Results 71 to 80 of about 3,404,399 (295)

Advanced ENF Region Classification Using UniTS-SinSpec: A Novel Approach Integrating Sinusoidal Activation Function and Spectral Attention

open access: yesApplied Sciences
The electric network frequency (ENF), often referred to as the industrial heartbeat, plays a crucial role in the power system. In recent years, it has found applications in multimedia evidence identification for court proceedings and audio–visual ...
Yujin Li   +4 more
doaj   +1 more source

Quantum Private Query Protocol Based on Two Non-Orthogonal States

open access: yesEntropy, 2016
We propose a loss tolerant quantum private query (QPQ) protocol based on two non-orthogonal states and unambiguous state discrimination (USD) measurement.
Yan Chang   +5 more
doaj   +1 more source

Nonmalleable Information Flow: Technical Report

open access: yes, 2017
Noninterference is a popular semantic security condition because it offers strong end-to-end guarantees, it is inherently compositional, and it can be enforced using a simple security type system.
Arden, Owen   +2 more
core   +1 more source

Virtual or In‐Person: Does It Matter? Comparing Pain, Function, Quality of Life, Self‐Efficacy, and Physical Function Outcomes of Virtual, Hybrid, and In‐Person Education and Exercise Program Participants

open access: yesArthritis Care &Research, EarlyView.
Objective This study aimed to determine if program format (in‐person, virtual, or hybrid) results in differences in 3‐month outcomes of pain, function, quality of life, self‐efficacy, and chair stands in a hip/knee osteoarthritis‐management program. Methods A secondary analysis of the Good Life with osteoArthritis in Denmark (GLA:D) Canada database was
Jill Van Damme   +7 more
wiley   +1 more source

People Are the Answer to Security: Establishing a Sustainable Information Security Awareness Training (ISAT) Program in Organization

open access: yes, 2013
Educating the users on the essential of information security is very vital and important to the mission of establishing a sustainable information security in any organization and institute.
Ithnin, Norafida Binti   +1 more
core  

Information Security [PDF]

open access: yes, 2009
No abstract ...
Diaz-Rivera, Alexander
core   +1 more source

Identifying High‐Impact Solutions to Address Racial and Ethnic Health Disparities in Lupus: A Consensus‐Based Approach

open access: yesArthritis Care &Research, EarlyView.
Objective We conducted formative research aimed at identifying solutions that address inequitable health outcomes in lupus due to adverse social determinants of health (SDoH). Methods We conducted a search for keywords, which provided insights into potential solutions and initiatives underway. An advisory panel of lupus experts iteratively reviewed the
Joy Buie   +11 more
wiley   +1 more source

Pulmonary Vessel Segmentation via Stage-Wise Convolutional Networks With Orientation-Based Region Growing Optimization

open access: yesIEEE Access, 2018
For large-scale medical images, automatic pulmonary vessel segmentation is a fundamental and essential research for various pulmonary disease diagnoses.
Yajun Xu   +3 more
doaj   +1 more source

Towards a relation extraction framework for cyber-security concepts

open access: yes, 2015
In order to assist security analysts in obtaining information pertaining to their network, such as novel vulnerabilities, exploits, or patches, information retrieval methods tailored to the security domain are needed.
Bridges R. A.   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy