Results 61 to 70 of about 7,184,030 (395)

Learning and Development Through the Scholarship of Teaching and Learning

open access: yesNew Directions for Adult and Continuing Education, EarlyView.
ABSTRACT This article focuses on learning that can facilitate the transition from being a scholarly teacher to becoming a scholar of teaching and learning, outlining the critical steps faculty can take to deepen their engagement with the scholarship of teaching and learning (SoTL).
Jennifer Friberg, Melanie Hamilton
wiley   +1 more source

Effectiveness and user experience of nose and throat swabbing techniques for SARS-CoV-2 detection: results from the UK COVID-19 National Testing Programme

open access: yesBMC Global and Public Health
Background The UK’s National Health Service Test and Trace (NHSTT) program aimed to provide the most effective and accessible SARS-CoV-2 testing approach possible.
Matthias E. Futschik   +18 more
doaj   +1 more source

Amyotrophic Lateral Sclerosis as a Multistep Process in the United States: A Population‐Based Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Amyotrophic lateral sclerosis (ALS) is a fatal, progressive neurodegenerative disease that typically results in death within 3–5 years from symptom onset. However, little is known about the environmental exposures, clinical aspects, or social determinants of health factors that may be associated with the disease.
Jasmine Berry   +7 more
wiley   +1 more source

A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures

open access: yesIEEE Access, 2019
The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects can be empowered to create, receive, and exchange data in a seamless manner.
Vikas Hassija   +5 more
semanticscholar   +1 more source

Continuous Monitoring of Bladder Dysfunction in People With Multiple Sclerosis: Wearables for the Bladder

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Bladder dysfunction affects over 85% of people with multiple sclerosis (PwMS), yet current assessment methods are limited to periodic in‐clinic evaluations or subjective patient reports, failing to capture real‐world symptom fluctuations.
Valerie J. Block   +8 more
wiley   +1 more source

Feature Graph Construction With Static Features for Malware Detection

open access: yesIET Information Security
Malware can greatly compromise the integrity and trustworthiness of information and is in a constant state of evolution. Existing feature fusion-based detection methods generally overlook the correlation between features.
Binghui Zou   +6 more
doaj   +1 more source

Multimodal Autonomic Biomarkers Predict Phenoconversion in Pure Autonomic Failure

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Pure autonomic failure (PAF) presents with autonomic failure without other neurological features. A third develop central neurological features, fulfilling criteria for multiple system atrophy (MSA) and Lewy body diseases (LBD), including Parkinson's disease and Dementia with Lewy bodies.
S. Koay   +12 more
wiley   +1 more source

The security of practical quantum key distribution [PDF]

open access: yes, 2008
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a ...
V. Scarani   +5 more
semanticscholar   +1 more source

Smartphone security [PDF]

open access: yes, 2017
According to eMarketer researchers, the total number of smartphones in active use on the planet exceeded the 2 billion unit in 2016 and amounted up to 2.16 billion against 1.9 billion in 2015 and 1.6 billion devices in 2014.
Mamienko, Sergey   +2 more
core  

Security dialogues: building better relationships between security and business [PDF]

open access: yes, 2016
In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes.
Ashenden, Debi, Lawrence, Darren
core   +1 more source

Home - About - Disclaimer - Privacy