Discovery Logo
Sign In
Paper
Search Paper
Cancel
Pricing Sign In
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Chat PDF iconChat PDF Star Left icon
  • Citation Generator iconCitation Generator
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link
  • Paperpal iconPaperpal
    External link
  • Mind the Graph iconMind the Graph
    External link
  • Journal Finder iconJournal Finder
    External link
Discovery Logo menuClose menu
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Chat PDF iconChat PDF Star Left icon
  • Citation Generator iconCitation Generator
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link
  • Paperpal iconPaperpal
    External link
  • Mind the Graph iconMind the Graph
    External link
  • Journal Finder iconJournal Finder
    External link

Related Topics

  • Internet Chat
  • Internet Chat
  • Instant Messaging
  • Instant Messaging
  • Chat Messages
  • Chat Messages

Articles published on Internet Relay Chat

Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
133 Search results
Sort by
Recency
  • Open Access Icon
  • PDF Download Icon
  • Research Article
  • Cite Count Icon 1
  • 10.32996/ijels.2023.5.2.8
A Pragmatic Study of Turn Taking and Adjacency Pairs in Online Conversations
  • May 22, 2023
  • International Journal of English Language Studies
  • Salih Mahdi Adai Al-Mamoory + 1 more

This study tries to investigate one type of synchronous online communication, which is Internet Relay Chat, in terms of conversational analysis, particularly turn-taking and adjacency pairs. Synchronous online communication can be viewed as a novel medium that combines spoken, written and electronic properties. There may be a direct causal link between the lack of coherence in synchronous online communication and its propensity for language play that leads to the conversational analysis of synchronous online communication, which is associated with a reduction of coherence, disruption of turn adjacency and phantom turn adjacency. In synchronous online communication, there is a difficulty in interpreting messages in their sequential context that arises from the fact that turn sequencing is partly user-controlled and partly system-controlled. This leads to disrupted turn-taking and adjacency pairs as other stands of conversation get inserted between their parts.

  • Open Access Icon
  • PDF Download Icon
  • Research Article
  • 10.32996/ijllt.2022.5.12.20
Stylistic Features of Internet Relay Chat IRC as a Medium of Computer-Mediated Communication
  • Dec 18, 2022
  • International Journal of Linguistics, Literature and Translation
  • Hussain Hameed Mayuuf + 1 more

This study is a quantitative-qualitative, descriptive study in one of the mediums of computer-mediated communication, CMC. It attempts to investigate some stylistic features in the medium of Internet Relay Chat IRC that are used by online chatters. The data of this study are gathered from open access chatrooms through screen shots. The number of screen shots that are used in the analyses is (30) screen shots. The findings reveal that chat systems allow chatters to use different stylistic features such as graphic features, orthographic features, discourse features, flaming, spamming, spoofing, trolling, and lurking. The most frequent features are orthographic features such as “abbreviation, acronyms and punctuation”. These features are widely used in internet relay chat to save time, effort and as economy expressions.

  • Open Access Icon
  • Research Article
  • 10.18090/samriddhi.v14spli02.19
Research on Social Media Past, Present and Future: A Case Study
  • Jun 30, 2022
  • SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology
  • Abhijit Banubakode + 1 more

Social Computing is historically rooted in the concept of the 1940s Bush’s Memex; which also led to the advent of hypertext and consequently the World Wide Web. The journey from the 1940s to the present, where social computing is all-encompassing and pervasive, has seen a global shift in our perspective. It has moved from recognizing initially that computers can be used for communication, not just computation to text-based social interactions (bulletin board systems, Usenet, Internet Relay Chat, MUD games) and further to dynamic social interactions with content generation, feedback and more advanced HCI mediums. Research in this field is far and wide as it belongs to several theoretical disciplines, uses various technological infrastructures and has innumerable applications. To name a few areas where social computing is used – creation of Web 2.0 and tools, Entertainment software, Business sector and Forecasting. The thrust is essentially moving towards social intelligence now. The aim of this chapter is to understand the foundation of Social Computing; the present direction and to earmark possible research areas in the future.

