Results 111 to 120 of about 214,208 (273)

The Global Epilepsy Needs Study (GENS): A mixed‐methods, multi‐country exploration of the unmet psychosocial and everyday needs of people with epilepsy

open access: yesEpilepsia Open, EarlyView.
Abstract Objective While epilepsy research has largely focused on medical management and clinical outcomes, less attention has been given to the unmet psychosocial and everyday needs of people with epilepsy (PWE), particularly in low‐ and middle‐income countries.
Gus A. Baker   +52 more
wiley   +1 more source

Expanding the scope of pediatric epilepsy surgery: Access, indications, and outcomes in a modern cohort

open access: yesEpilepsia Open, EarlyView.
Abstract Objective Expanded indications, diagnostic tools, and treatment options have transformed the landscape of modern pediatric epilepsy surgery. Published real‐world experiences from large surgical cohorts are still needed. To close this gap, we evaluated access, indications, treatment, and outcomes in a contemporary pediatric epilepsy surgery ...
John R. McLaren   +12 more
wiley   +1 more source

Essential Training for an Essential Role: Dietitians and Eating Disorder Care

open access: yesEuropean Eating Disorders Review, EarlyView.
ABSTRACT Aims Dietitians are critical members of the multidisciplinary eating disorder treatment team. Dietitians frequently encounter clients with undiagnosed or undisclosed eating disorders; however, many graduate dietitians lack specialised eating disorder training. This study evaluates the effectiveness of the Dietitian Essentials eLearning program
Caroline A. Hill   +5 more
wiley   +1 more source

Principal Component Analysis-Multilinear Perceptron-based model for Distributed Denial of Service Attack Mitigation

open access: yesABUAD Journal of Engineering Research and Development
The increasing occurrence of Distributed Denial of Service (DDoS) attacks has caused significant disruptions in global network services, overwhelming targets by flooding them with requests from various sources.
Opeyemi Oreoluwa Asaolu   +3 more
doaj   +1 more source

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

Evaluation of a Partial Ban on Rx‐Rebates in Germany

open access: yesHealth Economics, EarlyView.
ABSTRACT We investigate patients' price sensitivity for prescription (Rx) drugs with regards to patronizing online or brick‐and‐mortar pharmacies. In doing so, we exploit a policy change in Germany that prohibited online pharmacies from granting rebates to one part of the population, the members of the statutory health insurance scheme.
Maximilian M. Gail   +3 more
wiley   +1 more source

Cyber secure consensus of fractional order multi-agent systems with distributed delays: Defense strategy against denial-of-service attacks

open access: yesAin Shams Engineering Journal
Leader-follower cyber secure consensus problem in cybersecurity is crucial as it directly addresses the need for secure and stable communication in a networked system, which is paramount in safeguarding against cyber threats like denial-of-service ...
Asad Khan   +5 more
doaj   +1 more source

Applying Change Models and Methods During a Period of Vast Digital Transformation: A Systematic Review of Practice in Healthcare

open access: yesThe International Journal of Health Planning and Management, EarlyView.
ABSTRACT Introduction Reflection and learning about the use of virtual care in healthcare delivery has become a central goal for health systems internationally. Insights drawn in the aftermath of the COVID‐19 pandemic have led to vast changes to embed virtual care in health care delivery. This study explored the methodologies used to manage change that
Rebecca McDonnell   +12 more
wiley   +1 more source

Home - About - Disclaimer - Privacy