Results 81 to 90 of about 1,723,598 (285)

Administrative checkpoints, burdens, and human‐centered design: Increasing interview access to raise SNAP participation

open access: yesJournal of Policy Analysis and Management, EarlyView.
Abstract In this study we describe the potential of human‐centered design principles to identify burdens, reducing the effects of administrative checkpoints. Administrative checkpoints—mandatory requirements that must be satisfied in order to progress in an administrative process—have disproportionate negative effects in excluding the public from ...
Jae Yeon Kim   +4 more
wiley   +1 more source

SecGPSR: A Secure GPSR Protocol for FANET Against Sybil and Gray Hole Attacks

open access: yesIEEE Access
In recent years, drones have become increasingly prevalent in a wide range of applications, performing complex and critical tasks. To accomplish these tasks, drones cooperate by forming a Flying Ad-Hoc Network (FANET) using specific routing protocols for
Mauro Tropea   +4 more
doaj   +1 more source

International legal status of refugees in the territory of one party to armed conflict [PDF]

open access: yesMegatrend Revija, 2017
The international law of armed conflicts provides a legal protection to refugees if they find themselves in the territory of warring parties. Refugees are regarded as protected persons, particularly in international armed conflicts.
Tesla Milan
doaj   +1 more source

Service Virtualisation of Internet-of-Things Devices: Techniques and Challenges

open access: yes, 2017
Service virtualization is an approach that uses virtualized environments to automatically test enterprise services in production-like conditions. Many techniques have been proposed to provide such a realistic environment for enterprise services.
Farahmandpour, Zeinab   +3 more
core   +1 more source

“Bad Things Happen in Philadelphia”: Managing Stigma and Threats in the Wake of False Criminal Accusations

open access: yesSymbolic Interaction, EarlyView.
In the aftermath of the 2020 U.S. election, the boundary between activism and extremism blurred, with election officials reporting violent threats and false accusations of election fraud. From a symbolic interactionist perspective, these attacks provide a unique lens for examining the consequences of being falsely labeled a criminal.
Steven Windisch
wiley   +1 more source

A Reliable Path Selection and Packet Forwarding Routing Protocol for Vehicular Ad hoc Networks

open access: yesEURASIP Journal on Wireless Communications and Networking, 2018
Vehicular ad hoc networks (VANETs) have earned a gigantic consideration in the recent era. Wide deployment of VANETs for enhancing traffic safety, traffic management, and assisting drivers through elegant transportation system is facing several research ...
Irshad Ahmed Abbasi   +2 more
doaj   +1 more source

Two-Hop Routing with Traffic-Differentiation for QoS Guarantee in Wireless Sensor Networks [PDF]

open access: yes, 2014
This paper proposes a Traffic-Differentiated Two-Hop Routing protocol for Quality of Service (QoS) in Wireless Sensor Networks (WSNs). It targets WSN applications having different types of data traffic with several priorities.
Iyengar, S S   +4 more
core   +1 more source

Task‐Designated Identities in Danish Homeless Shelters

open access: yesSymbolic Interaction, EarlyView.
This paper is based on an ethnographic study of how domesticity is enacted and adapted at homeless shelters for determining which clients are “service worthy .” The study draws on nineteen placement meetings with homeless men and focuses on institutional mechanisms for encouraging homemaking skills or domesticity among clients.
Amir B. Marvasti, Nanna Mik‐Meyer
wiley   +1 more source

“Whether my Body Breaks or the Plum Tree Withers”: Iwanaga Maki, Social Welfare Pioneer, and the jūjikai Women's Religious Order

open access: yesJournal of Religious History, EarlyView.
Maria Iwanaga Maki (1849–1920) was 23 years old in 1873 when she returned home after a community exile and persecutions of more than 3000 people carried out by the Meiji government. Historians in the public record refer to Iwanaga as otoko‐masari (man‐nish) when she stood up to a representative of the Shogun, while in her public work she became known ...
Gwyn McClelland
wiley   +1 more source

A geographic routing protocol based on trunk line in VANETs

open access: yesDigital Communications and Networks, 2021
A Trunk Line Based Geographic Routing(TLBGR) protocol in Vehicular Ad-hoc Networks (VANETs) is proposed in this paper to solve the problem of data acquisition in the traditional trunk coordinated control system.
Chen Chen   +5 more
doaj  

Home - About - Disclaimer - Privacy