Results 51 to 60 of about 391,871 (286)

Re‐Awakening Public Attention to the Silent Pandemic of Cancer Among Older Adults in Low‐ and Middle‐Income Countries

open access: yesAging and Cancer, EarlyView.
ABSTRACT As global populations age, cancer is increasingly becoming a leading cause of morbidity and mortality among older adults, particularly in low‐ and middle‐income countries (LMICs). Despite accounting for the majority of new cancer cases and deaths, older individuals remain underrepresented in cancer research, clinical guidelines, and health ...
Ibrahim Bidemi Abdullateef   +2 more
wiley   +1 more source

Research on Influencing Factors of Knowledge Hiding Behavior in Socialized Q&A Communities: Taking Zhihu as an Example

open access: yesComplexity, 2022
With the normalization of epidemic prevention and control, the expression of the public’s demand for health information on online platforms continues to increase, while knowledge hiding behavior has seriously hindered the communication and dissemination ...
Wen-Zhu Li   +3 more
doaj   +1 more source

Hiding information in image using circular distribuition [PDF]

open access: yes, 2016
В статье рассматриваются метод скрытия информации при передаче сообщений через сеть Интернет. Основой метода является скрытие информации в носителе другого типа, или стеганография.
Al-Ani, A. A., Аль-Ани, А. А.
core  

Comparing the Effect of Semi‐Immersive Virtual Reality, Computerized Cognitive Training, and Traditional Rehabilitation on Cognitive Function in Multiple Sclerosis: A Randomized Clinical Trial

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Cognitive impairment is a common non‐motor symptom in Multiple Sclerosis (MS), negatively affecting autonomy and Quality of Life (QoL). Innovative rehabilitation strategies, such as semi‐immersive virtual reality (VR) and computerized cognitive training (CCT), may offer advantages over traditional cognitive rehabilitation (TCR ...
Maria Grazia Maggio   +8 more
wiley   +1 more source

Dynamic Input/Output Automata: a Formal and Compositional Model for Dynamic Systems [PDF]

open access: yes, 2016
We present dynamic I/O automata (DIOA), a compositional model of dynamic systems. In DIOA, automata can be created and destroyed dynamically, as computation proceeds, and an automaton can dynamically change its signature, i.e., the set of actions in ...
Attie, Paul C., Lynch, Nancy A.
core   +2 more sources

INFORMATION HIDING IN VIDEO [PDF]

open access: yesJES. Journal of Engineering Sciences, 2006
This paper proposes a video information-embedding scheme in which the embedded information is reconstructed without knowing the original host video. The proposed method presents high rate of information embedding and is robust to motion compensated coding, such as MPEG-II and MPEG-III.
Yousef B. Mahdy, Mohammed A. Atiea
openaire   +1 more source

Evaluation of a Novel Electric Health Record Sidecar Application to Display Rheumatoid Arthritis Clinical Outcomes During Clinic Visits: Results of a Stepped‐Wedge Cluster Randomized Pragmatic Trial

open access: yesArthritis Care &Research, EarlyView.
Objective We developed a novel electronic health record sidecar application to visualize key rheumatoid arthritis (RA) outcomes, including disease activity, physical function, and pain, via a patient‐facing graphical interface designed for use during outpatient visits (“RA PRO dashboard”).
Gabriela Schmajuk   +16 more
wiley   +1 more source

Implicit temporal discretization and exact energy conservation for particle methods applied to the Poisson-Boltzmann equation

open access: yes, 2018
Wereportonanewmultiscalemethodapproachforthestudyofsystemswith wide separation of short-range forces acting on short time scales and long-range forces acting on much slower scales. We consider the case of the Poisson-Boltzmann equation that describes the
Jiang, Wei, Lapenta, Giovanni
core   +1 more source

High capacity steganographic method based upon JPEG [PDF]

open access: yes, 2008
The two most important aspects of any image-based steganographic system are the quality of the stegoimage and the capacity of the cover image. This paper proposes a novel and high capacity steganographic approach based on Discrete Cosine Transformation (
Al-Mohammad, A, Ghinea, G, Hierons, RM
core   +1 more source

Separation and information hiding

open access: yesProceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages, 2004
We investigate proof rules for information hiding, using the recent formalism of separation logic. In essence, we use the separating conjunction to partition the internal resources of a module from those accessed by the module's clients. The use of a logical connective gives rise to a form of dynamic partitioning, where we track the transfer of ...
O'Hearn, P, Yang, H, Reynolds, J
openaire   +3 more sources

Home - About - Disclaimer - Privacy