Search

Your search keyword '"Dadkhah, Mehdi"' showing total 37 results

Search Constraints

Start Over You searched for: Author "Dadkhah, Mehdi" Remove constraint Author: "Dadkhah, Mehdi"
37 results on '"Dadkhah, Mehdi"'

Search Results

1. Emerging and disruptive technologies and the sustainable development goals: A state of art and research agenda.

2. Diagnosis Unreliability of ChatGPT for Journal Evaluation.

3. A serious threat to publishing ethics and research integrity: Citations to hijacked journals.

4. Detection of fake papers in the era of artificial intelligence.

5. A Toolkit for Detecting Fallacious Calls for Papers from Potential Predatory Journals.

7. How Frequent is the Use of Misleading Metrics? A Case Study of Business Journals.

8. Ten (Bad) reasons researchers publish their papers in hijacked journals.

9. PedCheck: A Dashboard for Analyzing Social Media Posts about Predatory Journals.

10. Use of internet of things for chronic disease management: An overview.

12. Investigating the capabilities of information technologies to support policymaking in COVID‐19 crisis management; a systematic review and expert opinions.

13. What do Publications say about the Internet of Things Challenges/Barriers to uninformed Authors? A bibliometric Analysis.

14. What Do Websites Say about Internet of Things Challenges? A Text Mining Approach.

15. The effects of flow separation on a lambda wing aerodynamics.

16. Users’ Perception of Medical Blockchain.

17. Fast Optimization of Tuned Mass-Spring Arrangement for Reduction of Acoustic Power Radiation of Submerged Ribbed Cylinder.

18. A Method for Improving the Integrity of Peer Review.

19. Academic Information Security Researchers: Hackers or Specialists?

20. Identity Theft in the Academic World Leads to Junk Science.

21. Do You Ignore Information Security in Your Journal Website?

22. Academic Journals Plagued by Bogus Impact Factors.

23. Current and potential cyber attacks on medical journals; guidelines for improving security.

24. Information systems in journal management: the ugly duckling of academic publishing.

25. Fraud in Academic Publishing: Researchers Under Cyber-Attacks.

26. Hijacked journals, hijacked web-sites, journal phishing, misleading metrics, and predatory publishing: actual and potential threats to academic integrity and publishing ethics.

27. Characteristics of Hijacked Journals and Predatory Publishers: Our Observations in the Academic World.

28. Scientific Information Security in Information Science and Academic Publishing.

29. An approach for preventing the indexing of hijacked journal articles in scientific databases.

30. Ranking Predatory Journals: Solve the Problem Instead of Removing It!

31. An Introduction to Journal Phishings and Their Detection Approach.

32. New types of fraud in the academic world by cyber criminals.

36. Predatory Practices Are Increasing Among Some Open Access Medical and Biological Journals.

37. Detecting Hijacked Journals by Using Classification Algorithms.

Catalog

Books, media, physical & digital resources