Results 131 to 140 of about 71,373 (268)
Outage Performance Analysis and SWIPT Optimization in Energy-Harvesting Wireless Sensor Network Deploying NOMA. [PDF]
Nguyen HS +5 more
europepmc +1 more source
Hurricane‐induced risk contagion in commercial real estate: Evidence from Hurricane Sandy
Abstract This study examines how hurricane‐induced destruction affects the prices of nearby undamaged commercial real estate properties, using Hurricane Sandy as a natural experiment. Using Real Capital Analytics transaction records spatially merged with Federal Emergency Management Agency building‐level damage data, we empirically employ a difference ...
Lu Fang +3 more
wiley +1 more source
Abstract Smartphone manufacturers' enhanced privacy and security measures, such as File‐Based Encryption (FBE), have disrupted traditional data extraction techniques, necessitating the adoption of Full File System Extraction (FFS). FFS requires booting a smartphone, decrypting its UserData partition, and accessing files individually, a process that ...
Sanghyun Yoo, Yunji Park, Doowon Jeong
wiley +1 more source
ABSTRACT This article explores the application of demurrage money, a concept developed by Silvio Gesell, into Web3. Demurrage money, designed to discourage the hoarding of currency and prevent economic stagnation and concentrations in wealth, offers a potential remedy for the problems of traditional fiat and gold‐backed monetary systems.
George Lovegrove
wiley +1 more source
Expanding the Taxonomy of Ethical Issues in Surgical Innovation
ABSTRACT Surgical innovation poses significant ethical challenges. Previous work has grouped these challenges under four categories: potential harms to patients; compromised informed consent; unfair allocation of healthcare resources; and conflicts of interest. We argue that recent technological developments in surgery warrant the addition of three new
Jane Johnson +2 more
wiley +1 more source
Respectfully Excluded: Symbolic Violence, Space and Benevolent Sexism in Academia in Pakistan
ABSTRACT Feminist scholars have long recognized the gender‐based challenges that women in academia face. We undertake a qualitative study of how women in academic institutions in Khyber Pakhtunkhwa (KPK), a province in Pakistan, experience exclusion. We draw on narratives elicited through hypothetical vignettes from 10 women academics in KPK, collected
Fatima Junaid +2 more
wiley +1 more source
Resilient IT: Winning With People and Process
ABSTRACT In today's dynamic environment, IT organisations face numerous challenges from disruptions such as natural disasters, cybersecurity threats, international conflicts, evolving regulations, pandemics and recent global incidents such as the CrowdStrike outage.
Wesam Helou +2 more
wiley +1 more source
Abstract We address the scheduling conflicting jobs on parallel identical machines problem with makespan minimization, a classical and computationally challenging variant of parallel machine scheduling. We develop and evaluate three distinct solution methodologies: a novel constraint programming (CP) formulation, and two metaheuristics: a multi ...
Roberto Maria Rosati +3 more
wiley +1 more source
Outage Performance of SWIPT-D2D-Based Hybrid Satellite-Terrestrial Networks. [PDF]
Li Z, Xing J, Hu J.
europepmc +1 more source
ABSTRACT Flavobacterium spp. are the etiological agents of columnaris disease. Although there is evidence that columnaris poses a significant threat to the farming of tambaqui (Colossoma macropomum), there remains a large gap in understanding the genetic and phenotypic diversities of columnaris‐causing bacteria (CCB).
Elcimara Cardoso Pereira +8 more
wiley +1 more source

