Results 71 to 80 of about 1,364,067 (299)

Lived and care experiences of chronic musculoskeletal shoulder pain in Australian adults: A qualitative study

open access: yesArthritis Care &Research, Accepted Article.
Objectives Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centred care and informing local service pathways and care guidelines or standards.
Sonia Ranelli   +8 more
wiley   +1 more source

Using deep learning to solve computer security challenges: a survey

open access: yesCybersecurity, 2020
Although using machine learning techniques to solve computer security challenges is not a new idea, the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer security community.
Yoon-Ho Choi   +7 more
doaj   +1 more source

The Economic Burden of Rheumatoid Arthritis in Low‐ and Middle‐Income Countries: Systematic Review and Meta‐Analysis

open access: yesArthritis Care &Research, Accepted Article.
Objective The aim of this systematic review was to synthesise the economic impact of rheumatoid arthritis (RA) on households, health systems, and society in low‐ and middle‐income countries (LMICs). Methods Electronic databases such as PubMed, Web of Science, and CINAHL were searched using keywords related to RA and cost of illness.
Tadesse Gebrye   +6 more
wiley   +1 more source

Towards Security Requirements in Online Summative Assessments

open access: yes, 2009
Confidentiality, integrity and availability (C-I-A) are the security requirements fundamental to any computer system. Similarly, the hardware, software and data are important critical assets.
Apampa, K.M, Argles, D, Wills, G.B
core  

Sicurezza nelle reti: utilizzo di architetture multi-core per il monitoraggio del traffico IP [PDF]

open access: yes, 2013
The IP packet capture activity has always assumed great importance in the computer networks security. It's daily used in fact to monitor and analyze the IP traffic passing through a computer networks with the purpose to identify anomalous behaviors that ...
Mezzalama, Marco   +2 more
core  

Smart Computer Security Audit: Reinforcement Learning with a Deep Neural Network Approximator [PDF]

open access: yes, 2020
A significant challenge in modern computer security is the growing skill gap as intruder capabilities increase, making it necessary to begin automating elements of penetration testing so analysts can contend with the growing number of cyber threats.
Alonso, E.   +4 more
core  

Virtual or in‐person: does it matter? Comparing pain, function, quality of life, self‐efficacy and physical function outcomes of virtual, hybrid and in‐person GLA:D Canada participants

open access: yesArthritis Care &Research, Accepted Article.
Objective This study aimed to determine if program format (in‐person, virtual, hybrid) results in differences in three‐month outcomes of pain, function, quality of life, self‐efficacy and chair stands in a hip/knee osteoarthritis management program. Methods A secondary analysis of the GLA:DTM Canada database was completed.
Jill Van Damme   +7 more
wiley   +1 more source

Security Challenges in Fog Computing in Healthcare

open access: yesپیاورد سلامت, 2020
Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems.
Mohammad Hossein Ronaghi   +1 more
doaj  

Security Architecture for Cloud-Based Command and Control System in IoT Environment

open access: yesApplied Sciences, 2020
With the development of the fourth industrial technology, such as the Internet of Things (IoT) and cloud computing, developed countries including the U.S.
Jahoon Koo   +3 more
doaj   +1 more source

Identifying High‐Impact Solutions to Address Racial and Ethnic Health Disparities in Lupus: A Consensus‐Based Approach

open access: yesArthritis Care &Research, Accepted Article.
Objective We conducted formative research aimed at identifying solutions that address inequitable health outcomes in lupus due to adverse social determinants of health. Methods We conducted a search for keywords which provided insights into potential solutions and initiatives underway. An advisory panel of lupus experts iteratively reviewed the list of
Joy Buie   +11 more
wiley   +1 more source

Home - About - Disclaimer - Privacy