Results 71 to 80 of about 3,352,449 (323)

Research on Hybrid Recommendation Model for Personalized Recommendation Scenarios

open access: yesApplied Sciences, 2023
One of the five types of Internet information service recommendation technologies is the personalized recommendation algorithm, and knowledge graphs are frequently used in these algorithms.
Wenkai Ni   +3 more
doaj   +1 more source

Secure Web-Based Student Information Management System [PDF]

open access: yesarXiv, 2022
The reliability and success of any organization such as academic institution rely on its ability to provide secure, accurate and timely data about its operations. Erstwhile managing student information in academic institution was done through paper-based information system, where academic records are documented in several files that are kept in shelves.
arxiv  

Music Interventions in Hyperacute and Acute Stroke Patients: A Randomized Controlled Pilot Feasibility Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Music interventions have been shown to have beneficial effects on hemodynamic parameters, pain, and anxiety in various medical settings. However, music interventions in the setting of acute stroke have not been studied. The objective of this trial was to perform a pilot feasibility study of music interventions in the setting of acute
Jeffrey J. Fletcher   +7 more
wiley   +1 more source

Considerations for Cloud Security Operations [PDF]

open access: yesOracle CSO Advisory Board, Cloud Security Session, January, 2016, 2016
Information Security in Cloud Computing environments is explored. Cloud Computing is presented, security needs are discussed, and mitigation approaches are listed. Topics covered include Information Security, Cloud Computing, Private Cloud, Public Cloud, SaaS, PaaS, IaaS, ISO 27001, OWASP, Secure SDLC.
arxiv  

Recent Advances in Information Security

open access: yesThe Scientific World Journal, 2014
[No abstract available]
Fei Yu   +4 more
openaire   +6 more sources

Home‐Based Tele‐tDCS in Amyotrophic Lateral Sclerosis: Feasibility, Safety, and Preliminary Efficacy

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Amyotrophic lateral sclerosis (ALS) is a progressive neurodegenerative disease with limited treatment options. Transcranial direct current stimulation (tDCS) shows promise as a neuromodulatory intervention in various neurological disorders, but its application in ALS, particularly in a remote, home‐based format, remains underexplored.
Sangeetha Madhavan   +6 more
wiley   +1 more source

Quantum Private Query Protocol Based on Two Non-Orthogonal States

open access: yesEntropy, 2016
We propose a loss tolerant quantum private query (QPQ) protocol based on two non-orthogonal states and unambiguous state discrimination (USD) measurement.
Yan Chang   +5 more
doaj   +1 more source

The Formal Metabasis For Conformity Assessment of Information Security Software and Hardware [PDF]

open access: yesarXiv, 2013
An approach to the development of security test procedures for information security controls is presented.
arxiv  

Techniques for Enhanced Physical-Layer Security [PDF]

open access: yes, 2010
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications systems. Within this paradigm, we explore strategies to improve secure connectivity in a wireless network.
arxiv   +1 more source

Do Software Security Practices Yield Fewer Vulnerabilities? [PDF]

open access: yesarXiv, 2022
Due to the ever-increasing security breaches, practitioners are motivated to produce more secure software. In the United States, the White House Office released a memorandum on Executive Order (EO) 14028 that mandates organizations provide self-attestation of the use of secure software development practices.
arxiv  

Home - About - Disclaimer - Privacy