Results 81 to 90 of about 5,949,154 (313)

Security in Brain-Computer Interfaces

open access: yesACM Computing Surveys, 2019
Brain-Computer Interfaces (BCIs) have significantly improved the patients’ quality of life by restoring damaged hearing, sight, and movement capabilities.
Sergio López Bernal   +4 more
semanticscholar   +1 more source

Effectiveness and Safety of Baricitinib for Juvenile Idiopathic Arthritis–Associated Uveitis or Chronic Anterior Antinuclear Antibody–Positive Uveitis

open access: yesArthritis Care &Research, EarlyView.
Objective To evaluate the efficacy and safety of baricitinib in pediatric patients with active juvenile idiopathic arthritis–associated uveitis (JIA‐U) or chronic anterior antinuclear antibody–positive uveitis, who had an inadequate response to methotrexate (MTX) or biologic disease‐modifying antirheumatic drugs (bDMARDs).
Athimalaipet V. Ramanan   +7 more
wiley   +1 more source

Keamanan pada Grid Computing~Survey Paper

open access: yesElkawnie: Journal of Islamic Science and Technology, 2015
Grid computing provides high computing power, enormous data storage, and collaboration possibilities to its users. Grid computing is currently in the midst of evolving standards, inheriting and customizing from those developed in the high performance ...
Ghufran Ibnu Yasa
doaj   +1 more source

Smart Computer Security Audit: Reinforcement Learning with a Deep Neural Network Approximator [PDF]

open access: yes, 2020
A significant challenge in modern computer security is the growing skill gap as intruder capabilities increase, making it necessary to begin automating elements of penetration testing so analysts can contend with the growing number of cyber threats.
Alonso, E.   +4 more
core  

Financial Distress and Its Determinants in Rheumatoid Arthritis

open access: yesArthritis Care &Research, EarlyView.
Objective To quantify the degree of financial distress and identify its determinants in adults with rheumatoid arthritis (RA) given the frequent prolonged use of expensive disease‐modifying therapies. Methods We identified adults enrolled in the FORWARD databank with either RA or noninflammatory musculoskeletal disease (NIMSKD) completing the ...
Amber Brown Keebler   +5 more
wiley   +1 more source

Validation of the Pediatric Arthritis Ultrasound Scoring System for the Elbow, Wrist, and Finger Joints in Children With Juvenile Idiopathic Arthritis

open access: yesArthritis Care &Research, EarlyView.
Objective We aimed to validate the Pediatric Arthritis Ultrasound Scoring System (PAUSS) for upper extremity joints in children with juvenile idiopathic arthritis (JIA). Methods Children with JIA were evaluated for elbow, wrist, or finger arthritis by clinical examination (CE) and musculoskeletal ultrasound (MSUS) with images scored according to the ...
Patricia Vega‐Fernandez   +12 more
wiley   +1 more source

From Container to Cluster: Chained Escape Attacks in Kubernetes and Orchestration Platforms

open access: yesIEEE Access
Container virtualization offers a lightweight and agile alternative to traditional virtual machines, yet its reliance on a shared host kernel creates a fundamentally weaker isolation boundary. This architectural choice exposes systems to container escape
Jia-Ning Luo   +2 more
doaj   +1 more source

Association Between Symptomatic Knee Osteoarthritis and Target Glycemic Control in Individuals with Type 2 Diabetes

open access: yesArthritis Care &Research, Accepted Article.
Objective Knee osteoarthritis (OA) commonly affects individuals with Type 2 diabetes (T2DM) and is associated with increased risk of diabetes‐related complications. To better understand potential mechanisms, we examined the association between symptomatic knee OA and glycemic control in individuals with T2DM.
Lauren K. King   +10 more
wiley   +1 more source

Secure Maritime VHF Broadcast Authentication Using TESLA: Design, Simulation, and Implementation Insights

open access: yesIEEE Access
The VHF Data Exchange System (VDES) is emerging as a next-generation standard for maritime wireless communication, extending the Automatic Identification System (AIS) and voice services with higher data rates.
Minwoo Lee, Jongkwan Lee
doaj   +1 more source

Some Fundamental Cybersecurity Concepts

open access: yesIEEE Access, 2014
The results of successful hacking attacks against commercially available cybersecurity protection tools that had been touted as secure are distilled into a set of concepts that are applicable to many protection planning scenarios.
Kelce S. Wilson, Muge Ayse Kiy
doaj   +1 more source

Home - About - Disclaimer - Privacy