ApproximateSecret Sharing in Field of Real Numbers. [PDF]
Wan J, Wang Z, Yu Y, Yan X.
europepmc +1 more source
This study describes the work at an emergency and critical care center, focusing on the collaboration of multiple nurses when moving patients from the outpatient department to the ward. This study is an ethnomethodological ethnography based on fieldwork at a hospital and analysis of video data. The patient transport process is temporally organized into
Hiroki Maeda, Yumi Nishimura
wiley +1 more source
Lightweight semantic compression visual cryptography for secure medical image transmission in IoT systems. [PDF]
Blesswin AJ +5 more
europepmc +1 more source
Accomplishing Ethics‐Work as a Generic Social Process
Existing systems of university research ethics are often criticized by those in the qualitative research tradition. A common thread is that ethics cannot be fully anticipated before the research begins, as is expected by most institutional review boards.
Deana Simonetto, Antony Puddephatt
wiley +1 more source
Secure edge-guided adaptive image steganography using HED-based attention maps and CNN. [PDF]
Alrawashdeh R +4 more
europepmc +1 more source
Formation of Distance‐Based Orientation: Political Identity through Relational Positioning in Israel
Distance‐based orientation describes how pejorative labels may serve as anchor points for political identity. Existing research on political labeling has largely emphasized stigmatization, overlooking how labels may acquire durability and orienting capacity without losing pejorative force. Drawing on publicly circulating discourse, we trace positioning
Tammar Friedman, Asaf Saadon
wiley +1 more source
Enhanced security of affine ciphers using digraph transformation and a modified three pass protocol. [PDF]
Bete S +4 more
europepmc +1 more source
Assessing Capability Complexity Using Enterprise Architecture Framework
ABSTRACT This study proposes a structured and quantitative methodology to evaluate the holistic complexity of system‐of‐systems (SoSs), employing the Zachman Architecture Framework (ZAF) as its foundational analytical tool. A five‐phase analytical procedure is developed and empirically validated, encompassing: (1) refinement of complexity measures, (2)
Javad Bakhshi, Mahmoud Efatmaneshnik
wiley +1 more source
A Two-Phase Embedding Approach for Secure Distributed Steganography. [PDF]
Woźniak K, Ogiela MR, Ogiela L.
europepmc +1 more source
It's Not You, It's the System: Women Professors in TESOL and the Persistence of Gender Bias
Abstract Although progress has been made with respect to the role and position of women in academia, overt and covert discrimination as well as structural and systemic bias persist. In this article, we report on research conducted with 14 women professors from 10 different countries to explore to what extent these issues affect women professors in ...
Sarah Mercer +3 more
wiley +1 more source

