Results 21 to 30 of about 1,221,489 (244)
Context The literature on self‐management interventions (SMIs) is growing exponentially, but it is characterized by heterogeneous reporting that limits comparability across studies and interventions.
Carola Orrego +8 more
doaj +1 more source
A Quantum-Proof Non-Malleable Extractor, With Application to Privacy Amplification against Active Quantum Adversaries [PDF]
In privacy amplification, two mutually trusted parties aim to amplify the secrecy of an initial shared secret $X$ in order to establish a shared private key $K$ by exchanging messages over an insecure communication channel.
A De +22 more
core +3 more sources
Resource Management Algorithm of Visible Light Communication and WiFi Heterogeneous Network [PDF]
Visible Light Communication(VLC)/WiFi heterogeneous network provides high-speed communication and indoor wireless access by combining the advantages of VLC and WiFi communication.Resource management algorithm is key to achieving efficient transmission in
YANG Liwei, JIA Boyu, WANG Fang, PENG Xiangyuan
doaj +1 more source
Multi-Professional Perspectives on Adolescent and Young Adult Oncology Across Europe: An e-Delphi Survey [PDF]
The aims of this article are to describe the ongoing development of adolescent and young adult (AYA) cancer services within the European Union (EU), and to develop consensus on key areas within the field. This survey used an e-Delphi design.
Fern, LA +5 more
core +2 more sources
An Image Encryption Algorithm Based on Josephus Traversing and Mixed Chaotic Map
This paper proposes a new chaotic image encryption scheme, which employs Josephus traversing and mixed chaotic map. The scheme consists of three processes: key stream generation process; three-round scrambling process; and one-round diffusion process ...
Xingyuan Wang +2 more
doaj +1 more source
Evidence-Based Aquatic Therapy Guidelines for Parkinson’s Disease: An International Consensus Study
Background: Aquatic therapy is one therapy option for people living with Parkinson’s disease (PD). However, the optimal prescription, dosage, and delivery remain unclear.
Louise M. Carroll +5 more
doaj +1 more source
Efficient and Secure Image Encryption Algorithm Using a Novel Key-Substitution Architecture
Recently, many chaos-based image encryption algorithms have been proposed. Most of them adopt the traditional confusion-diffusion framework. Multiple encryption rounds or one round of complex encryption is typically executed in these schemes to realize ...
Yanjie Song +4 more
doaj +1 more source
Background: There are various infant massage programmes designed for infants born without complications, but there are limited options available for caregivers with high-risk infants from a resource-constrained context.
Gina Rencken +2 more
doaj +1 more source
Report on the first round of the Mock LISA Data Challenges [PDF]
The Mock LISA Data Challenges (MLDCs) have the dual purpose of fostering the development of LISA data analysis tools and capabilities, and demonstrating the technical readiness already achieved by the gravitational-wave community in distilling a rich ...
+64 more
core +4 more sources
Background Approximately 1.3 million people die each year globally as a direct result of motor vehicle collisions (MVCs). Following an MVC some patients will remain trapped in their vehicle; these patients have worse outcomes and may require extrication.
Tim Nutbeam +7 more
doaj +1 more source

