Eligible but Not Entitled: The Distinctiveness of Non‐Entitlement Policy Designs at the Frontline
ABSTRACT This paper explores the distinctive dynamics of entitlement versus non‐entitlement social programmes, focusing on how this distinction influences frontline workers' management of access to social provisions. While much of the existing literature emphasises the macro‐level impacts of these alternative policy designs, this study focuses on their
Michal Koreh +2 more
wiley +1 more source
6G -enabled qubit-based concealed communication with AI-driven breach detection in autonomous fleets. [PDF]
T V +3 more
europepmc +1 more source
Education research: Getting started
Abstract Statistics education research advances knowledge, informs teaching practices, and improves learning outcomes, but how does a higher education statistics educator get started in research? A panel discussion at the inaugural UK Conference on Teaching Statistics (UKCOTS) in 2024 addressed this challenge.
Jenny Terry +5 more
wiley +1 more source
Toward security-aware portable sequencing. [PDF]
Stillman C +3 more
europepmc +1 more source
Fugitive Junctures: Life‐Seeking, Route‐Finding and the Mobile Ensemble at Kenya's Borders
Short Abstract Fugitivity has become an important conceptual frame to understand the illegalised mobilities of contemporary migrants in conjunction with enslaved people's historical lines of flight as spatial praxes to seize their own freedom. Thinking from Kenya, and drawing on research with migrants, border officials, activists, police and smugglers,
Hanno Brankamp
wiley +1 more source
WAWA: Wavelet Analysis-Based Watermarking Authentication for GNSS Civil Signal with Immediate Symbol-Level Verification. [PDF]
Tang X, Tang X, Lin H, Wu Y, Sun G.
europepmc +1 more source
Painting authentication using CNNs and sliding window feature extraction. [PDF]
Ruiz de Miras J +3 more
europepmc +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
Enhanced EAADE: a quantum-resilient and privacy-preserving authentication protocol for secure data exchange in vehicular social networks. [PDF]
Alrashdi R +7 more
europepmc +1 more source
Blockchain for the Arts and Humanities
ABSTRACT As born‐digital cultural materials proliferate, the arts and humanities require infrastructures that guarantee provenance, authenticity, and equitable access. This paper delivers a comprehensive, critical survey of blockchain's potential and limits across the sector.
James O'Sullivan
wiley +1 more source

