Results 61 to 70 of about 921,352 (282)
Lies Kill, Facts Save: Detecting COVID-19 Misinformation in Twitter
Online social networks (ONSs) such as Twitter have grown to be very useful tools for the dissemination of information. However, they have also become a fertile ground for the spread of false information, particularly regarding the ongoing coronavirus ...
Mabrook S. Al-Rakhami, Atif M. Al-Amri
doaj +1 more source
Design and Implementation of S-MARKS: A Secure Middleware for Pervasive Computing Applications [PDF]
As portable devices have become a part of our everyday life, more people are unknowingly participating in a pervasive computing environment. People engage with not a single device for a specific purpose but many devices interacting with each other in the
Ahamed, Sheikh Iqbal +4 more
core +1 more source
Minimizing the Pervasiveness of Women’s Personal Experiences of Gender Discrimination [PDF]
Given the Rejection-Identification Model (Branscombe, et al., 1999) which shows that perceiving discrimination to be pervasive is a negative experience, it was suggested that there would be conditions under which women would instead minimize the ...
Foster, Mindi D +3 more
core +2 more sources
ABSTRACT Background and Objectives Multiple sclerosis (MS) exhibits racially disparate rates of disease progression. Black people with MS (B‐PwMS) experience a more severe disease course than non‐Hispanic White people with MS (NHW‐PwMS). Here we investigated structural and functional connectivity as well as structure–function decoupling in the ...
Emilio Cipriano +11 more
wiley +1 more source
Sybil Defense Techniques in Online Social Networks: A Survey
The problem of malicious activities in online social networks, such as Sybil attacks and malevolent use of fake identities, can severely affect the social activities in which users engage while online.
Muhammad Al-Qurishi +5 more
doaj +1 more source
Workload Orchestration in Multi-Access Edge Computing Using Belief Rule-Based Approach
Multi-access Edge Computing (MEC) is a standard network architecture for edge computing, which is proposed to handle enormous computation demands from emerging resource-intensive and latency-sensitive applications and services as well as accommodate ...
Mohammad Newaj Jamil +3 more
doaj +1 more source
A persistent infrastructure for augmented field trips [PDF]
This paper describes an approach to the provision of pervasive field trips where a persistent infrastructure is provided, upon which teachers can easily create novel pervasive experiences for children.
Cruickshank, Don G. +7 more
core +1 more source
Epilepsy‐Associated Variants of a Single SCN1A Codon Exhibit Divergent Functional Properties
ABSTRACT Objective Pathogenic variants in SCN1A, which encodes the voltage‐gated sodium channel NaV1.1, are associated with multiple epilepsy syndromes exhibiting a range of clinical severity. SCN1A variants are reported in different syndromes, including Dravet syndrome, which is associated with loss‐of‐function, whereas neonatal/infantile‐onset ...
Lanie N. Liebovitz +3 more
wiley +1 more source
This work presents a reconfigurable radiofrequency (RF) circuit based on a single graphene field-effect transistor (GFET), capable of operating as an analog phase shifter, a voltage-controlled amplifier, or both, while maintaining precise control over ...
Manuel Gómez-Torres +6 more
doaj +1 more source
Laser-Fabricated Reduced Graphene Oxide Memristors
Finding an inexpensive and scalable method for the mass production of memristors will be one of the key aspects for their implementation in end-user computing applications.
Francisco J. Romero +6 more
doaj +1 more source

