Results 111 to 120 of about 3,112 (196)

Secure edge-guided adaptive image steganography using HED-based attention maps and CNN. [PDF]

open access: yesSci Rep
Alrawashdeh R   +4 more
europepmc   +1 more source

Embedded Interactions and Selective Disclosure: Network Effects on Conversations aboard Skylab

open access: yesSymbolic Interaction, EarlyView.
How do absent others influence our interactions? We argue in this paper that interactions are embedded within networks formed by chains of specific relationships between known third parties. The anticipation of future interactions with external others conditions our interpretation of the current situation and affects our behavior in the interaction. We
Michael Schultz   +2 more
wiley   +1 more source

“Excluded Participation”: Some Observations of Non‐Reciprocal Interaction in a Danish Fifth Grade Classroom

open access: yesSymbolic Interaction, EarlyView.
This article introduces the concept of excluded participation to examine how inclusion and exclusion are negotiated in real time within a Danish fifth‐grade classroom. Using a micro‐sociological framework, particularly the work of Erving Goffman, the study focuses on the case of Anders, a student whose participation is symbolically recognized yet ...
Jørn Bjerre
wiley   +1 more source

Temporal and Spatial Organization in Collaborative Work by Nurses in an Emergency and Critical Care Center

open access: yesSymbolic Interaction, EarlyView.
This study describes the work at an emergency and critical care center, focusing on the collaboration of multiple nurses when moving patients from the outpatient department to the ward. This study is an ethnomethodological ethnography based on fieldwork at a hospital and analysis of video data. The patient transport process is temporally organized into
Hiroki Maeda, Yumi Nishimura
wiley   +1 more source

Assessing Capability Complexity Using Enterprise Architecture Framework

open access: yesSystems Engineering, EarlyView.
ABSTRACT This study proposes a structured and quantitative methodology to evaluate the holistic complexity of system‐of‐systems (SoSs), employing the Zachman Architecture Framework (ZAF) as its foundational analytical tool. A five‐phase analytical procedure is developed and empirically validated, encompassing: (1) refinement of complexity measures, (2)
Javad Bakhshi, Mahmoud Efatmaneshnik
wiley   +1 more source

It's Not You, It's the System: Women Professors in TESOL and the Persistence of Gender Bias

open access: yesTESOL Quarterly, EarlyView.
Abstract Although progress has been made with respect to the role and position of women in academia, overt and covert discrimination as well as structural and systemic bias persist. In this article, we report on research conducted with 14 women professors from 10 different countries to explore to what extent these issues affect women professors in ...
Sarah Mercer   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy