Results 91 to 100 of about 5,949,154 (313)

Sicurezza nelle reti: utilizzo di architetture multi-core per il monitoraggio del traffico IP [PDF]

open access: yes, 2013
The IP packet capture activity has always assumed great importance in the computer networks security. It's daily used in fact to monitor and analyze the IP traffic passing through a computer networks with the purpose to identify anomalous behaviors that ...
Mezzalama, Marco   +2 more
core  

New Onset of Fibromyalgia After Exposure to a Combat Environment: A Longitudinal Cohort Study

open access: yesArthritis Care &Research, EarlyView.
Objective Traumatic life events are hypothesized to be triggers for the onset of fibromyalgia. Posttraumatic stress disorder (PTSD) is a common comorbidity of fibromyalgia. However, limited prospective data are available on the development of fibromyalgia after exposure to high‐magnitude stress.
Jay B. Higgs   +15 more
wiley   +1 more source

FBMP-IDS: FL-Based Blockchain-Powered Lightweight MPC-Secured IDS for 6G Networks

open access: yesIEEE Access
The coming 6G wireless network is poised to achieve unprecedented data rates, latency, and integration with newer technologies like AI and IoE. On the other hand, along with this kind of growth in the AI domain and the large-scale connectivity in 6G.
Sabrina Sakraoui   +5 more
doaj   +1 more source

Does Long‐Term Lower Extremity Strength Training in Adults With Knee Osteoarthritis and Varus Alignment Reduce Knee Joint Loading During Gait?

open access: yesArthritis Care &Research, EarlyView.
Objective We examined whether 18 months of strength training in individuals with knee varus alignment and medial tibiofemoral osteoarthritis (OA) reduced knee joint loads during walking compared to an attention control group. Methods This study was a secondary analysis of a randomized clinical trial that compared the effects of strength training to a ...
Stephen P. Messier   +12 more
wiley   +1 more source

Towards Security Requirements in Online Summative Assessments

open access: yes, 2009
Confidentiality, integrity and availability (C-I-A) are the security requirements fundamental to any computer system. Similarly, the hardware, software and data are important critical assets.
Apampa, K.M, Argles, D, Wills, G.B
core  

Prevalence of Systemic Lupus Erythematosus in Australia, 2010–2022: A Population‐Based Study Using Linked National Administrative Health Data

open access: yesArthritis Care &Research, Accepted Article.
Objectives Systemic lupus erythematosus (SLE) is a heterogenous inflammatory condition, with widely varying global prevalence estimates. Frequency of SLE in the general population of Australia has been reported to be notably lower than contemporary estimates in countries such as the US or UK at 19‐39 per 100,000 as opposed to 65‐97 per 100,000.
Lucinda Roper   +7 more
wiley   +1 more source

Security Challenges in Fog Computing in Healthcare

open access: yesپیاورد سلامت, 2020
Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems.
Mohammad Hossein Ronaghi   +1 more
doaj  

Hopfield Neural Networks for Online Constrained Parameter Estimation With Time‐Varying Dynamics and Disturbances

open access: yesInternational Journal of Adaptive Control and Signal Processing, EarlyView.
This paper proposes two projector‐based Hopfield neural network (HNN) estimators for online, constrained parameter estimation under time‐varying data, additive disturbances, and slowly drifting physical parameters. The first is a constraint‐aware HNN that enforces linear equalities and inequalities (via slack neurons) and continuously tracks the ...
Miguel Pedro Silva
wiley   +1 more source

Home - About - Disclaimer - Privacy