Results 51 to 60 of about 320,607 (275)
The rapid growth of Information and communication technology not only has positive impacts but also unveils opportunities for data and information security threats.
Aulia Arham, Hanung Adi Nugroho
doaj +1 more source
ABSTRACT As global populations age, cancer is increasingly becoming a leading cause of morbidity and mortality among older adults, particularly in low‐ and middle‐income countries (LMICs). Despite accounting for the majority of new cancer cases and deaths, older individuals remain underrepresented in cancer research, clinical guidelines, and health ...
Ibrahim Bidemi Abdullateef +2 more
wiley +1 more source
Impostor leader and knowledge hiding: Attachment avoidance as underlying mechanism
Impostorism and knowledge-hiding behaviors negatively impact employees and organizational performance. This study examines the association between impostor leaders and knowledge hiding (evasive hiding, playing dumb, and rationalized hiding).
Laibin Wang +3 more
doaj +1 more source
Objective We developed a novel EHR sidecar application to visualize key rheumatoid arthritis (RA) outcomes, including disease activity, physical function, and pain, via a patient‐facing graphical interface designed for use during outpatient visits (“RA PRO dashboard”).
Gabriela Schmajuk +16 more
wiley +1 more source
Steganalytic Methods for the Detection of Histogram Shifting Data Hiding Schemes [PDF]
Peer-reviewedIn this paper, several steganalytic techniques designed to detect the existence of hidden messages using histogram shifting schemes are presented.
Lerch Hostalot, Daniel +1 more
core
Introduction Rheumatic and musculoskeletal diseases(RMDs) are leading causes of physical disability, necessitating support with activities of daily living(ADLs). This study describes social care received by patients with RMDs in two disperate regions of England: Salford(urban) and Norfolk(rural).
Mehreen Somro +6 more
wiley +1 more source
Private states, quantum data hiding and the swapping of perfect secrecy
We derive a formal connection between quantum data hiding and quantum privacy, confirming the intuition behind the construction of bound entangled states from which secret bits can be extracted. We present three main results.
Christandl, Matthias, Ferrara, Roberto
core +1 more source
What Do Large Language Models Know About Materials?
If large language models (LLMs) are to be used inside the material discovery and engineering process, they must be benchmarked for the accurateness of intrinsic material knowledge. The current work introduces 1) a reasoning process through the processing–structure–property–performance chain and 2) a tool for benchmarking knowledge of LLMs concerning ...
Adrian Ehrenhofer +2 more
wiley +1 more source
Separable and Error-Free Reversible Data Hiding in Encrypted Image Based on Two-Layer Pixel Errors
Reversible data hiding is an important topic of data hiding. This paper proposes a novel separable and error-free reversible data hiding in an encrypted image based on two-layer pixel errors.
Chunqiang Yu +3 more
doaj +1 more source
Data hiding in encryption–compression domain
This paper introduces a robust and secure data hiding scheme to transmit grayscale image in encryption-then-compression domain. First, host image is transformed using lifting wavelet transform, Hessenberg decomposition and redundant singular value ...
O. P. Singh, A. K. Singh
doaj +1 more source

