Results 151 to 160 of about 1,337,924 (288)

Dynamic Analysis of Rumor Spreading Model Based on Three Recovery Modes

open access: yesMathematics
In this paper, an SIR rumor propagation model is established with the three recovery modes that the spreader turns into a stifler under the influence of the spreader, stifler and media nonlinear rumor-refuting mechanism.
Jingping Lu, Qinlong Wang, Wentao Huang
doaj   +1 more source

The Use of Home Fortification Products in Humanitarian Settings: A Scoping Review

open access: yesMaternal &Child Nutrition, EarlyView.
ABSTRACT Home fortification products (HFPs), including multiple micronutrient powders and small‐quantity lipid‐based nutrient supplements, are specialized, nutrient‐filled products added to foods with the aim of filling critical nutrient gaps. Despite their potential, there is limited documentation of the use of HFPs in humanitarian settings.
Jacqueline M. Lauer   +4 more
wiley   +1 more source

Cheating or Competing? University Students’ Experience of AI Marketing and What It Means for AI Literacy Programming

open access: yesAnnals of Anthropological Practice, EarlyView.
ABSTRACT Given generative AI's rapid incursion into higher education, we examined how AI tools are marketed to US college students and how students experience AI promotions. Using a scalable action research model, we collected and analyzed 131 social media ads, 48 student interviews, and field notes compiled by three interns at student‐facing AI ...
Elisa J. Sobo   +3 more
wiley   +1 more source

Rumor Spreading on Percolation Graphs

open access: yes, 2011
We study the relation between the performance of the randomized rumor spreading (push model) in a d-regular graph G and the performance of the same algorithm in the percolated graph G_p. We show that if the push model successfully broadcast the rumor within T rounds in the graph G then only (1 + )T rounds are needed to spread the rumor in the graph ...
Oliveira, Roberto I., Prata, Alan
openaire   +2 more sources

Legislating Uncertainty: Election Policies and the Amplification of Misinformation

open access: yesPolicy Studies Journal, EarlyView.
ABSTRACT Can state election policies affect the spread of misinformation? This paper studies the role played by ballot processing policies, which determine when ballots can be examined and organized, in the online spread of political misinformation. We present evidence from the 2020 U.S.
Morgan Wack   +5 more
wiley   +1 more source

Rumors ≠ Gossip

open access: yesStudy and Scrutiny
The purpose of this critical content analysis (CCA) is to inquire into how gossip is portrayed in young adult (YA) novels, drawing from the theoretical frameworks of critical feminist pedagogy (hooks, 1994; Webb et al., 2002) and culturally sustaining ...
Julia Beaumont
doaj   +1 more source

The Downward Spiral of Legitimacy Erosion: Lessons on Network Governance Failure During the German “Refugee Crisis”

open access: yesPublic Administration Review, EarlyView.
ABSTRACT Organizational legitimacy is essential for effective crisis governance. This study analyzes the rapid erosion of legitimacy faced by the German State Office for Health and Social Affairs (LAGeSo) during the 2015 refugee crisis, triggering cascading failures in public service delivery.
Iris Seidemann   +2 more
wiley   +1 more source

Contextualizing the Cappella Cesi: Sangallo, Façades, and Renaissance Collaboration

open access: yesRenaissance Studies, EarlyView.
Abstract This article reframes Antonio da Sangallo the Younger's oft‐overlooked cappella Cesi nave façade in Santa Maria della Pace not as an isolated design deviation but as part of a broader architectural and artistic conversation among major players in early sixteenth‐century Rome.
Alexis Culotta
wiley   +1 more source

Identification of Key Nodes in Rumor Propagation with Multi-structure and Attribute Fusion

open access: yesTaiyuan Ligong Daxue xuebao
[Purposes] How to quickly and accurately identify key rumor nodes has become an important challenge in current research. Existing studies usually use centrality methods based on network structure or machine learning methods based on node features to ...
LI Qi, XU Xiaoya, WANG Li
doaj   +1 more source

Home - About - Disclaimer - Privacy