Results 31 to 40 of about 188,146 (296)
Dissemination of evidence-based standards of care. [PDF]
Standards of care pertain to crafting and implementing patient-centered treatment interventions. Standards of care must take into consideration the patient's gender, ethnicity, medical and dental history, insurance coverage (or socioeconomic level, if a ...
Barkhordarian, Andre +2 more
core +3 more sources
Exchanging information does not realize that is important information. Circulates often important information insignificant but such as account bank customer information.
Michael Sitorus, Deki Satria
doaj +1 more source
Recycling Argon through Metamorphic Reactions: the Record in Symplectites [PDF]
The 40Ar/39Ar ages of metamorphic micas that crystallized at high temperatures are commonly interpreted as cooling ages, with grains considered to have lost 40Ar via thermally-driven diffusion into the grain boundary network.
Allaz +82 more
core +2 more sources
Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed +8 more
wiley +1 more source
Analyzing Network Traffic for Malicious Hacker Activity [PDF]
Since the Internet came into life in the 1970s, it has been growing more than 100% every year. On the other hand, the solutions to detecting network intrusion are far outpaced.
Pyke, Randall
core
This study investigates electromechanical PUFs that improve on traditional electric PUFs. The electron transport materials are coated randomly through selective ligand exchange. It produces multiple keys and a key with motion dependent on percolation and strain, and approaches almost ideal inter‐ and intra‐hamming distances.
Seungshin Lim +7 more
wiley +1 more source
Personal HealthCare of Things: A novel paradigm and futuristic approach
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta +5 more
wiley +1 more source
Guerras culturais, hacking e as vulnerabilidades do jornalismo à desinformação
O artigo busca identificar vulnerabilidades do jornalismo que vêm sendo exploradas por grupos de interesse capazes de “hackear” as rotinas produtivas das redações para difundir desinformação.
Marcelo Träsel
doaj +1 more source
Website Application Security Scanner Using Local File Inclusion and Remote File Inclusion [PDF]
Today many web-based applications developed to be accessible via the internet. The problem that often occurs is commonly found on web application vulnerabilities.
Gunawan, Ibnu +2 more
core
One of the challenges of working with students across a college campus is achieving consistency with instruction. Student writers learn varied methods for revision and receive different (and often ineffective) kinds of feedback on their writing.
Mills, Gayla
core +1 more source

