Results 91 to 100 of about 56,667 (320)
ASOD: an adaptive stream outlier detection method using online strategy
In the current era of information technology, blockchain is widely used in various fields, and the monitoring of the security and status of the blockchain system is of great concern. Online anomaly detection for the real-time stream data plays vital role
Zhichao Hu +4 more
doaj +1 more source
Objective This study aimed to determine if program format (in‐person, virtual, or hybrid) results in differences in 3‐month outcomes of pain, function, quality of life, self‐efficacy, and chair stands in a hip/knee osteoarthritis‐management program. Methods A secondary analysis of the Good Life with osteoArthritis in Denmark (GLA:D) Canada database was
Jill Van Damme +7 more
wiley +1 more source
A metaheuristic image cryptosystem using improved parallel model and many‐objective optimization
Metaheuristic is one of the techniques to improve the security of image encryption. However, existing metaheuristic image cryptosystems based on metaheuristic may have convergence difficulties during the optimization process, which cause insecurity and ...
Zihao Xin +4 more
doaj +1 more source
Objective The aim of this study was to investigate the cost‐effectiveness of low‐dose colchicine prophylaxis for preventing gout flares when starting allopurinol using the “start‐low go‐slow” approach. Methods Participants with gout, fulfilling the American College of Rheumatology recommendations for starting urate‐lowering therapy and with serum urate
Yana Pryymachenko +4 more
wiley +1 more source
On the essence of cyber space and its relationship with cybernetic space
The subject of the study is understanding of the relationship between the concepts of cyberspace and cybernetic space. The goal is to clarify the essence of the concept of cyberspace and outline its relationship with the cybernetic space. The task is to
Petro Snitsarenko +2 more
doaj +1 more source
Russian Aggression on Ukraine: Cyber Operations and the Influence of Cyberspace on Modern Warfare
Damjan Štrucl
openalex +1 more source
A Study on the Challenge and Adjustment Strategies of the Weakening of Mainstream Ideology in Cyberspace to Political Identity [PDF]
Lei Xu
openalex +1 more source
Objective We conducted formative research aimed at identifying solutions that address inequitable health outcomes in lupus due to adverse social determinants of health (SDoH). Methods We conducted a search for keywords, which provided insights into potential solutions and initiatives underway. An advisory panel of lupus experts iteratively reviewed the
Joy Buie +11 more
wiley +1 more source
Cyberspace Endogenous Safety and Security
Jiangxing Wu
semanticscholar +1 more source
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy +9 more
wiley +1 more source

