Search

Your search keyword '"Dadkhah, Mehdi"' showing total 110 results

Search Constraints

Start Over You searched for: Author "Dadkhah, Mehdi" Remove constraint Author: "Dadkhah, Mehdi" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
110 results on '"Dadkhah, Mehdi"'

Search Results

3. Masquerade of authority: hijacked journals are gaining more credibility than original ones.

4. Transitioning from net-zero to climate-positive supply chains.

5. Unveiling the Hidden Menace: A Topic Modeling Analysis of Hijacked Medical Journals.

8. Emerging and disruptive technologies and the sustainable development goals: A state of art and research agenda.

9. Diagnosis Unreliability of ChatGPT for Journal Evaluation.

13. A serious threat to publishing ethics and research integrity: Citations to hijacked journals.

14. Detection of fake papers in the era of artificial intelligence.

15. A Toolkit for Detecting Fallacious Calls for Papers from Potential Predatory Journals.

25. The full story of 90 hijacked journals from August 2011 to June 2015

29. Special issues as criterion for journal quality evaluation: Letter to editor

30. Jourchain: using blockchain to avoid questionable journals.

31. PedCheck: A Dashboard for Analyzing Social Media Posts about Predatory Journals.

32. Use of internet of things for chronic disease management: An overview.

34. Investigating the capabilities of information technologies to support policymaking in COVID‐19 crisis management; a systematic review and expert opinions.

35. What do Publications say about the Internet of Things Challenges/Barriers to uninformed Authors? A bibliometric Analysis.

36. What Do Websites Say about Internet of Things Challenges? A Text Mining Approach.

37. Investigating the Effect of Balcony Types on the Naturally-Ventilated Buildings.

38. Users’ Perception of Medical Blockchain.

39. The potential of business intelligence tools for expert finding.

40. Identity Theft in the Academic World Leads to Junk Science.

42. Information systems in journal management: the ugly duckling of academic publishing.

43. Correspondence.

45. Guidelines for selecting journals that avoid fraudulent practices in scholarly publishing.

46. Characteristics of Hijacked Journals and Predatory Publishers: Our Observations in the Academic World.

47. An approach for preventing the indexing of hijacked journal articles in scientific databases.

48. Ranking Predatory Journals: Solve the Problem Instead of Removing It!

50. Affiliation Oriented Journals: Don't Worry About Peer Review If You Have Good Affiliation.

Catalog

Books, media, physical & digital resources