Results 91 to 100 of about 526,034 (276)

A Qualitative Exploration of Post‐Injury Challenges and the Potential Role of the PTSD Coach Mobile Application to Improve Recovery Among Acutely Injured Patients

open access: yesJournal of Clinical Psychology, EarlyView.
ABSTRACT Objective Digital interventions designed to prevent development of chronic pain and comorbid mental health symptoms, specifically targeting the acute injury recovery period, are in the early stages of development. The evidence‐based PTSD Coach mobile application is a free resource offering cognitive‐behavioral interventions to self‐manage ...
Maria L. Pacella‐LaBarbara   +7 more
wiley   +1 more source

Joint power control and user grouping mechanism for efficient uplink non‐orthogonal multiple access‐based 5G communication: Utilising the Lèvy‐flight firefly algorithm

open access: yesIET Networks, EarlyView., 2023
We utilise a metaheuristic optimisation method, inspired by nature, called the Lévy‐flight firefly algorithm (LFA), to tackle the power regulation and user grouping in the NOMA systems. Abstract The non‐orthogonal multiple access strategies have shown promise to boost fifth generation and sixth generation wireless networks' spectral efficiency and ...
Zaid Albataineh   +4 more
wiley   +1 more source

Simulation-Based Evaluation of V2X System with Variable Computational Infrastructure

open access: yesNetwork
The issue of organizing efficient interaction between vehicle-to-everything (V2X) system elements has become increasingly critical in recent years. Utilizing V2X technology enables achieving the necessary balance of safety, reducing system load, and ...
Andrei Vladyko   +2 more
doaj   +1 more source

“It Was a Very Pleasant Surprise”: Exploring Public Safety Service Users' Experiences With Inpatient Mental Health Treatment and Recovery

open access: yesJournal of Clinical Psychology, EarlyView.
ABSTRACT Objectives Mental health service users are responsible and autonomous individuals who can comprehend their own illness and recovery and therefore engage healthcare professionals in their care. Studies have demonstrated how service users feel more dignified, safe, and respected during mental health treatment when they are listened to by their ...
Matthew S. Johnston   +3 more
wiley   +1 more source

A Proposal for a Mobility-Control Data Transfer Mechanism Based on a Block Network Utilizing End-to-End Authentication Data

open access: yesMathematics
Advances in communications technology have had tremendous influence on network implementation to date, and as communication devices get smaller and technologies more intelligent, a great number of solutions are emerging that converge communications with ...
Jinsu Kim, Eunsun Choi, Namje Park
doaj   +1 more source

Acting authentically: Using play to cultivate authentic interrelating in role performance

open access: yesJournal of Organizational Behavior, EarlyView.
Summary Research is increasingly demonstrating that authenticity and human connection are fundamental and interrelated human needs. However, organizational roles often constrain authenticity and connection in workplace interactions, especially roles that are highly scripted.
Lyndon E. Garrett
wiley   +1 more source

Analysis of MCP-Distributed Jammers and 3D Beam-Width Variations for UAV-Assisted C-V2X Millimeter-Wave Communications

open access: yesMathematics
Jamming devices introduce unwanted signals into the network to disrupt primary communications. The effectiveness of these jamming signals mainly depends on the number and distribution of the jammers.
Mohammad Arif   +3 more
doaj   +1 more source

Second‐Order Between‐Supplier Learning

open access: yesJournal of Operations Management, EarlyView.
ABSTRACT Substantial empirical evidence shows that suppliers in emerging economies can enhance their technological capabilities through direct learning from technologically advanced foreign competitors. However, suppliers in emerging markets may struggle to learn directly from knowledge about competitors’ products that are not widely available on the ...
Lisha Liu, Xianwei Shi, Guangzhi Shang
wiley   +1 more source

Evaluation of Redundancy Mitigation Rules in V2X Networks for Enhanced Collective Perception Services

open access: yesIEEE Access
Collective perception enables connected vehicles to share detailed environmental data, significantly enhancing situational awareness and safety. This data sharing is crucial for the functioning of modern vehicular networks, but it introduces the ...
Ahmed Hamdi Sakr
doaj   +1 more source

Large, rugged and remote: The challenge of wolf–livestock coexistence on federal lands in the American West

open access: yesPeople and Nature, EarlyView.
Abstract The expansion of grey wolves (Canis lupus) across the western United States, including on public lands used for extensive livestock grazing, requires tools and techniques for reducing wolf–livestock conflict and supporting coexistence. We examined approaches used on forested lands managed by the U.S.
Robert M. Anderson   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy