Results 221 to 230 of about 755,631 (334)
AI augmented edge and fog computing for Internet of Health Things (IoHT). [PDF]
Rajagopal D, Subramanian PKT.
europepmc +1 more source
Data Classification for Achieving Security in Cloud Computing
Rizwana Shaikh, M. Sasikumar
openalex +1 more source
ABSTRACT Objective This study aimed to examine the psychometric properties, including factor structure, internal consistency, and measurement invariance of the Eating Pathology Symptoms Inventory (EPSI) in a large national sample of transgender and gender‐diverse (TGD) adults. Method The sample consisted of 2098 TGD adults—including transgender men (n =
Jason M. Nagata+10 more
wiley +1 more source
Secure and intelligent 5G-enabled remote patient monitoring using ANN and Choquet integral fuzzy VIKOR. [PDF]
Chinnaperumal S+7 more
europepmc +1 more source
Post-Quantum Crystography based Security Framework for Cloud Computing
Gabriel A.J.+3 more
openalex +1 more source
Cloud Computing: Security Issues [PDF]
openaire +2 more sources
A Survey of Cloud Computing and Cloud Security [PDF]
Yi Sui, Xin Sui
openaire +2 more sources
Comorbidity trajectories before and after the diagnosis of heart failure: A UK Biobank cohort study
Time of diagnosis of comorbidities in relation to heart failure. COPD, chronic obstructive pulmonary disease; MI, myocardial infarction. Abstract Aims Heart failure (HF) is frequently associated with multiple comorbidities. We aimed to define their trajectory of accrual to identify opportunities for disease prevention. Methods and results We identified
Hugo MacGowan+12 more
wiley +1 more source
EcoTaskSched: a hybrid machine learning approach for energy-efficient task scheduling in IoT-based fog-cloud environments. [PDF]
Khan A+5 more
europepmc +1 more source
Three Level Cloud Computing Security Model
Pooja Sharma, Rajkumar Singh Rathore
openalex +1 more source