Results 51 to 60 of about 967,964 (329)
Financial Distress and Its Determinants in Rheumatoid Arthritis
Objective To quantify the degree of financial distress and identify its determinants in adults with rheumatoid arthritis (RA) given the frequent prolonged use of expensive disease‐modifying therapies. Methods We identified adults enrolled in the FORWARD databank with either RA or noninflammatory musculoskeletal disease (NIMSKD) completing the ...
Amber Brown Keebler +5 more
wiley +1 more source
Multilevel security (MLS) is particularly intended to secure information against unauthorized access. An MLS security DBMS allows users with different security levels to access and share a database.
Hemin Sardar Abdulla, Aso M. Aladdin
doaj +1 more source
Security Architecture for a Secure Database on Android
As mobile devices are increasingly used in various daily activities, they have become a movable storage that stores various personal/business information of users. Most mobile OSes, including Android, store personal data in databases and provide APIs for
Jin Hyung Park +3 more
doaj +1 more source
Securing Databases from Probabilistic Inference
Databases can leak confidential information when users combine query results with probabilistic data dependencies and prior knowledge. Current research offers mechanisms that either handle a limited class of dependencies or lack tractable enforcement ...
Basin, David +2 more
core +1 more source
Objectives Systemic lupus erythematosus (SLE) is a heterogenous inflammatory condition, with widely varying global prevalence estimates. Frequency of SLE in the general population of Australia has been reported to be notably lower than contemporary estimates in countries such as the US or UK at 19‐39 per 100,000 as opposed to 65‐97 per 100,000.
Lucinda Roper +7 more
wiley +1 more source
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker +4 more
wiley +1 more source
Database anomaly detection model based on mining object-condition association rules
A database anomaly detection model based on mining object-condition association rules(OCAR) was proposed.Through analyzing and formalizing the only maximum conditional expression of SQL statements with WHERE clause, the object-condition association rule ...
DAI Hua +3 more
doaj
In data handling, security and privacy are essential for database administrators and users that own their information. Information about security models or architectures was analyzed for databases that minimize Cyber Attacks. The problem is that security
Segundo Moises Toapanta +3 more
doaj +1 more source
Income distribution patterns from a complete social security database
We analyze the income distribution of employees for 9 consecutive years (2001-2009) using a complete social security database for an economically important district of Romania.
Abul-Magd +39 more
core +1 more source
Synthetic Nanobiology Actuated Lipometabolic Cell Factory for Autologous Tumor Immunotherapy
FA plays a crucial role in the interaction between tumor cells and the tumor microenvironment, especially for the immune response. A biocatalytic immunoenhancement strategy is developed to boost antitumor immunity by FA metabolic orientation to ceramide. Through the design of this delicate catalytic immunoenhancement strategy, the synthetic nanobiology
Shoujie Zhao +8 more
wiley +1 more source

