Results 81 to 90 of about 22,366 (192)

‘Don't send us a cake, and then let us drown again’: remembering and forgetting Cyclone Gabrielle

open access: yesKōtuitui: New Zealand Journal of Social Sciences Online, Volume 20, Issue 2, Page 177-205, June 2025.
ABSTRACT We present a critical analysis of news coverage during the one‐year anniversary of Cyclone Gabrielle in Aotearoa New Zealand. This disaster raised important questions surrounding emergency preparedness, infrastructural vulnerability, climate change, adaptation, future land‐use policies and managed retreat.
Luke Goode   +4 more
wiley   +1 more source

Conceptualisation of Mental Health Recovery by Health Professionals and Students in Southeast Asia: A Qualitative Systematic Review and Meta‐Aggregation

open access: yesJournal of Psychiatric and Mental Health Nursing, Volume 32, Issue 3, Page 783-799, June 2025.
ABSTRACT Introduction While the recovery approach is gaining recognition in non‐Western countries, it remains underexplored in Southeast Asia. This study addressed this gap by examining how health professionals and students conceptualised recovery, providing insights for enhancing mental health practices.
Rinlita Chatwiriyaphong   +4 more
wiley   +1 more source

The challenge of assessing impaired awareness of hypoglycaemia in diabetes in the era of continuous glucose monitoring: A narrative review of evidence and translation into clinical practice

open access: yesDiabetes, Obesity and Metabolism, Volume 27, Issue 5, Page 2363-2376, May 2025.
Abstract Iatrogenic hypoglycaemia remains a major barrier in diabetes care. Over time, and with repeated hypoglycaemic episodes, the physiological responses to hypoglycaemia can become blunted, resulting in impaired awareness of hypoglycaemia (IAH). In IAH, the onset of cognitive dysfunction precedes the onset of autonomic symptoms, often preventing ...
Simon A. Berry   +5 more
wiley   +1 more source

Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques

open access: yes, 2009
The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information.
Al-Khateeb, Wajdi F.   +6 more
core  

Blockchain-Assisted Verifiable and Multi-User Fuzzy Search Encryption Scheme

open access: yesApplied Sciences
Searchable encryption (SE) allows users to efficiently retrieve data from encrypted cloud data, but most of the existing SE solutions only support precise keyword search.
Xixi Yan   +3 more
doaj   +1 more source

The Network’s Data Security Risk Analysis [PDF]

open access: yes
Establishing the networks security risk can be a very difficult operation especially for the small companies which, from financial reasons can’t appeal at specialist in this domain, or for the medium or large companies that don’t have experience.
Emil BURTESCU
core  

Verifiable Multi-Authority Attribute-Based Encryption with Keyword Search Based on MLWE

open access: yesCryptography
Searchable Encryption (SE) schemes enable data users to securely search over outsourced encrypted data stored in the cloud. To support fine-grained access control, Attribute-Based Encryption with Keyword Search (ABKS) extends SE by associating access ...
Saba Karimani, Taraneh Eghlidos
doaj   +1 more source

Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
With the rapid development of cloud computing technology, cloud storage services are becoming more and more mature. However, the storage of sensitive data on remote servers poses privacy risks and is presently a source of concern.
Danial Shiraly   +2 more
doaj   +1 more source

The Costs of Deception: Evidence From Psychology [PDF]

open access: yes
Recently, it has been argued that the evidence in social science research suggests that deceiving subjects in an experiment does not lead to a significant loss of experimental control.
Andreas Ortmann, Ralph Hertwig
core  

Attribute-based multi-user collaborative searchable encryption in COVID-19. [PDF]

open access: yesComput Commun, 2023
Zhao F   +5 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy