Credibility measurement of cloud services based on information entropy and Markov chain. [PDF]
Ou L, Yu J.
europepmc +1 more source
Consumer Behavior Toward Health‐Related Mobile Applications: A Hybrid Review and Future Agenda
ABSTRACT Mobile health (MH) has the potential to address many consumer challenges, but consumer responses to it remain varied. In this regard, the consumer's perspective on MH is becoming increasingly attractive to academia and business. This review aims to synthesize and analyze 103 studies from 2010 to 2024 using the Scientific Procedures and ...
Omer Faruk Celebi +3 more
wiley +1 more source
A Kyber-Based Lightweight Cloud-Assisted Authentication Scheme for Medical IoT. [PDF]
Yan H, Wang Z, Lin L, Sun J, Liu S.
europepmc +1 more source
Abstract Industrial wastewater contamination by azo dyes poses a significant environmental challenge. This study reports the green synthesis of bimetallic iron/nickel (Fe/Ni) nanoparticles using moringa leaf extract, which acted as both a reducing and capping agent, and their incorporation into polyethersulphone (PES) membranes to produce eco‐friendly ...
Qusay A. Almajras +7 more
wiley +1 more source
A Survey on the Computing Continuum and Meta-Operating Systems: Perspectives, Architectures, Outcomes, and Open Challenges. [PDF]
Gkonis PK +6 more
europepmc +1 more source
Investigating the Cytoskeleton of DRGs Using Cryo‐Electron Microscopy and Deep Learning
ABSTRACT We describe a method for determining the ultrastructural organization of axons and varicosities of cultured dorsal root ganglion (DRG) neurons using cryogenic electron microscopy (cryo‐EM). Cryo‐EM reveals the dimensions, proximity, and overall organization of biological specimens in a near‐native state, avoiding artifacts of fixation and ...
M. Neal Waxham +3 more
wiley +1 more source
A multi-layered cryptographic trust reinforcement model against AI-driven threat propagation and zero-day cloud vulnerabilities in healthcare data ecosystems. [PDF]
Rani M +5 more
europepmc +1 more source
Securing the cloud: Cloud computer security techniques and tactics [PDF]
openaire +1 more source
Sudan at War With Itself: Civilian Devastation in the Civil War
ABSTRACT A civil war is raging in Sudan between the Sudan Armed Forces (SAF) and the Rapid Support Forces (RSF) along with militia groups. Beginning on April 15, 2023, and continuing at least to this writing (October 15, 2025), civilian noncombatants have been subjected to bombings, beatings, torture, shootings, rape, and murder on a large scale. Since
Daniel Rothbart +3 more
wiley +1 more source
DBH-Chain: a decentralized blockchain-enabled healthcare framework for end-to-end delay optimization. [PDF]
Ali M, Kumar R, Tunio MZ, Lakhan A.
europepmc +1 more source

