Results 61 to 70 of about 921,352 (282)

Lies Kill, Facts Save: Detecting COVID-19 Misinformation in Twitter

open access: yesIEEE Access, 2020
Online social networks (ONSs) such as Twitter have grown to be very useful tools for the dissemination of information. However, they have also become a fertile ground for the spread of false information, particularly regarding the ongoing coronavirus ...
Mabrook S. Al-Rakhami, Atif M. Al-Amri
doaj   +1 more source

Design and Implementation of S-MARKS: A Secure Middleware for Pervasive Computing Applications [PDF]

open access: yes, 2009
As portable devices have become a part of our everyday life, more people are unknowingly participating in a pervasive computing environment. People engage with not a single device for a specific purpose but many devices interacting with each other in the
Ahamed, Sheikh Iqbal   +4 more
core   +1 more source

Minimizing the Pervasiveness of Women’s Personal Experiences of Gender Discrimination [PDF]

open access: yes, 2004
Given the Rejection-Identification Model (Branscombe, et al., 1999) which shows that perceiving discrimination to be pervasive is a negative experience, it was suggested that there would be conditions under which women would instead minimize the ...
Foster, Mindi D   +3 more
core   +2 more sources

Structure–Function Decoupling of the Sensorimotor and Default Mode Networks in Black Americans With MS

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background and Objectives Multiple sclerosis (MS) exhibits racially disparate rates of disease progression. Black people with MS (B‐PwMS) experience a more severe disease course than non‐Hispanic White people with MS (NHW‐PwMS). Here we investigated structural and functional connectivity as well as structure–function decoupling in the ...
Emilio Cipriano   +11 more
wiley   +1 more source

Sybil Defense Techniques in Online Social Networks: A Survey

open access: yesIEEE Access, 2017
The problem of malicious activities in online social networks, such as Sybil attacks and malevolent use of fake identities, can severely affect the social activities in which users engage while online.
Muhammad Al-Qurishi   +5 more
doaj   +1 more source

Workload Orchestration in Multi-Access Edge Computing Using Belief Rule-Based Approach

open access: yesIEEE Access, 2023
Multi-access Edge Computing (MEC) is a standard network architecture for edge computing, which is proposed to handle enormous computation demands from emerging resource-intensive and latency-sensitive applications and services as well as accommodate ...
Mohammad Newaj Jamil   +3 more
doaj   +1 more source

A persistent infrastructure for augmented field trips [PDF]

open access: yes, 2006
This paper describes an approach to the provision of pervasive field trips where a persistent infrastructure is provided, upon which teachers can easily create novel pervasive experiences for children.
Cruickshank, Don G.   +7 more
core   +1 more source

Epilepsy‐Associated Variants of a Single SCN1A Codon Exhibit Divergent Functional Properties

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Pathogenic variants in SCN1A, which encodes the voltage‐gated sodium channel NaV1.1, are associated with multiple epilepsy syndromes exhibiting a range of clinical severity. SCN1A variants are reported in different syndromes, including Dravet syndrome, which is associated with loss‐of‐function, whereas neonatal/infantile‐onset ...
Lanie N. Liebovitz   +3 more
wiley   +1 more source

Design of GFET-based reconfigurable voltage-controlled amplifiers and analog phase shifters for high-frequency applications

open access: yesDiscover Electronics
This work presents a reconfigurable radiofrequency (RF) circuit based on a single graphene field-effect transistor (GFET), capable of operating as an analog phase shifter, a voltage-controlled amplifier, or both, while maintaining precise control over ...
Manuel Gómez-Torres   +6 more
doaj   +1 more source

Laser-Fabricated Reduced Graphene Oxide Memristors

open access: yesNanomaterials, 2019
Finding an inexpensive and scalable method for the mass production of memristors will be one of the key aspects for their implementation in end-user computing applications.
Francisco J. Romero   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy