Results 181 to 190 of about 168,960 (287)
BAAR: A framework for blockchain-based anonymous and revocable user authentication scheme. [PDF]
Ahmed M, Ahmad A, Zeshan F, Akram S.
europepmc +1 more source
Toddlers and terriers: a One Health partnership to combat antimicrobial resistance
Journal of Small Animal Practice, EarlyView.
M. Prodanuk, F. Emdin
wiley +1 more source
Perspectives On Machine Learning Inference Serving in Real‐World Settings
ABSTRACT Introduction As machine learning (ML)‐enabled systems become increasingly prevalent across industries, the engineering challenges of deploying and maintaining them in production have emerged as critical. The existing engineering knowledge base often derives from conceptual frameworks or case studies conducted by large technology companies ...
Dennis Muiruri +3 more
wiley +1 more source
A Kyber-Based Lightweight Cloud-Assisted Authentication Scheme for Medical IoT. [PDF]
Yan H, Wang Z, Lin L, Sun J, Liu S.
europepmc +1 more source
ABSTRACT Objective To estimate utilization and economic effects of a language‐concordant, pharmacist‐integrated care‐management program and examine equity by language and insurance. Study Setting and Design We conducted a retrospective cohort study emulating a target trial across four Phoenix safety‐net clinics (March 2022–September 2023) using inverse
Sasha R. Sioni +4 more
wiley +1 more source
A hybrid blockchain migration framework for converting traditional databases into blockchain-based EMR systems. [PDF]
Al-Busaidi A, Mani J, Yoosuf MS, P V.
europepmc +1 more source
Abstract Background and aims Epidemiologic research suggests that adolescent cannabis use is associated with psychological distress (i.e. depression and anxiety symptoms); however, most studies have relied on 20th‐century data, when cannabis was significantly less potent than today.
André J. McDonald +12 more
wiley +1 more source
ABSTRACT Child sexual abuse (CSA) cases can involve multiple similar incidents over a long duration. Complainants can either report the offence shortly after it occurs, leading to a brief delay between the end of the abuse and court hearing (timely delay; CSA) or the court hearing takes place 2 or more years after its occurrence (delayed; historical ...
Fiza Hasan +2 more
wiley +1 more source
Two secure authentication protocols for mitigating vulnerabilities in IoD. [PDF]
Safkhani M, Ghorbani Fard M.
europepmc +1 more source
Platform system to create biofabricated 3D spinal cord tissue models: Combining high resolution PCL fiber placement, a customized, hyaluronic acid‐based hydrogel, two cell types (spinal cord neurons and astrocytes) together with three distinct laminin isoforms allow the formation of functional cell–cell network interactions.
Nicoletta Murenu +12 more
wiley +1 more source

