Results 61 to 70 of about 9,492,518 (363)

Characteristics of Cerebral Palsy in the Midwestern US

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Cerebral palsy (CP) is the most common lifelong motor disability worldwide. Yet, data is limited on how CP manifests in the US. Our objective was to characterize and determine factors affecting functional outcomes in a large population of young people with CP in the Midwestern US.
Susie Kim   +6 more
wiley   +1 more source

Implementasi Management Network Security Pada Laboratorium Cisco Universitas Bina Darma [PDF]

open access: yes, 2014
The development of computer network technology as a medium for data communications to this increase. The need for the use of shared resources on the network both software and hardware has resulted in the emergence of a variety of network technology ...
Negara, E. S. (Edi)
core  

Techniques for Enhanced Physical-Layer Security

open access: yes, 2010
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications systems.
Barros, Joao   +2 more
core   +1 more source

A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions

open access: yesIEEE Communications Surveys and Tutorials
The dawn of softwarized networks enables Network Slicing (NS) as an important technology towards allocating end-to-end logical networks to facilitate diverse requirements of emerging applications in fifth-generation (5G) mobile networks.
Chamitha de Alwis   +4 more
semanticscholar   +1 more source

The Impact of Tilburg Frailty on Poststroke Fatigue in First‐Ever Stroke Patients: A Cross‐Sectional Study With Unified Measurement Tools and Improved Statistics

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Poststroke fatigue (PSF) and frailty share substantial overlap in their manifestations, yet previous research has yielded conflicting results due to the use of heterogeneous frailty assessment tools. Objective To evaluate the independent impact of frailty on PSF using a unified measurement system (Tilburg Frailty Indicator, TFI ...
Chuan‐Bang Chen   +6 more
wiley   +1 more source

Decoding the shadows: multi-modal identity profiling in darknet markets using latent behavior feature fusion

open access: yesDiscover Applied Sciences
The Darknet marketplace, operating on anonymous communication techniques, has become a central hub for illicit trade, enabling elusive vendors to engage in illegal activities.
Xuan Zhang   +6 more
doaj   +1 more source

Semi-AttentionAE: An Integrated Model for Graph Representation Learning

open access: yesIEEE Access, 2021
Graph embedding learns low-dimensional vector representations which capture and preserve information in original graphs. Common shallow neural networks and deep autoencoder only use adjacency matrix as input, and usually ignore node attributes and ...
Lining Yuan   +3 more
doaj   +1 more source

Post‐COVID Fatigue Is Associated With Reduced Cortical Thickness After Hospitalization

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Neuropsychiatric symptoms are among the most prevalent sequelae of COVID‐19, particularly among hospitalized patients. Recent research has identified volumetric brain changes associated with COVID‐19. However, it currently remains poorly understood how brain changes relate to post‐COVID fatigue and cognitive deficits.
Tim J. Hartung   +190 more
wiley   +1 more source

A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing

open access: yesIET Information Security
Blockchain is commonly employed in access control to provide safe medical data exchange because of the characteristics of decentralization, nontamperability, and traceability.
Canling Wang   +8 more
doaj   +1 more source

Design of Network-based Security System for Windows Nt Network Operations to Achieve Efficiency [PDF]

open access: yes, 1999
In building a network of points that a lot of attention is on the network operatingsystem installation and implementation of network security systems and maintenanceof existing network systems.
Drs. Lingga Hermanto, MM Drs. Lingga Hermanto, MM   +1 more
core  

Home - About - Disclaimer - Privacy