Results 71 to 80 of about 3,352,449 (323)
Research on Hybrid Recommendation Model for Personalized Recommendation Scenarios
One of the five types of Internet information service recommendation technologies is the personalized recommendation algorithm, and knowledge graphs are frequently used in these algorithms.
Wenkai Ni+3 more
doaj +1 more source
Secure Web-Based Student Information Management System [PDF]
The reliability and success of any organization such as academic institution rely on its ability to provide secure, accurate and timely data about its operations. Erstwhile managing student information in academic institution was done through paper-based information system, where academic records are documented in several files that are kept in shelves.
arxiv
ABSTRACT Objective Music interventions have been shown to have beneficial effects on hemodynamic parameters, pain, and anxiety in various medical settings. However, music interventions in the setting of acute stroke have not been studied. The objective of this trial was to perform a pilot feasibility study of music interventions in the setting of acute
Jeffrey J. Fletcher+7 more
wiley +1 more source
Considerations for Cloud Security Operations [PDF]
Information Security in Cloud Computing environments is explored. Cloud Computing is presented, security needs are discussed, and mitigation approaches are listed. Topics covered include Information Security, Cloud Computing, Private Cloud, Public Cloud, SaaS, PaaS, IaaS, ISO 27001, OWASP, Secure SDLC.
arxiv
Recent Advances in Information Security
[No abstract available]
Fei Yu+4 more
openaire +6 more sources
Home‐Based Tele‐tDCS in Amyotrophic Lateral Sclerosis: Feasibility, Safety, and Preliminary Efficacy
ABSTRACT Objective Amyotrophic lateral sclerosis (ALS) is a progressive neurodegenerative disease with limited treatment options. Transcranial direct current stimulation (tDCS) shows promise as a neuromodulatory intervention in various neurological disorders, but its application in ALS, particularly in a remote, home‐based format, remains underexplored.
Sangeetha Madhavan+6 more
wiley +1 more source
Quantum Private Query Protocol Based on Two Non-Orthogonal States
We propose a loss tolerant quantum private query (QPQ) protocol based on two non-orthogonal states and unambiguous state discrimination (USD) measurement.
Yan Chang+5 more
doaj +1 more source
The Formal Metabasis For Conformity Assessment of Information Security Software and Hardware [PDF]
An approach to the development of security test procedures for information security controls is presented.
arxiv
Techniques for Enhanced Physical-Layer Security [PDF]
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications systems. Within this paradigm, we explore strategies to improve secure connectivity in a wireless network.
arxiv +1 more source
Do Software Security Practices Yield Fewer Vulnerabilities? [PDF]
Due to the ever-increasing security breaches, practitioners are motivated to produce more secure software. In the United States, the White House Office released a memorandum on Executive Order (EO) 14028 that mandates organizations provide self-attestation of the use of secure software development practices.
arxiv