Results 21 to 30 of about 1,614,631 (234)
Deployment of Unmanned Aerial Vehicles (UAVs) continues to expand rapidly across a wide range of applications, including environmental monitoring, precision agriculture, and disaster response.
Sayani Sarkar +3 more
doaj +1 more source
ABSTRACT Introduction Characterizing stressful events reported by childhood cancer survivors experienced throughout the lifespan may help improve trauma‐informed care relevant to the survivor experience. Methods Participants included 2552 survivors (54% female; 34 years of age) and 469 community controls (62% female; 33 years of age) from the St.
Megan E. Ware +13 more
wiley +1 more source
Transitory Master Key Transport Layer Security for WSNs
Security approaches in Wireless Sensor Networks (WSNs) are normally based on symmetric cryptography. Instead of symmetric encryption, some alternative approaches have been developed by using public-key cryptography. However, the higher computational cost
Mattia Griotti +2 more
doaj +1 more source
ABSTRACT Asymptomatic infection poses a significant risk for children undergoing hematopoietic stem cell transplantation (HSCT). Pre‐transplant surveillance computed tomography (CT) is commonly used to identify occult infection, though its diagnostic yield remains uncertain.
Tyler Obermark +9 more
wiley +1 more source
A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things
The Internet of Things envisages connecting all physical objects or things to the Internet, using devices as diverse as smartphones, coffee makers, washing machines, automobiles, lamps, and wearable devices, among many others.
Manisha Malik +2 more
doaj +1 more source
Abstract Background Sickle cell disease (SCD) is an autosomal recessive hemoglobinopathy affecting millions of individuals worldwide. The clinical expression and psychosocial burden of SCD vary widely across geographical, cultural, and healthcare system contexts, underscoring the need for setting‐specific approaches to assessment.
Desiré Fantasia +7 more
wiley +1 more source
ABSTRACT Neuroblastoma is the most common extracranial solid tumor in early childhood. Its clinical behavior is highly variable, ranging from spontaneous regression to fatal outcome despite intensive treatment. The International Society of Pediatric Oncology Europe Neuroblastoma Group (SIOPEN) Radiology and Nuclear Medicine Specialty Committees ...
Annemieke Littooij +11 more
wiley +1 more source
For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving.
Le Xuan Hung +4 more
doaj +1 more source
ABSTRACT Introduction Adolescent siblings of children with cancer are at elevated risk for psychosocial problems. Unfortunately, various barriers such as limited family time and resources, conflicting schedules, and psychosocial staffing constraints at cancer centers hinder sibling access to support.
Christina M. Amaro +10 more
wiley +1 more source
Authentication and Key Establishment in Dynamic Wireless Sensor Networks
When a sensor node roams within a very large and distributed wireless sensor network, which consists of numerous sensor nodes, its routing path and neighborhood keep changing.
Ying Qiu +3 more
doaj +1 more source

