Results 101 to 110 of about 1,934,741 (293)

The Degradation of Access‐Based Business Models: Customer Misbehavior and Shared Mobility

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Access‐based services are considered one of the strategies to embed sustainability in business models. Yet, because the evolution of these business models has been overlooked, we do not know whether their promise to create triple value is sustained.
Andres Camacho, Carmen Valor
wiley   +1 more source

Adolescent Cyberviolence in South Korea: A Multi‐Year, National Population‐Based Study of Cyberviolence Prevalence (2017–2024)

open access: yesBehavioral Sciences &the Law, EarlyView.
ABSTRACT With the rise of digital technology, adolescent cyberviolence has become a growing global concern in public health and criminal justice. This study used nationally representative data from South Korea (2017–2024) to examine the prevalence of eight types of cyberviolence (i.e., verbal abuse, defamation, stalking, sexual abuse, personal ...
Heng Choon (Oliver) Chan   +2 more
wiley   +1 more source

Dual Artery Compression for Patent Hemostasis and Prevention of Radial Artery Occlusion: The Quebec Terry2 Registry

open access: yesCatheterization and Cardiovascular Interventions, EarlyView.
ABSTRACT Background Radial artery occlusion (RAO) is a common complication following transradial artery access (TRA). Patent hemostasis is recommended to reduce RAO. Prophylactic ulnar artery compression is a technique to increase the rate of patent hemostasis.
Tomas A. Cieza   +8 more
wiley   +1 more source

System and application of video surrveillance based on edge computing

open access: yesDianxin kexue, 2020
With the popularization of video surveillance systems and the diversification of their applications,traditional data processing methods using cloud computing to handle all the computations are more and more unsustainable.Edge computing pre-processes ...
Sanming PAN, Mingqiang YUAN
doaj   +2 more sources

Video Stabilization for Aerial Video Surveillance

open access: yesAASRI Procedia, 2013
Abstract Aerial video stabilization system aims to remove undesired motion in aerial v deo. This motion is the result of undesired movement of mobile sensor. In this article we present a new video stabilization system for Unmanned Aerial Vehicles (UAV). Our system is based on keypoints tracking.
Walha, Ahlem, Wali, Ali, Alimi, Adel M.
openaire   +1 more source

“Train and Hope”: The Role of Restorative Justice Coordinators in Sustaining a Culture of Care in Schools

open access: yesConflict Resolution Quarterly, EarlyView.
ABSTRACT This article examines the role of restorative justice coordinators in supporting teachers and schools in adopting a whole‐school approach to restorative justice in education. Coordinators are often tasked with implementing a train‐and‐hope model, in which they receive initial training in restorative justice but are largely left unsupported ...
Crystena Parker‐Shandal   +3 more
wiley   +1 more source

The Evolution of Impression Management Research in Social Media: A Bibliometric Perspective

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT The purpose of the present study is to investigate impression management (IM) usage by companies in the context of social media communication and emerging technologies through a comprehensive mapping of the scientific literature. In this matter, a bibliometric analysis has been conducted, extracting a sample of 262 peer‐reviewed journal ...
Antonio Iazzi   +3 more
wiley   +1 more source

Intelligent Video Surveillance [PDF]

open access: yesТЕНДЕНЦИИ РАЗВИТИЯ НАУКИ И ОБРАЗОВАНИЯ, 2019
Z. E. Alieva, A. B. Alieva
  +4 more sources

Choice of Application Layer Protocols for Next Generation Video Surveillance Using Internet of Video Things

open access: yesIEEE Access, 2019
Video surveillance has become ubiquitous due to the increasing security requirements in every sphere of life. The next generation video surveillance system (VSS) possesses great challenges in various applications, such as intelligent urban surveillance ...
Tanin Sultana, K. Wahid
semanticscholar   +1 more source

Real‐time monitoring of tunnel structures using digital twin and artificial intelligence: A short overview

open access: yesDeep Underground Science and Engineering, EarlyView.
How artificial intelligence (AI) and digital twin (DT) technologies are revolutionizing tunnel surveillance, offering proactive maintenance strategies and enhanced safety protocols. It explores AI's analytical power and DT's virtual replicas of infrastructure, emphasizing their role in optimizing maintenance and safety in tunnel management.
Mohammad Afrazi   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy