News

Salameh, E. and Yaseen, M. (2025) Structural Elements and Seismic Activity in Jordan and Its Levant Surroundings. Journal of ...
Xu, Q.Y. and Liu, C.Z. (2025) The Influence of Sino Japanese University PE on Students’ Overall Competence: A Sports Management Based Comparison. Open Access Library Journal, 12, 1-1. doi: ...
With the development of AI technologies, the sensitivity of lung cancer detection using LDCT has significantly improved. AI ...
Means, Vehicle Crashes, Dunn’s Partition Coefficient, Machine Learning Share and Cite: Abdulhafedh, A. (2025) Applying K-Means Clustering and Fuzzy C-Means Clustering in Vehicle Crashes. Open Access ...
Milk from small-scale dairy farms in Northern Ghana plays a vital role in food security and nutrition but remains highly ...
The Tunguska explosion occurred on June 30, 1908 over Siberia. It was a cosmic body explosion that was accompanied by an ...
Human-Robot Collaboration, Speed and Separation Monitoring, Safety Zones, Industrial Robot Share and Cite: Verschueren, G. , Noens, R. , Nica, W. , Accoto, D. and Juwet, M. (2025) Advancing ...
In this article, our focus lies on a Schrödinger equation incorporating a Hardy term. To identify the global minimizers of the functional I under a mass constraint, we ...
The Creation of English Classroom Teaching Environment. Open Access Library Journal, 12, 1-1. doi: 10.4236/oalib.1113324 . As educational ecology has received more and more attention in the field of ...
Fluid Bullying, Cyberbullying, Intelligent Virtual Assistant, Educational Environments, Artificial Intelligence, Conversational Design, Reporting Tool, School Violence Share and Cite: Romero, C. (2025 ...
Pattern of Tooth Wear Lesions and Associated Risk Factors among Adults in Port Harcourt. Journal of Biosciences and Medicines, 13, 75-85. doi: 10.4236/jbm.2025.134008 . The human teeth are composed ...
Enhancing Microsoft CyberBattleSim for Enterprise Cybersecurity Simulations. Journal of Information Security, 16, 270-282. doi: 10.4236/jis.2025.162014 . Quantifying the effectiveness of cyber defense ...