Results 91 to 100 of about 526,034 (276)
ABSTRACT Objective Digital interventions designed to prevent development of chronic pain and comorbid mental health symptoms, specifically targeting the acute injury recovery period, are in the early stages of development. The evidence‐based PTSD Coach mobile application is a free resource offering cognitive‐behavioral interventions to self‐manage ...
Maria L. Pacella‐LaBarbara +7 more
wiley +1 more source
We utilise a metaheuristic optimisation method, inspired by nature, called the Lévy‐flight firefly algorithm (LFA), to tackle the power regulation and user grouping in the NOMA systems. Abstract The non‐orthogonal multiple access strategies have shown promise to boost fifth generation and sixth generation wireless networks' spectral efficiency and ...
Zaid Albataineh +4 more
wiley +1 more source
Simulation-Based Evaluation of V2X System with Variable Computational Infrastructure
The issue of organizing efficient interaction between vehicle-to-everything (V2X) system elements has become increasingly critical in recent years. Utilizing V2X technology enables achieving the necessary balance of safety, reducing system load, and ...
Andrei Vladyko +2 more
doaj +1 more source
ABSTRACT Objectives Mental health service users are responsible and autonomous individuals who can comprehend their own illness and recovery and therefore engage healthcare professionals in their care. Studies have demonstrated how service users feel more dignified, safe, and respected during mental health treatment when they are listened to by their ...
Matthew S. Johnston +3 more
wiley +1 more source
Advances in communications technology have had tremendous influence on network implementation to date, and as communication devices get smaller and technologies more intelligent, a great number of solutions are emerging that converge communications with ...
Jinsu Kim, Eunsun Choi, Namje Park
doaj +1 more source
Acting authentically: Using play to cultivate authentic interrelating in role performance
Summary Research is increasingly demonstrating that authenticity and human connection are fundamental and interrelated human needs. However, organizational roles often constrain authenticity and connection in workplace interactions, especially roles that are highly scripted.
Lyndon E. Garrett
wiley +1 more source
Jamming devices introduce unwanted signals into the network to disrupt primary communications. The effectiveness of these jamming signals mainly depends on the number and distribution of the jammers.
Mohammad Arif +3 more
doaj +1 more source
Second‐Order Between‐Supplier Learning
ABSTRACT Substantial empirical evidence shows that suppliers in emerging economies can enhance their technological capabilities through direct learning from technologically advanced foreign competitors. However, suppliers in emerging markets may struggle to learn directly from knowledge about competitors’ products that are not widely available on the ...
Lisha Liu, Xianwei Shi, Guangzhi Shang
wiley +1 more source
Collective perception enables connected vehicles to share detailed environmental data, significantly enhancing situational awareness and safety. This data sharing is crucial for the functioning of modern vehicular networks, but it introduces the ...
Ahmed Hamdi Sakr
doaj +1 more source
Abstract The expansion of grey wolves (Canis lupus) across the western United States, including on public lands used for extensive livestock grazing, requires tools and techniques for reducing wolf–livestock conflict and supporting coexistence. We examined approaches used on forested lands managed by the U.S.
Robert M. Anderson +3 more
wiley +1 more source