  • Open Access Icon
  • Research Article
  • 10.55041/ijsrem12419
DATA SECURITY APPROACH ON CYBERCRIME USING WEB VULNERABILITY
  • May 7, 2022
  • INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
  • P Velmurugadass

Internet could be a major supply of spreading terrorist act through speeches and videos. Terrorist organizations use net particularly social networks to brain wash people and promote terrorist activities through provocative websites that inspire helpless individuals to affix terrorist organizations. Therefore, here we have a tendency to propose Associate in Nursing economical net data processing system to observe such net properties and flag them mechanically for human review. websites are created from hypertext mark-up language (Hypertext markup language). In numerous arrangements and have pictures, texts etc., intermixed on a single website. Here, we have a tendency to used data processing further as net mining to observe patterns and mine out matter info on websites. Here, we have a tendency to are victimization E-mail System to observe the unwanted messages that are additional prone to terrorist act and can send to the spam on to the recipient who is victimization the system. Despite the speedy increase of cyber threats, there has still been very little analysis into the foundations of the topic or methodologies that would serve to guide info systems researchers and practitioners UN agency touch upon cybersecurity. additionally, very little is thought regarding crime- as-a-service (CaaS), a criminal business model that underpins the crime underground. This analysis gap and also the sensible cybercrime issues we have a tendency to face have impelled North American nation to research the crime underground economy by taking an information analytics approach from a style science perspective. to realize this goal, we: (1) propose a data analysis framework for analyzing the crime underground; (2) propose CaaS and crimeware definitions; (3) propose Associate in Nursing associated classification model, Associate in Nursingd (4) develop an example application to demonstrate however the planned framework and classification model might be enforced in apply. We then use this application to research the crime underground economy by analyzing an oversized knowledge set obtained from the net hacking community. By taking a style science analysis approach, this paper contributes to the planning of the email phishing in the area of cybercrime and the area is to fulfill the data security to the email messages consisting the data and providing them the security using the naïve bayes to planning the International Journal of Scientific Research in Engineering and Management (IJSREM) Volume: 06 Issue: 05 | May - 2022 Impact Factor: 7.185 ISSN: 2582-3930 © 2022, IJSREM | www.ijsrem.com DOI: 10.55041/IJSREM12419 | Page 2 industries will harden attacks by the crime underground. Among these, one of the attack is the email phishing. Keywords: CAAS (Crimeware-as-a-Service), ICMP (Internet Control Message Protocol), IRC (Internet Relay Chat), MIB (Management Information Base), CVE (Common Vulnerabilities and Exposures).

  • Open Access Icon
  • Research Article
  • 10.29210/07essr156000
Development of “AMICO” website as a media of non-judgemental expression for youth
  • Apr 18, 2022
  • Education and Social Sciences Review
  • Skolastika Hapsari + 3 more

<span id="docs-internal-guid-eed4d6f8-7fff-4a7d-35d4-9ba500c2d575"><span>Everyone has problems and complaints that they faces. However, not everyone can easily share their complaints and feelings with others because of various factors that bother them. AMICO is an interactive website that the author created to help those who want to share their problems and even their works in a forum that allows anonymity. This study aims to see how much young people are interested in using AMICO and the impression they give after using AMICO. In this study using a quantitative approach and using the method of action. Data retrieval was carried out using a Google Form containing questions about the Amico website itself, both from the features provided, the design used, and others. The distribution of Google Forms is carried out via Internet Relay Chat (WhatsApp) and social media (Instagram). The number of respondents was 35 people with an age range of 15 to 25 years. The results showed that most of the testees considered the AMICO website to be innovative and Amico is a good medium of sharing their issues and their works.</span></span>

  • Open Access Icon
  • Research Article
  • Cite Count Icon 18
  • 10.1016/j.chb.2022.107211
Sharing emotion while spectating video game play: Exploring Twitch users' emotional change after the outbreak of the COVID-19 pandemic
  • Jan 31, 2022
  • Computers in Human Behavior
  • Seung Woo Chae + 1 more

Sharing emotion while spectating video game play: Exploring Twitch users' emotional change after the outbreak of the COVID-19 pandemic

  • Open Access Icon
  • Research Article
  • Cite Count Icon 3
  • 10.5204/mcj.1864
Familiars in a Strange Land
  • Nov 14, 2021
  • M/C Journal
  • Cynthia Campbell + 1 more

