Results 161 to 170 of about 30,050 (262)

Transfer learning with XAI for robust malware and IoT network security. [PDF]

open access: yesSci Rep
Almadhor A   +6 more
europepmc   +1 more source

High‐Frequency Ultrasonographic Characterization of Subcutaneous Glomus Tumors

open access: yesJournal of Clinical Ultrasound, EarlyView.
Color Doppler image reveals intralesional hypervascularity. ABSTRACT Objective To evaluate the clinical manifestations and ultrasonographic characteristics of glomus tumors under the nails and other subcutaneous soft tissues. Methods A retrospective analysis was performed on 45 patients with pathologically confirmed glomus tumors who underwent ...
Mingyu Bai, Nan Wang, Jie Jiang
wiley   +1 more source

Adaptive malware identification via integrated SimCLR and GRU networks. [PDF]

open access: yesSci Rep
Alsubaei FS   +5 more
europepmc   +1 more source

From Empire to Aid: Analysing Persistence of Colonial Legacies in Foreign Aid to Africa

open access: yesJournal of International Development, EarlyView.
ABSTRACT For decades now, Western development agencies and donors have been castigated for their colonial biases in providing aid to Africa. It is well established that donors provide considerably more foreign aid to their former colonies relative to other countries.
Swetha Ramachandran
wiley   +1 more source

Healing Beams: Radiation and Radiotherapy in Novels, Poems, Music, Film, Painting

open access: yesJournal of Medical Radiation Sciences, EarlyView.
Radiation and radiotherapy are perceived by patients and the general public as mysterious, dangerous and healing. The image of radiation and radiotherapy can be analysed by studying novels, poems, music, film and painting. Our paper reviews how radiation and radiotherapy are perceived by patients, the general public, as reflected in various art genres.
Ad A. Kaptein   +3 more
wiley   +1 more source

HALT-PROP: Human-Annotated Lithuanian Textual Corpus for Propaganda Narratives and Techniques. [PDF]

open access: yesSci Data
Rizgelienė I   +3 more
europepmc   +1 more source

Acting authentically: Using play to cultivate authentic interrelating in role performance

open access: yesJournal of Organizational Behavior, EarlyView.
Summary Research is increasingly demonstrating that authenticity and human connection are fundamental and interrelated human needs. However, organizational roles often constrain authenticity and connection in workplace interactions, especially roles that are highly scripted.
Lyndon E. Garrett
wiley   +1 more source

Bypassing defensive system detection using obfuscation techniques research

open access: yes, 2020
Per pastaruosius metus antivirusinės programos tobulėjo didele sparta. Anksčiau, kibernetinio saugumo įrankiai pasikliaudavo žymų arba "parašų" duomenų bazėmis norėdamos apsisaugoti nuo kenkėjiškų programų. Tačiau per pastaruosius metus buvo sukurta didelis kiekis naujovių - heuristinė analizė, realaus laiko skenavimai, pavojaus identifikacija ...
openaire   +1 more source

Home - About - Disclaimer - Privacy