Results 61 to 70 of about 9,492,518 (363)
Characteristics of Cerebral Palsy in the Midwestern US
ABSTRACT Objective Cerebral palsy (CP) is the most common lifelong motor disability worldwide. Yet, data is limited on how CP manifests in the US. Our objective was to characterize and determine factors affecting functional outcomes in a large population of young people with CP in the Midwestern US.
Susie Kim +6 more
wiley +1 more source
Implementasi Management Network Security Pada Laboratorium Cisco Universitas Bina Darma [PDF]
The development of computer network technology as a medium for data communications to this increase. The need for the use of shared resources on the network both software and hardware has resulted in the emergence of a variety of network technology ...
Negara, E. S. (Edi)
core
Techniques for Enhanced Physical-Layer Security
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications systems.
Barros, Joao +2 more
core +1 more source
A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions
The dawn of softwarized networks enables Network Slicing (NS) as an important technology towards allocating end-to-end logical networks to facilitate diverse requirements of emerging applications in fifth-generation (5G) mobile networks.
Chamitha de Alwis +4 more
semanticscholar +1 more source
ABSTRACT Background Poststroke fatigue (PSF) and frailty share substantial overlap in their manifestations, yet previous research has yielded conflicting results due to the use of heterogeneous frailty assessment tools. Objective To evaluate the independent impact of frailty on PSF using a unified measurement system (Tilburg Frailty Indicator, TFI ...
Chuan‐Bang Chen +6 more
wiley +1 more source
The Darknet marketplace, operating on anonymous communication techniques, has become a central hub for illicit trade, enabling elusive vendors to engage in illegal activities.
Xuan Zhang +6 more
doaj +1 more source
Semi-AttentionAE: An Integrated Model for Graph Representation Learning
Graph embedding learns low-dimensional vector representations which capture and preserve information in original graphs. Common shallow neural networks and deep autoencoder only use adjacency matrix as input, and usually ignore node attributes and ...
Lining Yuan +3 more
doaj +1 more source
Post‐COVID Fatigue Is Associated With Reduced Cortical Thickness After Hospitalization
ABSTRACT Objective Neuropsychiatric symptoms are among the most prevalent sequelae of COVID‐19, particularly among hospitalized patients. Recent research has identified volumetric brain changes associated with COVID‐19. However, it currently remains poorly understood how brain changes relate to post‐COVID fatigue and cognitive deficits.
Tim J. Hartung +190 more
wiley +1 more source
A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing
Blockchain is commonly employed in access control to provide safe medical data exchange because of the characteristics of decentralization, nontamperability, and traceability.
Canling Wang +8 more
doaj +1 more source
Design of Network-based Security System for Windows Nt Network Operations to Achieve Efficiency [PDF]
In building a network of points that a lot of attention is on the network operatingsystem installation and implementation of network security systems and maintenanceof existing network systems.
Drs. Lingga Hermanto, MM Drs. Lingga Hermanto, MM +1 more
core

