Results 131 to 140 of about 61,508 (265)

The Efficacy and Medium‐Term Patient‐Reported Outcomes Following Conversion From Sleeve Gastrectomy and Gastric Band to One Anastomoses Gastric Bypass: A Cohort Study

open access: yesANZ Journal of Surgery, EarlyView.
In this large single‐centre series, conversional one‐anastomosis gastric bypass was demonstrated to be safe and to deliver meaningful medium‐term weight loss with low morbidity after primary sleeve gastrectomy or gastric banding. While reflux was not universally resolved, patient‐reported satisfaction was high, and secondary enteroenterostomy provided ...
Aaron Lerch   +2 more
wiley   +1 more source

Real‐Time Cyberattack Detection for SCADA in Power System

open access: yesIET Energy Systems Integration
Supervisory Control and Data Acquisition (SCADA) systems monitor and control industrial processes, but their integration with information technology and network connectivity, including the internet, exposes them to potential cyber threats.
Botta Prudhvi   +2 more
doaj   +1 more source

Enhanced cybersecurity and cyber-attack detection in smart DC micro grids using blockchain technology and SVM technique

open access: yesAin Shams Engineering Journal
The DC-Microgrids (DC-MGs) are increasingly prone to various cyber-attacks due to the advancement of intelligent controlling, monitoring, operation methods.
Revathi Subramaniam   +2 more
doaj   +1 more source

Beyond the Rebel ‘Territorial Trap’: Governing Armed Sovereign Formations in Eastern Myanmar

open access: yesDevelopment and Change, EarlyView.
ABSTRACT Territorial control is a central concept in the study of civil wars and rebel governance. However, scholars often fall into a ‘territorial trap’, assuming that territorial control is either an outcome of or a precondition for armed governance. Based on immersive fieldwork in eastern Myanmar, this article traces how different spatial orderings ...
Tony Neil, Saw Day Chit Htoo
wiley   +1 more source

Analyze and Forecast the Cyber Attack Detection

open access: yesInternational Journal for Research in Applied Science and Engineering Technology
Abstract: The relentless evolution of digital technologies has ushered in an era of unprecedented connectivity and convenience, but it has also exposed our digital infrastructure to a growing spectrum of cyber threats. In this context, the importance of robust cyber attack detection mechanisms cannot be overstated.The increasing complexity and ...
Prof. Prakash Kshirsagar   +5 more
openaire   +1 more source

From Open Banking Regulation to Platform Orchestration: The Evolution of Digital Platform Governance

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT This study contributes to information systems (IS) scholarship by extending platform governance theory to regulatory contexts, explaining how regulatory forces co‐evolve with technological architectures to shape openness and control. This research examines the evolution of platform governance in the context of open banking, where regulatory ...
Priyadharshini Muthukannan   +3 more
wiley   +1 more source

When Is a Boundary Not a Boundary? Exploring the Tensions and Potentialities of Creative Practice in Doctoral Research in Art and Design Education

open access: yesInternational Journal of Art &Design Education, EarlyView.
Abstract Alongside their continuing growth in the popularity, both practice research in creative disciplines and arts‐based methods in research in the social sciences have histories now spanning several decades. In doctoral education, art and design education research sits within and across two distinct fields – the art and design doctorate and the ...
Sian Vaughan
wiley   +1 more source

How and Why EU Institutions Promote the Digital Euro: The Politics of a Central Bank Digital Currency (CBDC)

open access: yesJCMS: Journal of Common Market Studies, EarlyView.
Abstract The future of money is a crucial issue in the digital age, and the emergence of central bank digital currencies (CBDCs) is widely recognised as a transformative development. However, despite its significant implications for monetary sovereignty, regulatory governance and strategic autonomy, we know relatively little about the political ...
Sebastian Heidebrecht
wiley   +1 more source

Pan‐Europe Revisited: Inter‐War Debates and the EU's Pursuit of Geopolitical Power

open access: yesJCMS: Journal of Common Market Studies, EarlyView.
ABSTRACT The European Union's (EU) transformation from a peace project to an assertive geopolitical actor reflects enduring tensions in integration theory dating back to the inter‐war period. This paper develops a comparative framework distinguishing territorial integration logic, which emphasises bounded political communities and collective defence ...
Kamil Zwolski
wiley   +1 more source

From the Ground to the Stars: The Vertical Politics of the EU Drone Wall and Airspace Defence

open access: yesJCMS: Journal of Common Market Studies, EarlyView.
Abstract This research note analyses the European Commission's Defence Readiness Roadmap 2030 as a manifestation of a new spatial and technological logic of European defence: the vertical territorialisation of security. Moving beyond traditional perimeter‐based understandings of territorial defence, the Roadmap constructs a multi‐layered continuum ...
Justinas Lingevicius   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy