Results 61 to 70 of about 2,381,348 (304)

The Impact of Tilburg Frailty on Poststroke Fatigue in First‐Ever Stroke Patients: A Cross‐Sectional Study With Unified Measurement Tools and Improved Statistics

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Poststroke fatigue (PSF) and frailty share substantial overlap in their manifestations, yet previous research has yielded conflicting results due to the use of heterogeneous frailty assessment tools. Objective To evaluate the independent impact of frailty on PSF using a unified measurement system (Tilburg Frailty Indicator, TFI ...
Chuan‐Bang Chen   +6 more
wiley   +1 more source

Lessons Learned: Quality Analysis of Optical Coherence Tomography in Neuromyelitis Optica

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Introduction Optical coherence tomography (OCT)‐derived retina measurements are markers for neuroaxonal visual pathway status. High‐quality OCT scans are essential for reliable measurements, but their acquisition is particularly challenging in eyes with severe visual impairment, as often observed in neuromyelitis optica spectrum disorders ...
Hadi Salih   +40 more
wiley   +1 more source

Post‐COVID Fatigue Is Associated With Reduced Cortical Thickness After Hospitalization

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Neuropsychiatric symptoms are among the most prevalent sequelae of COVID‐19, particularly among hospitalized patients. Recent research has identified volumetric brain changes associated with COVID‐19. However, it currently remains poorly understood how brain changes relate to post‐COVID fatigue and cognitive deficits.
Tim J. Hartung   +190 more
wiley   +1 more source

Leveraging Machine Learning for Sophisticated Rental Value Predictions: A Case Study from Munich, Germany

open access: yesApplied Sciences
There has been very limited research conducted to predict rental prices in the German real estate market using an AI-based approach. From a general perspective, conventional approaches struggle to handle large amounts of data and fail to consider the ...
Wenjun Chen   +3 more
doaj   +1 more source

How to Efficiently Conduct an IT Audit – In the Perspective of Research, Consulting and Teaching [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2016
This article reflects the topic of IT audit – information technology audit – with respect to research, consulting and teaching. The expression 'IT audit' comprises information systems audits as well as information security audits combining the short-term
Gabriel Felley, Rolf Dornberger
doaj  

Human Factor Aspects in Information Security Management in the Traditional it and Cloud Computing Models

open access: yesOperations Research and Decisions, 2021
This paper attempts to classify the main areas of threats occurring in enterprises in the information management processes. Particular attention was paid to the effect of the human factor which is present in virtually every area of information security ...
Paweł Kobis
doaj  

An effective approach to mobile device management: Security and privacy issues associated with mobile applications

open access: yesDigital Business, 2020
Consumers and organizations often rely on permissions requested during the installation of mobile applications (apps) and on official privacy policies to determine how safe an app is and decide whether the app producer is acting ethically or not.
Darren Hayes   +2 more
doaj   +1 more source

Building an Enterprise it Security Management System [PDF]

open access: yes, 2003
Moving towards a knowledge economy, managing effectively and safely the corporate data is the key to an organisation’s survival and success. Corporative employees that technologies like computers, mobile and portable devices to access the information.
Meletis A. Belsis, Leonid Smalov
openaire   +1 more source

ORACLE DATABASE SECURITY [PDF]

open access: yes
This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development.
Cristina-Maria Titrade
core  

Critical Management Issues for Implementing RFID in Supply Chain Management [PDF]

open access: yes, 2010
The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability ...
Srivastava, Bharatendu
core   +1 more source

Home - About - Disclaimer - Privacy