Technology, Volume 76, Issue 5, Page 752-769, May 2025.
Abstract This paper investigates the use of multimedia verification, in particular, computational tools and Open‐source Intelligence (OSINT) methods, for verifying online multimedia content in the context of the ongoing wars in Ukraine and Gaza. Our study examines the workflows and tools used by several fact‐checkers and journalists working at Faktisk,
Sohail Ahmed Khan   +6 more
wiley   +1 more source

SPIDER: Near-Optimal Non-Convex Optimization via Stochastic Path Integrated Differential Estimator [PDF]

open access: yesarXiv, 2018
In this paper, we propose a new technique named \textit{Stochastic Path-Integrated Differential EstimatoR} (SPIDER), which can be used to track many deterministic quantities of interest with significantly reduced computational cost. We apply SPIDER to two tasks, namely the stochastic first-order and zeroth-order methods.
arxiv  

Anglophone Literature in Bangladesh and Malaysia: Challenges and Prospects

open access: yesFuture Humanities, Volume 3, Issue 1, May 2025.
ABSTRACT This article focuses on the historical trajectory and development of Anglophone literature in Bangladesh and Malaysia—two predominantly Muslim countries and previously British colonies categorised as “Outer Circle” countries in Braj Kachru's model of English‐speaking communities.
Mohammad A. Quayum
wiley   +1 more source

Exercising Control When Confronted by a (Brownian) Spider [PDF]

open access: yesarXiv, 2016
We consider the Brownian "spider," a construct introduced in \cite{Dubins} and in \cite{Pitman}. In this note, the author proves the "spider" bounds by using the dynamic programming strategy of guessing the optimal reward function and subsequently establishing its optimality by proving its excessiveness.
arxiv  

Evidencing terror

open access: yesAmerican Ethnologist, Volume 52, Issue 2, Page 219-230, May 2025.
Abstract Since the 2016 attempted coup in Turkey, more than 215,000 people have been investigated for allegedly using ByLock, an encrypted‐message app. According to government officials and courts, the app was used exclusively by Fethullah Gülen's network, which the Turkish state classifies as a terrorist organization.
Onur Arslan
wiley   +1 more source

Spider networks [PDF]

open access: yesarXiv
In this investigation we study a family of networks, called spiders, which covers a range of networks going from chains to complete graphs. These spiders are characterized by three parameters: the number of nodes in the core, the number of legs at each core node, and the length of these legs.
arxiv  

The Erdös-Sós Conjecture for Spiders [PDF]

open access: yesarXiv, 2018
The Erd\"os-S\'os conjecture states that if $G$ is a graph with average degree more than $k-1$, then G contains every tree of $k$ edges. A spider is a tree with at most one vertex of degree more than 2. In this paper, we prove that Erd\"os-S\'os conjecture holds for all spiders.
arxiv  

Home - About - Disclaimer - Privacy