Though our study does not delve deeply into this aspect, it opens a promising avenue for future research. Understanding this connection may require a comprehensive examination of multiple factors, such as the influence of the pre-factor a in Eq. (1). We hope that our findings may serve as ...
This paper presents an analysis of the major generic structures of empirical research articles (RAs), with a particular focus on disciplinary variation and the relationship between the adjacent sections in the introductory and concluding parts. The findings were derived from a close “manual” analysis...
However, not all sections in a research article are equally contributory or essential to determine its aptness to the journal under consideration. Here in this work, we investigate which sections in a manuscript are more significant to decide on its belongingness to the intended journal's scope....
Readers interested in other research areas with access to WebOfScience can compare results for researchers they are interested in on their own. Citations of Journals To create a benchmark, i picked a small set of journals that represent social and personality research. For each journal, I rec...
Some of the most important applications of nanofluids, which can be observed in numerous research studies and publications, include the following: heat exchangers with different configurations (such as shell and tube, finned tube, double pipe, etc.)3, various types of sun-based systems (especially...
Recent research interest has focused on the impact of the room sharing business model on housing markets. However, existing empirical evidence is limited and exclusively focuses on few large cities in the U.S. This study examines the effects of Airbnb on housing rental and sales prices using a...
Offensive security is a sub-field of security research that tests security measures from an adversary or competitor’s perspective. It can employ ethical hackers to probe a system for vulnerabilities (Hackerone 2021; Mike 2021). Automatic exploit generation (AEG), an offensive security technique, ...
Examples include DIP [4], BioCyc [5], MIPS [6], and MetNet [7], which is the database and toolbox project associated with the present work. Such databases can be based on laboratory research results, like MIPS and KEGG. Alternatively they can be manually curated from biomedical ...
Some illustrative numerical examples are given along with a summary of open research issues for EL with dependent data. View article A review of empirical likelihood methods for time series Daniel J. Nordman, Soumendra N. Lahiri, in Journal of Statistical Planning and Inference, 2014 2 Empirical...
1 While commercialisation implies an academic invention is exploited so as to reap financial rewards, academic engagement encompasses a broader set of activities and is pursued for manifold objectives, such as to access resources relevant for research activities via additional funds and specialised ...