Familiars in a Strange Land

  • Research Article
  • 10.22501/jss.1233710
ANTIVIRUS !Make some domestic noise! on ∏ Node Part II
  • May 2, 2021
  • Journal of Sonic Studies
  • Sarah Brown And Valentina Vuksic + 1 more

!Make Some Domestic Noise! was a series of collective online performances that took place during the first COVID-19 lockdown. They featured what might be described as an online domestic noise big band. As everyone was isolated at home, the ∏ Node collective launched the Antivirus program to train people on how to join and contribute their own stream and sounds. Being alone at home can be stressful, but it can also reveal the beauty of everyday noises. On a weekly basis, people were invited by email to participate by playing with the noises of their domestic appliances and live stream the results. These separate audio streams were then mixed in real time and sent to the main output stream. This was enabled by the ∏ Node site structure, which provides a volume control for every active stream. The website also has an Internet Relay Chat through which participants can, and did, directly interact.

  • Open Access Icon
  • Research Article
  • Cite Count Icon 11
  • 10.1145/3409455
An Ensemble of Ensembles Approach to Author Attribution for Internet Relay Chat Forensics
  • Oct 15, 2020
  • ACM Transactions on Management Information Systems
  • Sicong Shao + 3 more

With the advances in Internet technologies and services, social media has been gained extreme popularity, especially because these technologies provide potential anonymity, which in turn harbors hacker discussion forums, underground markets, dark web, and so on. Internet relay chat (IRC) is a real-time communication protocol actively used by cybercriminals for hacking, cracking, and carding. Hence, it is particularly urgent to identify the authors of threat messages and malicious activities in IRC. Unfortunately, author identification studies in IRC remain as an underexplored area. In this research, we perform novel IRC text feature extraction methods and propose the first author attribution version of the deep forest (DF) model that is an ensemble of ensembles that utilizes the fusion of ensemble learning techniques. Our approach is supported by autonomic IRC monitoring. Experiments show that our approach is highly effective for author attribution and attains high accuracy even when the number of candidates is large while training data is limited.

  • Open Access Icon
  • Research Article
  • 10.18524/2307-4604.2020.1(44).211018
ANTHROPOCENTRE OF COMPUTER MEDIATED COMMUNICATION (based on English chat sessions)
  • Sep 2, 2020
  • Writings in Romance-Germanic Philology
  • Н В Реконвальд

The article deals with the pragmalinguistic research of English internet relay chat as a type of mass computer mediated communication in which disembodied distant interlocutors exchange text messages online. The main aim of this study is to identify the structural, formal and functional features of the English chat, which determines the corresponding research objectives: to describe chat-communication as the implementation of a phatic function in the language; to determine the specifics of its anthropocentre. Thus, the study focuses on one of the components of internet chat communication, namely, its anthropocentre. Chat communication is seen as polylogical interaction with different chatters initiating interaction technically on end. Our research found that phatic motivation and absence of face-to-face contact of chatters alongside with fast tempo of communication and short period of text product existence create its specific structural and language features. Chat communication is seen as a prototypical type of phatic computer mediated communication with the help of which chat users realize the playful behaviour impulse of communication, ambition to experience emotionally rich and carefree chatting. The research sample comprised chat logs that saw decency violation both in terms of topics discussed and modes of expression. Emotionally charged obscene vocabulary was vastly used in a number of chat logs, too. The research into the reasons of it showed that chatters resorted to obscene talk in order to get rid of emotional stress and psychological frustration. Chat discourse is largely composed of phatic and metacommunicative remarks where all chatters can enjoy the function of both the addresser and the addresee. A number of logs saw practically no exchange of factual information.

  • Research Article
  • Cite Count Icon 10
  • 10.4018/ijcac.2020070102
A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing
  • Jul 1, 2020
  • International Journal of Cloud Applications and Computing
  • Ahmad Al-Nawasrah + 3 more

A botnet refers to a set of compromised machines controlled distantly by an attacker. Botnets are considered the basis of numerous security threats around the world. Command and control (C&C) servers are the backbone of botnet communications, in which bots send a report to the botmaster, and the latter sends attack orders to those bots. Botnets are also categorized according to their C&C protocols, such as internet relay chat (IRC) and peer-to-peer (P2P) botnets. A domain name system (DNS) method known as fast-flux is used by bot herders to cover malicious botnet activities and increase the lifetime of malicious servers by quickly changing the IP addresses of the domain names over time. Several methods have been suggested to detect fast-flux domains. However, these methods achieve low detection accuracy, especially for zero-day domains. They also entail a significantly long detection time and consume high memory storage. In this survey, we present an overview of the various techniques used to detect fast-flux domains according to solution scopes, namely, host-based, router-based, DNS-based, and cloud computing techniques. This survey provides an understanding of the problem, its current solution space, and the future research directions expected.

