Cyber Threat Intelligence, Common Vulnerabilities and Exposures, Geodata, Land Administration Systems, Risk Assessment, Spatial Cadastral Data Share and Cite: Blin, P. , Aditya, T. , Santosa, P. and ...
Share and Cite: Hinz, B. and Kenyon, J. (2025) Getting to a Diagnosis: A Rare Case of TFE3 Translocation Renal Cell Carcinoma ...
A multi-dimensional mathematical theory applied to texts belonging to the classical Greek Literature spanning eight centuries ...
Bychkov, S. (2025) The Scientific Impotence of Modern Seismology. Causes of Decline and Necessary Measures for the Revival of ...
Harnessing Artificial Intelligence for Global Health Advancement. Journal of Data Analysis and Information Processing, 13, 66 ...
Miglia, De Portago, History of MMS, Capocaccia-Casci-Funaioli Share and Cite: Cocconcelli, M. (2025) The ...
Adolphi, C. and Sosonkina, M. (2025) Machine Learning and Simulation Techniques for Detecting Buoy Types from LiDAR Data.
At the end of the 14 th century there were two types of mill in the Netherlands: the post mill, which was a ground winder, ...
Quality management can evidently generate improvements in quality. However, receiving criticism and the pressure to make ...
Pungulescu, C. (2025) Semantic Diversification in Equity Portfolios. Theoretical Economics Letters, 15, 187-198. doi: 10.4236 ...
Zhu, Q. (2025) The Art of “Silence” in Interpersonal Communication. Open Journal of Modern Linguistics, 15, 69-77. doi: 10.4236/ojml.2025.151005 .
1 Centre for Food, Food Security and Nutrition Research, Laboratory of Epidemiology, Institute of Medical Research and Medicinal Plants Studies, Ministry of Scientific Research and Innovation, Yaoundé ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results