Search

Results: 510
Contact line dynamics of gravity driven spreading of liquids
Abstract The spreading dynamics of the gravity-driven liquid motion on an inclined solid surface was studied by considering two fundamental physical models: the molecular kinetic...
Redefining E-Commerce Experience
Integrating virtual reality (VR) and augmented reality (AR) technology into online stores enables more immersive and engaging shopping experiences, which is crucial for businesses to succeed in today's competitive e-commerce...
The Meta-Fusion
Blockchain technology and the metaverse are revolutionizing digital experiences by merging secure, cryptographic systems with shared virtual spaces. These advancements have immense potential across various sectors, including...
Contact line dynamics of gravity driven spreading of liquids
Abstract The spreading dynamics of the gravity-driven liquid motion on an inclined solid surface was studied by considering two fundamental physical models: the molecular kinetic...
Contact line dynamics of gravity driven spreading of liquids
Abstract: The spreading dynamics of the gravity-driven liquid motion on an inclined solid surface was studied by considering two fundamental physical models: the molecular kinetic theory and the hydrodynamic theory (HDT). The...
Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis With Different Routing Protocols
The impending exhaustion of internet protocol (IP) version four (IPv4) addresses necessitates a transition to the more expansive IP version six (IPv6) protocol. However, this shift faces challenges due to the widespread legacy...
Next-Gen Phishing Defense Enhancing Detection With Machine Learning and Expert Whitelisting/Blacklisting
Machine learning has become ubiquitous across industries for its ability to uncover in- sights from data. This research explores the application of machine learning for identifying phishing websites. The efficiency of different...
Phishing Website Detection With Semantic Features Based on Machine Learning Classifiers
The phishing attack is one of the main cybersecurity threats in web phishing and spear phishing. Phishing websites continue to be a problem. One of the main contributions to our study was working and extracting the URL & Domain...
Machine Learning for Accurate Software Development Cost Estimation in Economically and Technically Limited Environments
Cost estimation for software development is crucial for project planning and management. Several regression models have been developed to predict software development costs, using historical datasets of previous projects....
Prevalence of Prediabetes and Undiagnosed Diabetes Among Kuwaiti Adults
PURPOSE: This study aimed to estimate the prevalence of prediabetes and undiagnosed type 2 diabetes mellitus (T2DM) according to fasting plasma glucose (FPG), 2-h plasma glucose (PG) during oral glucose tolerance test (OGTT)...
Analysis of Extraction Algorithm for Visual Navigation of Farm Robots Based on Dark Primary Colors
In order to quickly extract the visual navigation line of farmland robot, an extraction algorithm for dark primary agricultural machinery is proposed. The application of dark primary color principle in new farmland is made...
Linear Permanent Magnet Vernier Generators for Wave Energy Applications
Harvesting energy from waves as a substantial resource of renewable energy has attracted much attention in recent years. Linear permanent magnet vernier generators (LPMVGs) have been widely adopted in wave energy applications to...
Stochastic Inventory System With Different Rates of Production
This article analyzes a solitary item stochastic inventory model with two distinctive generation rates where a request pursues Poisson distribution and an item has a limited lifetime which is level dependent. It is expected that...
The Relationship Between Persuasion Cues and Idea Adoption in Virtual Crowdsourcing Communities
Mohammad Daradkeh
Jan 01, 2022
Building on the elaboration likelihood model (ELM) and absorptive capacity, this study develops a four-dimensional model of idea adoption in Virtual Crowdsourcing Communities (VCCs) and examines the influence of different...
Determinants of Electronic Library Resources Access in Saudi Arabia Higher Institutions
Bilal Al-khateeb
Jan 01, 2021
Electronic library resources are believed to be recent development in the world of internet. However, access to electronic library resources appears to be lacking, and thus has become a major issue of concern among electronic...
An Empirical Examination of the Relationship Between Data Storytelling Competency and Business Performance
Mohammad Daradkeh
Sep 01, 2021
With the proliferation of big data and business analytics practices, data storytelling has gained increasing importance as an effective means for communicating analytical insights to the target audience to support...
Learning Media Ethics in a Multicultural Context
The acquisition of sound media ethics competencies is a key learning outcome of media education. In a world marked by globalization and intercultural media engagements, students' possession of ethical competencies relevant to...
Literary Development during Sur Afghan Period
Saba Samreen Ansari
Dec 21, 2019
The Medieval India saw a great advancement in the progress of Indian language and literature. Persian and Arabic are the most important literary works of the Afghan period. Hindi literature also made a significant progress...
Analyzing Sentiments and Diffusion Characteristics of COVID-19 Vaccine Misinformation Topics in Social Media
Mohammad Daradkeh
Jul 01, 2022
This study presents a data analytics framework that aims to analyze topics and sentiments associated with COVID-19 vaccine misinformation in social media. A total of 40,359 tweets related to COVID-19 vaccination were collected...
Linear Permanent Magnet Vernier Generators for Wave Energy Applications
Harvesting energy from waves as a substantial resource of renewable energy has attracted much attention in recent years. Linear permanent magnet vernier generators (LPMVGs) have been widely adopted in wave energy applications to...
Characterizing the Capabilities of Internet of Things Analytics Through Taxonomy and Reference Architecture
Mohammad Daradkeh
Jan 01, 2022
The increasing prevalence of business cases utilizing internet of things (IoT) analytics, coupled with the diversity of IoT analytics platforms and their capabilities, poses an immense challenge for organizations seeking to make...
A Modified-Range Directional Measure for Assessing the Sustainability of Suppliers by DEA/UTASTAR
Sustainability in the supply chain means considering environmental, social, and economic practices. Conventional data envelopment analysis (DEA) models deal with desirable, discretionary, and nonnegative data. However, there...
A New Tsunami Hazard Assessment for Eastern Makran Subduction Zone by Considering Splay Faults and Applying Stochastic Modeling

Tsunami hazard imposed by possible rupture of splay faults is important as it may significantly intensify tsunami heights locally. The Makran Subduction Zone (MSZ) in the northwestern Indian Ocean can generate large thrust...

A New Tsunami Hazard Assessment for Eastern Makran Subduction Zone by Considering Splay Faults and Applying Stochastic Modeling

Tsunami hazard imposed by possible rupture of splay faults is important as it may significantly intensify tsunami heights locally. The Makran Subduction Zone (MSZ) in the northwestern Indian Ocean can generate large thrust...

|<

<

1

2

3

4

5

>

>|