  • Open Access Icon
  • Research Article
  • 10.5210/spir.v2019i0.11008
TRUSTED COMMONS: WHY “OLD” SOCIAL MEDIA MATTER
  • Oct 31, 2019
  • AoIR Selected Papers of Internet Research
  • Maxigas + 1 more

Internet Studies scholarship tends to focus on new and hegemonic digital media, overlooking persistent uses of “older”, non-proprietary protocols and applications by some social groups who are key to configuring the nexus between technology and society. In response, we examine the contemporary political significance of using “old” social media through the empirical case of Internet Relay Chat (IRC) use. We advance a critique of platforms (closed, centralised, hegemonic social media) that we contrast with co-constructed devices that deeply involve users in their technological design and social construction. As a contemporary but long used online chat protocol, IRC serves as an important source for the critique of the currently hegemonic — but increasingly distrusted — infrastructures of computer-mediated communication. Drawing on Boltanski and Chiapello’s theory of critique and recuperation, we contrast the uses and underlying social norms of IRC with those of currently mainstream social media platforms. We claim that certain technical limitations that actors of IRC development did not feel necessary to address have kept it from incorporation into regimes of capital accumulation and social control, but also hindered its mass adoption. Ultimately, IRC continues to serve social groups key to the collaborative production of software, hardware and politics. While the general history of digital innovations illustrates the logic of critique and recuperation, our case study highlights the possibilities and pitfalls of resistance to it.

  • Open Access Icon
  • PDF Download Icon
  • Research Article
  • Cite Count Icon 119
  • 10.3390/app9112375
An Adaptive Multi-Layer Botnet Detection Technique Using Machine Learning Classifiers
  • Jun 11, 2019
  • Applied Sciences
  • Riaz Ullah Khan + 5 more

In recent years, the botnets have been the most common threats to network security since it exploits multiple malicious codes like a worm, Trojans, Rootkit, etc. The botnets have been used to carry phishing links, to perform attacks and provide malicious services on the internet. It is challenging to identify Peer-to-peer (P2P) botnets as compared to Internet Relay Chat (IRC), Hypertext Transfer Protocol (HTTP) and other types of botnets because P2P traffic has typical features of the centralization and distribution. To resolve the issues of P2P botnet identification, we propose an effective multi-layer traffic classification method by applying machine learning classifiers on features of network traffic. Our work presents a framework based on decision trees which effectively detects P2P botnets. A decision tree algorithm is applied for feature selection to extract the most relevant features and ignore the irrelevant features. At the first layer, we filter non-P2P packets to reduce the amount of network traffic through well-known ports, Domain Name System (DNS). query, and flow counting. The second layer further characterized the captured network traffic into non-P2P and P2P. At the third layer of our model, we reduced the features which may marginally affect the classification. At the final layer, we successfully detected P2P botnets using decision tree Classifier by extracting network communication features. Furthermore, our experimental evaluations show the significance of the proposed method in P2P botnets detection and demonstrate an average accuracy of 98.7%.

  • Research Article
  • 10.1525/jpms.2019.311007
Response to Microwave DJs
  • Mar 1, 2019
  • Journal of Popular Music Studies
  • Rebekah Farrugia

The mid 1990s was a turning point in my life. Within a year I discovered the Internet and rave culture. I started spending as much time as possible in Internet Relay Chat rooms, reading listserv emails, listening to techno and house music, and attending raves on as many Saturday nights as possible.

