Results 71 to 80 of about 29,121 (270)

Psilocybin‐assisted psychotherapy for methamphetamine use disorder: A pilot open‐label safety and feasibility study

open access: yesAddiction, EarlyView.
Abstract Background & Aims There are few effective treatments for methamphetamine use disorder, despite increasing global demand. Here, we assessed the safety and feasibility of outpatient psilocybin‐assisted psychotherapy for methamphetamine use disorder. Design Single arm, open label pilot study.
Elizabeth Knock   +8 more
wiley   +1 more source

Deep reinforcement learning-based routing framework for bidirectional communication in UAV-UGV networks

open access: yesCognitive Robotics
Unmanned Aerial Vehicles (UAVs) and Unmanned Ground Vehicles (UGVs) performs crucial function in many applications like military operations, disaster management, hazardous operations and surveillance.
Prabhakar Saxena, Gayatri M. Phade
doaj   +1 more source

A Smart Collaborative Routing Protocol for Reliable Data Diffusion in IoT Scenarios

open access: yesSensors, 2018
It is knotty for current routing protocols to meet the needs of reliable data diffusion during the Internet of Things (IoT) deployments. Due to the random placement, limited resources and unattended features of existing sensor nodes, the wireless ...
Zheng-Yang Ai, Yu-Tong Zhou, Fei Song
doaj   +1 more source

Associations between the national ‘Swap to Stop’ programme offering free vapes for smoking cessation and quit attempts in England: Results from a population‐based survey

open access: yesAddiction, EarlyView.
Abstract Background and aims Vapes are effective for smoking cessation. The UK Government launched the Swap to Stop initiative in England in December 2023, aiming to encourage people to quit smoking by providing free vape starter kits alongside behavioural support.
Vera Helen Buss   +6 more
wiley   +1 more source

Formal Computational Unlinkability Proofs of RFID Protocols

open access: yes, 2017
We set up a framework for the formal proofs of RFID protocols in the computational model. We rely on the so-called computationally complete symbolic attacker model. Our contributions are: i) To design (and prove sound) axioms reflecting the properties of
Comon, Hubert, Koutsos, Adrien
core   +1 more source

Reimagining Research Ethics Through Local Knowledge and Leadership: The Community Ethics Advisory Board on the Thailand–Burma Border

open access: yesAsia Pacific Viewpoint, EarlyView.
ABSTRACT This article examines the Community Ethics Advisory Board (CEAB) on the Thailand–Burma border as a locally led ethics advisory mechanism that complements formal and institutionalised ethics systems within and beyond the region. CEAB was created to enable community members to provide guidance on research proposals and activities in their areas,
Naw May Lyar Soe   +3 more
wiley   +1 more source

Brokers, Collaborators and Knowledge Translators: Expanding the Role of Research Assistants in Geographic Research

open access: yesAsia Pacific Viewpoint, EarlyView.
ABSTRACT While ‘local’ research assistants (RA) often play a key role in knowledge production in fieldwork‐based disciplines like geography, their role and agency often remain silenced. This paper brings together scholarship in feminist geography and critical development studies to reposition RAs as brokers, collaborators, and knowledge translators.
Zali Fung
wiley   +1 more source

SecGPSR: A Secure GPSR Protocol for FANET Against Sybil and Gray Hole Attacks

open access: yesIEEE Access
In recent years, drones have become increasingly prevalent in a wide range of applications, performing complex and critical tasks. To accomplish these tasks, drones cooperate by forming a Flying Ad-Hoc Network (FANET) using specific routing protocols for
Mauro Tropea   +4 more
doaj   +1 more source

An examination of core beliefs in generalized anxiety disorder

open access: yesBritish Journal of Clinical Psychology, EarlyView.
Abstract Objective Generalised anxiety disorder (GAD) is characterised by uncontrollable worries. Cognitive behaviour therapy (CBT) is an effective treatment for GAD; however, manualised treatments rarely include interventions to target core beliefs. This study aimed to (1) explore the core beliefs about the self that are endorsed by individuals with ...
Amy E. Doust   +4 more
wiley   +1 more source

Intra- and Inter-Session Network Coding in Wireless Networks [PDF]

open access: yes, 2010
In this paper, we are interested in improving the performance of constructive network coding schemes in lossy wireless environments.We propose I2NC - a cross-layer approach that combines inter-session and intra-session network coding and has two ...
Markopoulou, Athina   +2 more
core  

Home - About - Disclaimer - Privacy