Results 31 to 40 of about 188,146 (296)

Dissemination of evidence-based standards of care. [PDF]

open access: yes, 2011
Standards of care pertain to crafting and implementing patient-centered treatment interventions. Standards of care must take into consideration the patient's gender, ethnicity, medical and dental history, insurance coverage (or socioeconomic level, if a ...
Barkhordarian, Andre   +2 more
core   +3 more sources

INSERTING MESSAGE SECRET ON FILE DATA BANK USING STEGANOGRAPHY ENGINEERING WITH EOF (END OF FILE) METHOD

open access: yesJurnal Riset Informatika, 2020
Exchanging information does not realize that is important information. Circulates often important information insignificant but such as account bank customer information.
Michael Sitorus, Deki Satria
doaj   +1 more source

Recycling Argon through Metamorphic Reactions: the Record in Symplectites [PDF]

open access: yes, 2018
The 40Ar/39Ar ages of metamorphic micas that crystallized at high temperatures are commonly interpreted as cooling ages, with grains considered to have lost 40Ar via thermally-driven diffusion into the grain boundary network.
Allaz   +82 more
core   +2 more sources

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Analyzing Network Traffic for Malicious Hacker Activity [PDF]

open access: yes, 2004
Since the Internet came into life in the 1970s, it has been growing more than 100% every year. On the other hand, the solutions to detecting network intrusion are far outpaced.
Pyke, Randall
core  

Complex Cryptographic and User‐Centric Physically Unclonable Functions Enabled by Strain‐Sensitive Nanocrystals via Selective Ligand Exchange

open access: yesAdvanced Functional Materials, EarlyView.
This study investigates electromechanical PUFs that improve on traditional electric PUFs. The electron transport materials are coated randomly through selective ligand exchange. It produces multiple keys and a key with motion dependent on percolation and strain, and approaches almost ideal inter‐ and intra‐hamming distances.
Seungshin Lim   +7 more
wiley   +1 more source

Personal HealthCare of Things: A novel paradigm and futuristic approach

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta   +5 more
wiley   +1 more source

Guerras culturais, hacking e as vulnerabilidades do jornalismo à desinformação

open access: yesLiinc em Revista, 2023
O artigo busca identificar vulnerabilidades do jornalismo que vêm sendo exploradas por grupos de interesse capazes de “hackear” as rotinas produtivas das redações para difundir desinformação.
Marcelo Träsel
doaj   +1 more source

Website Application Security Scanner Using Local File Inclusion and Remote File Inclusion [PDF]

open access: yes, 2012
Today many web-based applications developed to be accessible via the internet. The problem that often occurs is commonly found on web application vulnerabilities.
Gunawan, Ibnu   +2 more
core  

Getting Back to Basics [PDF]

open access: yes, 2007
One of the challenges of working with students across a college campus is achieving consistency with instruction. Student writers learn varied methods for revision and receive different (and often ineffective) kinds of feedback on their writing.
Mills, Gayla
core   +1 more source

Home - About - Disclaimer - Privacy