  • Open Access Icon
  • Research Article
  • 10.5204/mcj.1463
How Bizarre: The Glitch of the Nineties as a Fantasy of New Authorship
  • Dec 6, 2018
  • M/C Journal
  • Chris Campanioni

How Bizarre: The Glitch of the Nineties as a Fantasy of New Authorship

  • Open Access Icon
  • PDF Download Icon
  • Research Article
  • Cite Count Icon 3
  • 10.24843/mite.2017.v16i03p03
PENERAPAN TEXT MINING DALAM SPAM FILTERING UNTUK APLIKASI CHAT
  • Dec 29, 2017
  • Majalah Ilmiah Teknologi Elektro
  • Ni Luh Ratniasih + 2 more

The Internet has become something important in the communication development. One communication facilities on the Internet is the Internet relay chat or known as chat. Chat applications in real time is often misused for the purpose of spreading the virus, promotions, and other interests known as spam. Spamming is the sending of unwanted messages by someone who has a chat account. This causes the chat account feel uncomfortable with the condition. Based on these problems this research create a chat application that can filter messages or spam filtering by applying text mining. Spam filtering process can be done in two phases: text pre-processing and analyzing. These two phases are carried out to calculate the weight (W) of connectedness with the word spam messages. Based on the results of tests performed on chat applications by applying text mining to perform filtering on spam messages generate the level of accuracy of 91.41%.

  • Open Access Icon
  • PDF Download Icon
  • Research Article
  • Cite Count Icon 14
  • 10.7195/ri14.v15i2.1091
Hashtags 2.0 - An Annotated History of the Hashtag and a Window to its Future
  • Jul 1, 2017
  • Revista ICONO14 Revista científica de Comunicación y Tecnologías emergentes
  • Eduardo Salazar

Hashtags are an example of a Folksonomy, a term coined by Van der Val in 2004 to designate any label (or “tag”) that helps in the process of indexing and retrieval of online content. That said, the hash (#) symbol has a long heritage throughout the computer age. This paper makes an attempt to trace that history, since the hash was first used as a technology aid and towards its emergence as a new construct, the hashtag. It was first proposed openly by Chris Messina as simple means to “form groups” on Twitter, mirroring, in some ways, the way in which the # symbol was used on IRC (Internet Relay Chat) to designate “channels” themselves associated to specific topics and content exchange. The San Diego bushfires of October 2007 lead to an organic growth in the adoption of hashtags, growth that has not stopped since, making them ubiquitous in the current Internet age. Be as it may, the popularity of the hashtag made it also a vehicle to understand how information flows. Consequently, there is an incredibly rich literature explaining the mechanics of diffusion through social networks, opening, in the process, a new question: is that all for the hashtag? That’s a question we also attempt to answer by introducing a new construct: the “programmable hashtag” (or p#).

  • Research Article
  • Cite Count Icon 17
  • 10.1515/sem-2015-0082
Duppying yoots in a dog eat dog world, kmt: Determining the senses of slang terms for the Courts
  • Apr 20, 2017
  • Semiotica
  • Tim Grant

Abstract I describe and discuss a series of court cases that focus upon on decoding the meaning of slang terms. Examples include sexual slang used in a description by a child and an Internet Relay Chat containing a conspiracy to murder. I consider the task presented by these cases for the forensic linguist and the roles the linguist may assume in determining the meaning of slang terms for the Courts. These roles are identified as linguist as naïve interpreter, lexicographer, case researcher, and cultural mediator. Each of these roles is suggestive of different strategies that might be used from consulting formal slang dictionaries and less formal Internet sources, to collecting case specific corpora and examining all the extraneous material in a particular case. Each strategy is evaluated both in terms of the strength of evidence provided and its applicability to the forensic context.

  • Research Article
  • 10.5958/2249-5576.2017.00023.1
Data security approach in cloud computing by using DOS attack
  • Jan 1, 2017
  • International Journal of Information Dissemination and Technology
  • Prachi Garg + 1 more

This paper analyzed the security measures in the collaborative environment, identified widespread DDoS attack implements and surveyed the current trace back tools to suggestion the actual attacker. Nearly, the most popular fears in cooperative environment are entrance controller attacks, SQL injection attacks and implementation of malevolent software, object reusability, camouflaged attacks, inhaling, nosey, and denial-of-service attacks (DoS). The elementary obligation of network based resource allocation includes providing dependable and reliable access of local as well as remote resources in collaborative application. But DDoS attacks are coming in the way of success of such resource centers. DDoS attack architecture can be classified as agent handler model and internet relay chat (IRC) model.

