Advancing cross-disciplinarity in bone and joint infection science using the COMBINE approach: an example from Denmark. [PDF]
Jensen LK +3 more
europepmc +1 more source
Trajectory based forwarding and its applications
D. Niculescu, B. Nath
semanticscholar +1 more source
Populism and the rule of law: The importance of institutional legacies
Abstract Existing work sees populist governments undermining the rule of law because they seek to dismantle institutional constraints on their personalistic plebiscitarian rule. We argue that populist rulers pose a greater threat to legal impartiality, equality, and compliance when they face a legacy of weak rule of law.
Andreas Kyriacou, Pedro Trivin
wiley +1 more source
Mapping the social networks of key actors in the development of health technology assessment in Iran. [PDF]
Behzadifar M +7 more
europepmc +1 more source
Abstract The rise of social media in the digital era poses unprecedented challenges to authoritarian regimes that aim to influence public attitudes and behaviors. To address these challenges, we argue that authoritarian regimes have adopted a decentralized approach to produce and disseminate propaganda on social media.
Yingdan Lu +3 more
wiley +1 more source
Stakeholders influence to reduce vitamin A deficiency in children aged 15 to 23 months in Iran: an analysis of stakeholders and networking. [PDF]
Rajaeieh G +4 more
europepmc +1 more source
Broadcasting in Sensor Networks: The Role of Local Information
Sundar Subramanian +2 more
semanticscholar +1 more source
Archiving Futurity Within the Missing and Murdered Indigenous Women's Crisis
ABSTRACT In this article, we examine how settler colonization and gendered violence against Indigenous women are remembered and recorded in two archival registers: 18th‐century records from the Massachusetts Archives Collection (MAC) and a 21st‐century corpus of posts using the hashtag MMIW (Missing and Murdered Indigenous Women) on X (formerly Twitter)
Lindsay Martel Montgomery +2 more
wiley +1 more source
Secure ISAC MIMO systems: exploiting interference with Bayesian Cramér-Rao bound optimization. [PDF]
Su N +5 more
europepmc +1 more source
Broadcasting Bidirectional Access Network Intrusion Detection System Facing Tri-Networks Integration
D Cente
openalex +1 more source

