Results 71 to 80 of about 84,163 (293)
Intrusion detection is an important technology that can help in managing threats and vulnerabilities in this changing environment. Computer technology is more and more ubiquitous, the penetration of computer in society is a welcome step towards ...
Abidah Mat Taib, Nur Syahirah Shayuthi
doaj
A secure and lightweight ad-hoc routing algorithm for personal networks [PDF]
Over the past few years, there has been increasing interest in utilizing Personal Area Networks (PANs) to offer users innovative and personalized services.
Heemstra de Groot, S.M., Jehangir, A.
core +1 more source
Objectives This study aims to describe the frequency and timing of physician referrals to physical therapists (PT) and other treatments prescribed over 12 months in patients with recent onset of knee osteoarthritis (KOA). The study also aims to identify determinants of early PT referrals.
Samannaaz S. Khoja +4 more
wiley +1 more source
k-fingerprinting: a Robust Scalable Website Fingerprinting Technique [PDF]
Website fingerprinting enables an attacker to infer which web page a client is browsing through encrypted or anonymized network connections. We present a new website fingerprinting technique based on random decision forests and evaluate performance over ...
Danezis, George, Hayes, Jamie
core +1 more source
Objective The objective was to identify factors determining acute arthritis resolution and safety with colchicine and prednisone in acute calcium pyrophosphate (CPP) crystal arthritis. Methods We conducted a post hoc analysis of the COLCHICORT trial, which compared colchicine and prednisone for the treatment of acute CPP crystal arthritis, using a ...
Tristan Pascart +14 more
wiley +1 more source
The unrolling of the peltate leaves in Syngonium podophyllum is analyzed and quantified (left‐hand side to center). These measurements serve to verify a mathematical model for leaf unrolling based on the model used in Schmidt (2007). An additional formula for obtaining a layer mismatch from a prescribed radius is derived.
Michelle Modert +4 more
wiley +1 more source
X-Vine: Secure and Pseudonymous Routing Using Social Networks [PDF]
Distributed hash tables suffer from several security and privacy vulnerabilities, including the problem of Sybil attacks. Existing social network-based solutions to mitigate the Sybil attacks in DHT routing have a high state requirement and do not ...
Borisov, Nikita +2 more
core +1 more source
This study presents a 3D representative volume element‐based simulation approach to predict mesoscopic residual stress and strain fields in silicon solid solution‐strengthened ductile cast iron. By modeling phase transformation kinetics with an enhanced Johnson–Mehl–Avrami–Kolmogorov model, the effects of varying cooling rates on residual stresses are ...
Lutz Horbach +6 more
wiley +1 more source
In the present study, metastable CrMnNi steels with varying chemical compositions and a concomitantly altered stacking fault energy are processed via directed energy deposition and afterwards tested via tensile tests at different temperatures. The present study shows the influence of the manufacturing process on the elemental deformation mechanisms for
Julia Richter +8 more
wiley +1 more source
Additive manufacturing (AM) transforms space hardware by enabling lightweight, high‐performance, and on‐demand production. This review outlines AM processes—powder bed fusion (PBF), directed energy deposition (DED), binder jetting (BJ), sheet lamination (SL), and material extrusion (ME)—applied to propulsion, satellite structures, and thermal devices ...
Stelios K. Georgantzinos +8 more
wiley +1 more source

