Results 51 to 60 of about 37,268 (180)

Safeguarding Online Research in Eating Disorders Against Fraud: Increasing Risks and Practical Recommendations

open access: yesInternational Journal of Eating Disorders, EarlyView.
ABSTRACT Objective Recent growth of online research has been accompanied by an increase in reports of fraudulent participants, which can significantly comprise research validity. Drawing from our experience using Qualtrics with open recruitment, existing literature, and emerging studies in eating disorders (ED), we outline the risk and provide simple ...
Jamie‐Lee Pennesi   +2 more
wiley   +1 more source

Roles of triaxiality and residual interaction in signature inversions of A~130 odd-odd nuclei

open access: yes, 1993
Rotational bands with (neutron h_11/2)^1 (proton h_11/2)^1 configurations are studied using a particle-rotor model in which a proton and a neutron quasiparticles interacting through a zero-range force are coupled with a triaxial rotor.
Andersson   +43 more
core   +1 more source

Web based system architecture for long pulse remote experimentation [PDF]

open access: yes, 2010
Remote experimentation (RE) methods will be essential in next generation fusion devices. Requirements for long pulse RE will be: on-line data visualization, on-line data acquisition processes monitoring and on-line data acquisition systems interactions ...
Barrera   +15 more
core   +2 more sources

Digital Rights Activism in Multilevel Governance

open access: yesEuropean Policy Analysis, EarlyView.
ABSTRACT Multilevel governance (MLG) without a clear hierarchical structure can create power imbalances among various actors, particularly in settings with overlapping jurisdictions and policy areas. This dynamic is especially pronounced in Internet governance, which faces a complex interplay of domestic laws, state interdependence, and heightened ...
Alison Harcourt
wiley   +1 more source

On Usual, Virtual and Welded knotted objects up to homotopy

open access: yes, 2016
We consider several classes of knotted objects, namely usual, virtual and welded pure braids and string links, and two equivalence relations on those objects, induced by either self-crossing changes or self-virtualizations. We provide a number of results
Audoux, Benjamin   +3 more
core   +3 more sources

Internet Censorship: An Integrative Review of Technologies Employed to Limit Access to the Internet, Monitor User Actions, and their Effects on Culture [PDF]

open access: yes, 2020
The following conducts an integrative review of the current state of Internet Censorship in China, Iran, and Russia, highlights common circumvention technologies (CTs), and analyzes the effects Internet Censorship has on cultures.
Hyland, Joe
core   +1 more source

Deploying elastic routing capability in an SDN/NFV-enabled environment [PDF]

open access: yes, 2015
SDN and NFV are two paradigms that introduce unseen flexibility in telecom networks. Where previously telecom services were provided by dedicated hardware and associated (vendor-specific) protocols, SDN enables to control telecom networks through ...
Colle, Didier   +6 more
core   +1 more source

Evaluation and treatment of mental health symptoms among unaccompanied migrant children and adolescents in the United States: A systematic review

open access: yesJCPP Advances, EarlyView.
Abstract Background Unaccompanied migrant youths are at elevated risk for exposure to trauma and related mental health challenges, but there is minimal evidence guiding best practices. We conducted a systematic review of quantitative studies that examined mental health evaluation and treatment services for unaccompanied migrant youths resettled in the ...
Natan J. Vega Potler   +3 more
wiley   +1 more source

Desain Virtual Private Network (VPN) Berbasis Open Shortest Path First (OSPF) [PDF]

open access: yesInfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan), 2019
Akses terhadap sebuah jaringan lokal yang bersifat terbatas untuk pihak tertentu dapat dilakukan dari jaringan publik dengan memanfaatkan Virtual Private Network (VPN). Akses tersebut dilakukan melalui internet dengan memanfaatkan VPN. Hal itu membuat pengguna bisa memanfaatkan semua resources jaringan lokal yang dapat diakses tanpa batasan waktu dan ...
openaire   +1 more source

Penerapan Metode Open Vpn-access Server sebagai Rancangan Jaringan Wide Area Network [PDF]

open access: yes, 2015
The development of information technology has developed rapidly from year to year. The use of the Internet as a very useful addition to mediation communications but still has weaknesses in its security.Ecosystem service assurance is one unit of work on ...
Badru, M. (Mohammad)   +1 more
core  

Home - About - Disclaimer - Privacy