  • Open Access Icon
  • Research Article
  • 10.51983/ajist-2016.6.2.133
Internet and its Historical Background with emerging trends in its User Base: An International Perspective
  • Nov 5, 2016
  • Asian Journal of Information Science and Technology
  • P K Paul + 1 more

The growth of internet has been started with properties of sharing of file and documents among the computers and similar systems. The www, email, News Group, FTP, Internet Relay Chat, Telnet, Voice Communication System lead the rapid growth of the internet services and its application resulted increase user base in almost all the countries around the world. The total internet users touches 40% of the total population in the world as far as 2014 is concerned. Surprisingly the developing world is also moving towards more internet services and user base. Europe Region touches the highest percentages (75%) of internet users among the other regions as reported by the International Telecommunication Union. The paper is highlighted the growing internet users around the world and many features and aspects in relation to this.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • .
  • 1
  • 2
  • 3
  • 4
  • 5

Popular topics

  • Latest Artificial Intelligence papers
  • Latest Nursing papers
  • Latest Psychology Research papers
  • Latest Sociology Research papers
  • Latest Business Research papers
  • Latest Marketing Research papers
  • Latest Social Research papers
  • Latest Education Research papers
  • Latest Accounting Research papers
  • Latest Mental Health papers
  • Latest Economics papers
  • Latest Education Research papers
  • Latest Climate Change Research papers
  • Latest Mathematics Research papers

Most cited papers

  • Most cited Artificial Intelligence papers
  • Most cited Nursing papers
  • Most cited Psychology Research papers
  • Most cited Sociology Research papers
  • Most cited Business Research papers
  • Most cited Marketing Research papers
  • Most cited Social Research papers
  • Most cited Education Research papers
  • Most cited Accounting Research papers
  • Most cited Mental Health papers
  • Most cited Economics papers
  • Most cited Education Research papers
  • Most cited Climate Change Research papers
  • Most cited Mathematics Research papers

Latest papers from journals

  • Scientific Reports latest papers
  • PLOS ONE latest papers
  • Journal of Clinical Oncology latest papers
  • Nature Communications latest papers
  • BMC Geriatrics latest papers
  • Science of The Total Environment latest papers
  • Medical Physics latest papers
  • Cureus latest papers
  • Cancer Research latest papers
  • Chemosphere latest papers
  • International Journal of Advanced Research in Science latest papers
  • Communication and Technology latest papers

Latest papers from institutions

  • Latest research from French National Centre for Scientific Research
  • Latest research from Chinese Academy of Sciences
  • Latest research from Harvard University
  • Latest research from University of Toronto
  • Latest research from University of Michigan
  • Latest research from University College London
  • Latest research from Stanford University
  • Latest research from The University of Tokyo
  • Latest research from Johns Hopkins University
  • Latest research from University of Washington
  • Latest research from University of Oxford
  • Latest research from University of Cambridge

Popular Collections

  • Research on Reduced Inequalities
  • Research on No Poverty
  • Research on Gender Equality
  • Research on Peace Justice & Strong Institutions
  • Research on Affordable & Clean Energy
  • Research on Quality Education
  • Research on Clean Water & Sanitation
  • Research on COVID-19
  • Research on Monkeypox
  • Research on Medical Specialties
  • Research on Climate Justice
Discovery logo
FacebookTwitterLinkedinInstagram

Download the FREE App

  • Play store Link
  • App store Link
  • Scan QR code to download FREE App

    Scan to download FREE App

  • Google PlayApp Store
FacebookTwitterTwitterInstagram
  • Universities & Institutions
  • Publishers
  • R Discovery PrimeNew
  • Ask R Discovery
  • Blog
  • Accessibility
  • Topics
  • Journals
  • Open Access Papers
  • Year-wise Publications
  • Recently published papers
  • Pre prints
  • Questions
  • FAQs
  • Contact us
Lead the way for us

Your insights are needed to transform us into a better research content provider for researchers.

Share your feedback here.

FacebookTwitterLinkedinInstagram
Cactus Communications logo

Copyright 2026 Cactus Communications. All rights reserved.

Privacy PolicyCookies PolicyTerms of UseCareers