This quantitative research draws attention to cybersecurity concerns through a lens of board independence and technical expertise, grounded in agency theory and resource-based theory, respectively. We...
The research investigates how data-driven recruitment methods can enhance South Sudan's unstable public sector through its study of the State Ministry of Labour in Eastern Equatoria, which faces ongoi...
Pairwise ranking systems based on Maximum Likelihood Estimation (MLE), such as the Bradley-Terry model, are widely used to aggregate preferences from pairwise comparisons. However, their robustness un...
The neutron–nucleus interaction in light few-body systems displays two longstanding anomalies unexplained by existing nuclear theory. First, the elastic scattering cross sections of 1H (20.4 b), 2H (3...
Alcohol use disorder (AUD) is a complex polygenic disease. Rodent models of alcohol dependence have been instrumental in modeling various aspects of dependence. Single-nucleus transcriptomics has enab...
The production of charmonium resonances in proton-proton collisions provides a unique labora tory for understanding quantum chromodynamics (QCD) at the interface of perturbative and non perturbative r...
Reducing the number of forwarding nodes is a primary objective in broadcast protocols for multi-hop wireless ad hoc networks, as excessive redundant transmissions lead to the broadcast storm problem. ...
In the high-accuracy numerical solution of the generalized Rosenau-KdV-RLW equation, the mismatch of the temporal and spatial accuracy orders often forces the calculation to adopt a fine grid to balan...
Gas leaks pose severe risks to human health and industrial safety. However, accurate and timely monitoring of gas leaks remains a major challenge. Existing vision-based methods using infrared (IR) ima...
Background In refugee settings, safe and private access to sanitation is often constrained by overcrowding and limited infrastructure. While coverage indicators such as toilet availability are often u...
SinoXiv