Results 21 to 30 of about 236,356 (234)
The ubiquity of mobile computing devices in the workplace has created a vast landscape of opportunity in rural communities centered on the increased population access owing to the improved mobility. Healthcare workers are able to reach previously disconnected communities and homesteads to deliver health related services through the use of custom mobile
Kativu, Kevin, Pottas, Dalenca
openaire +2 more sources
Risks and remedies in e-learning system
One of the most effective applications of Information and Communication Technology (ICT) is the emergence of E-Learning. Considering the importance and need of E-Learning, recent years have seen a drastic change of learning methodologies in Higher ...
Barik, Nikhilesh, Karforma, Sunil
core +1 more source
THE IMPORTANCE OF PHYSICAL CULTURE IN EDUCATION OF STUDENTS
Introduction: physical health of a person is a natural state of an organism caused by normal functioning of all its organs and systems. It is an invaluable asset for the entire community.Training sessions in the discipline "Elective courses in physical ...
S. E. Volozhanin
doaj +1 more source
This paper introduces Contextual Object Grouping (COG), a specific computer vision framework that enables automatic interpretation of technical security diagrams through dynamic legend learning for intelligent sensing applications.
Jan Kapusta +2 more
doaj +1 more source
Objectives Evaluate the efficacy and safety of baricitinib in paediatric patients with active JIA‐U or chronic anterior ANA‐positive uveitis, who had an inadequate response to MTX or bDMARDs. Methods JUVE‐BRIGHT was an open‐label, active‐controlled, Phase‐3 multicentre trial which utilized a novel design, including 1:1 randomization to an active ...
Athimalaipet V. Ramanan +7 more
wiley +1 more source
Towards Security Goals in Summative E-Assessment Security
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core +1 more source
This paper proposes two projector‐based Hopfield neural network (HNN) estimators for online, constrained parameter estimation under time‐varying data, additive disturbances, and slowly drifting physical parameters. The first is a constraint‐aware HNN that enforces linear equalities and inequalities (via slack neurons) and continuously tracks the ...
Miguel Pedro Silva
wiley +1 more source
Securing library information system: Vulnerabilities and threats [PDF]
Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet.
Husin, Mohd Zabidin +3 more
core
Towards Validating Risk Indicators Based on Measurement Theory (Extended version) [PDF]
Due to the lack of quantitative information and for cost-efficiency, most risk assessment methods use partially ordered values (e.g. high, medium, low) as risk indicators.
Morali, Ayse, Wieringa, Roel
core +6 more sources
The puncture prevention and energy absorption performance of composite metal foam (CMF) are studied experimentally and numerically for hazardous materials transportation protection. The numerical model implementing air within the CMF (nonhomogeneous model using fluid cavity technique) predicts puncture more accurately compared to the homogeneous CMF ...
Aman Kaushik, Afsaneh Rabiei
wiley +1 more source

