News
Salameh, E. and Yaseen, M. (2025) Structural Elements and Seismic Activity in Jordan and Its Levant Surroundings. Journal of ...
Xu, Q.Y. and Liu, C.Z. (2025) The Influence of Sino Japanese University PE on Students’ Overall Competence: A Sports Management Based Comparison. Open Access Library Journal, 12, 1-1. doi: ...
Means, Vehicle Crashes, Dunn’s Partition Coefficient, Machine Learning Share and Cite: Abdulhafedh, A. (2025) Applying K-Means Clustering and Fuzzy C-Means Clustering in Vehicle Crashes. Open Access ...
Milk from small-scale dairy farms in Northern Ghana plays a vital role in food security and nutrition but remains highly ...
The Tunguska explosion occurred on June 30, 1908 over Siberia. It was a cosmic body explosion that was accompanied by an ...
Shen, T. (2025) Research on the Design of Data Asset Valuation Platform Based on WEB. Open Access Library Journal, 12, 1-12. doi: 10.4236/oalib.1113225 .
Human-Robot Collaboration, Speed and Separation Monitoring, Safety Zones, Industrial Robot Share and Cite: Verschueren, G. , Noens, R. , Nica, W. , Accoto, D. and Juwet, M. (2025) Advancing ...
In this article, our focus lies on a Schrödinger equation incorporating a Hardy term. To identify the global minimizers of the functional I under a mass constraint, we ...
The Creation of English Classroom Teaching Environment. Open Access Library Journal, 12, 1-1. doi: 10.4236/oalib.1113324 . As educational ecology has received more and more attention in the field of ...
Designing an Intelligent Virtual Assistant for Preventing Bullying and Cyberbullying in Education ()
Fluid Bullying, Cyberbullying, Intelligent Virtual Assistant, Educational Environments, Artificial Intelligence, Conversational Design, Reporting Tool, School Violence Share and Cite: Romero, C. (2025 ...
Pattern of Tooth Wear Lesions and Associated Risk Factors among Adults in Port Harcourt. Journal of Biosciences and Medicines, 13, 75-85. doi: 10.4236/jbm.2025.134008 . The human teeth are composed ...
Enhancing Microsoft CyberBattleSim for Enterprise Cybersecurity Simulations. Journal of Information Security, 16, 270-282. doi: 10.4236/jis.2025.162014 . Quantifying the effectiveness of cyber defense ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results