Results 81 to 90 of about 9,838,902 (340)
As many patients with inflammatory arthritis (IA) have chronic pain, understanding how to best assess and manage pain in IA is a priority. Comorbid depression is prevalent in adults with IA, affecting 15% to 39% of people. Although pain and depression are thought to be associated in IA, this concept is largely based on cross‐sectional data.
Natasha Cox+3 more
wiley +1 more source
Information Hiding Based on Chan-Vese Algorithm [PDF]
The process of data transfer via the Internet becomes an easy process as a result of the great advances in networking technologies, and now many people can communicate with each other easily and quickly through them.Because the online environment is ...
Samia Sh. Lazar, Nadia M. Mohammed
doaj +1 more source
A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents
With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple.
Milad Taleby Ahvanooey+3 more
semanticscholar +1 more source
On the Bayes risk in information-hiding protocols [PDF]
Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the probability of error associated to the MAP (maximum a posteriori ...
Chatzikokolakis, Konstantinos+2 more
openaire +5 more sources
Summary Data‐driven forecasting of ship motions in waves is investigated through feedforward and recurrent neural networks as well as dynamic mode decomposition. The goal is to predict future ship motion variables based on past data collected on the field, using equation‐free approaches.
Matteo Diez+2 more
wiley +1 more source
Code fusion information-hiding algorithm based on PE file function migration
PE (portable executable) file has the characteristics of diversity, uncertainty of file size, complexity of file structure, and singleness of file format, which make it easy to be a carrier of information hiding, especially for that of large hiding ...
Zuwei Tian, Hengfu Yang
doaj +1 more source
Neural Network Adaptive Control With Long Short‐Term Memory
ABSTRACT In this study, we propose a novel adaptive control architecture that provides dramatically better transient response performance compared to conventional adaptive control methods. This is accomplished by the synergistic employment of a traditional adaptive neural network (ANN) controller and a long short‐term memory (LSTM) network.
Emirhan Inanc+4 more
wiley +1 more source
Information Hiding Over Mobile using Bluetooth [PDF]
Due to the evolution of massive means of communication and the exchange of information has become personal privacy vulnerable to abuse more easily than ever before, so there is a need to adopt the technology more sophisticated and more secret and ...
doaj +1 more source
Extracellular vesicles (EVs) play a dual role in diagnostics and therapeutics, offering innovative solutions for treating cancer, cardiovascular, neurodegenerative, and orthopedic diseases. This review highlights EVs’ potential to revolutionize personalized medicine through specific applications in disease detection and treatment.
Farbod Ebrahimi+4 more
wiley +1 more source
Image encryption algorithm based on reversible information hiding and physical chaos in images
This article proposes a reversible information hiding algorithm based on chaos and histogram translation in ciphertext images to address the shortcomings of traditional algorithms such as separation of encryption and information hiding processes, small ...
Pengcheng Liu
doaj