Results 61 to 70 of about 110,621 (309)
Security Challenges in Fog Computing in Healthcare
Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems.
Mohammad Hossein Ronaghi +1 more
doaj
Part-Based Enhanced Super Resolution Network for Low-Resolution Person Re-Identification
Person re-identification (REID) is an important task in video surveillance and forensics applications. Many previous works often build models on the assumption that they have same resolution cross different camera views, while it is divorced from reality.
Yan Ha +5 more
doaj +1 more source
Objective The aim of this systematic review was to synthesize the economic impact of rheumatoid arthritis (RA) on households, health systems, and society in low‐ and middle‐income countries (LMICs). Methods Electronic databases such as PubMed, Web of Science, and CINAHL were searched using keywords related to RA and cost of illness.
Tadesse Gebrye +6 more
wiley +1 more source
Using deep learning to solve computer security challenges: a survey
Although using machine learning techniques to solve computer security challenges is not a new idea, the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer security community.
Yoon-Ho Choi +7 more
doaj +1 more source
Objective This study aimed to determine if program format (in‐person, virtual, or hybrid) results in differences in 3‐month outcomes of pain, function, quality of life, self‐efficacy, and chair stands in a hip/knee osteoarthritis‐management program. Methods A secondary analysis of the Good Life with osteoArthritis in Denmark (GLA:D) Canada database was
Jill Van Damme +7 more
wiley +1 more source
FBMP-IDS: FL-Based Blockchain-Powered Lightweight MPC-Secured IDS for 6G Networks
The coming 6G wireless network is poised to achieve unprecedented data rates, latency, and integration with newer technologies like AI and IoE. On the other hand, along with this kind of growth in the AI domain and the large-scale connectivity in 6G.
Sabrina Sakraoui +5 more
doaj +1 more source
Objective We conducted formative research aimed at identifying solutions that address inequitable health outcomes in lupus due to adverse social determinants of health (SDoH). Methods We conducted a search for keywords, which provided insights into potential solutions and initiatives underway. An advisory panel of lupus experts iteratively reviewed the
Joy Buie +11 more
wiley +1 more source
Retracted: Computer Security Issues and Legal System Based on Cloud Computing. [PDF]
Intelligence And Neuroscience C.
europepmc +1 more source
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy +9 more
wiley +1 more source
Design and Testing of a Computer Security Layer for the LIN Bus. [PDF]
Páez F, Kaschel H.
europepmc +1 more source

