Results 51 to 60 of about 2,927,610 (300)
Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection [PDF]
Most of the MANET security research has so far focused on providing routing security and confidentiality to the data packets, but less has been done to ensure privacy and anonymity of the communicating entities.
Hota, C. +3 more
core +1 more source
ABSTRACT Objective People with epilepsy (PWE) may experience cognitive deficits but fail to undergo formal evaluation. This study compares cognitive status between PWE and healthy controls in the West African Republic of Guinea. Methods A cross‐sectional, case–control study was conducted in sequential recruitment phases (July 2024–July 2025) at Ignace ...
Maya L. Mastick +14 more
wiley +1 more source
Objective This study aimed to evaluate the impact of a series of policies that mandated switching patients with inflammatory arthritis (IA) from an originator biologic to a biosimilar in British Columbia, Canada, on health care resource use and cost.
HaoHung Dang +4 more
wiley +1 more source
Generating citizen trust in e-government using a trust verification agent: A research note [PDF]
Generating Citizen Trust in e-Government using a Trust Verification AgentThis is an eGISE network paper. It is motivated by a concern about the extent to which trust issues inhibit a citizen’s take-up of online public sector services or engagement with ...
Elliman, T
core +3 more sources
Geographical traceability of bacteria based on a systematic stable isotope analysis method
The outbreak of certain bacteria can trigger severe diseases, even posing a threat to public safety, leading to significant social panic and economic losses. Thus, tracing the origin of bacteria is of great significance.
Wei Wang +11 more
doaj +1 more source
Rail Passenger Selective Screening Summit, MTI S-09-01 [PDF]
This publication is an edited transcript of the Rail Passenger Selective Screening Summit, which was co-sponsored by MTI and the American Public Transportation Association (APTA) in Chicago, Illinois on June 18, 2009, during APTA´s annual Rail Conference.
MTI
core +1 more source
Public Key Encryption Supporting Plaintext Equality Test and User-Specified Authorization [PDF]
In this paper we investigate a category of public key encryption schemes which supports plaintext equality test and user-specified authorization. With this new primitive, two users, who possess their own public/private key pairs, can issue token(s) to a ...
Tang, Qiang
core +5 more sources
Objective Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centered care and informing local service pathways and care guidelines or standards.
Sonia Ranelli +8 more
wiley +1 more source
X-ray image-based prohibited item detection plays a crucial role in modern public security systems. Despite significant advancements in deep learning, challenges such as feature extraction, object occlusion, and model complexity remain.
Kai Zhao +3 more
doaj +1 more source
Spatio-temporal prediction of terrorist attacks based on GCN-LSTM
Terrorist attacks represent a significant threat to national order, social stability, and economic security. Accurate prediction of such attacks is a critical task for casualty reduction, enhanced decision-making, and optimal resource distribution in ...
Yingjie Du, Ning Ding, Hongyu Lv
doaj +1 more source

