Results 81 to 90 of about 7,184,030 (395)

Linux Security [PDF]

open access: yes, 2017
Information age has brought a new colossal change in a person’s habitual life. The level of computer literacy has grown greatly and even a middle level specialist is able to perform the tasks intended for the programming experts.
Gubkina, V.V.   +2 more
core  

Screening for Social Determinants of Health in Patients With Systemic Lupus Erythematosus: A Point‐of‐Care Feasibility Study

open access: yesArthritis Care &Research, EarlyView.
Objective Social determinants of health (SDoH) can impact outcomes but are not routinely screened for in US outpatient rheumatology clinics. This study determined the feasibility of routine point‐of‐care SDoH screening among patients with systemic lupus erythematosus (SLE) and associated barriers and facilitators at the physician, care team, and ...
S. Sam Lim   +11 more
wiley   +1 more source

Criminal Trajectory Reconstruction Method Based on a Mobile Reference System

open access: yesComputational Urban Science
Criminal trajectory reconstruction is a crucial area of study in the investigative and evidentiary processes of public security departments. This paper proposes a method for reconstructing criminal trajectories based on a mobile reference system ...
Zhengyan Ding   +4 more
doaj   +1 more source

Lived and care experiences of chronic musculoskeletal shoulder pain in Australian adults: A qualitative study

open access: yesArthritis Care &Research, Accepted Article.
Objectives Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centred care and informing local service pathways and care guidelines or standards.
Sonia Ranelli   +8 more
wiley   +1 more source

A lightweight Xray-YOLO-Mamba model for prohibited item detection in X-ray images using selective state space models

open access: yesScientific Reports
X-ray image-based prohibited item detection plays a crucial role in modern public security systems. Despite significant advancements in deep learning, challenges such as feature extraction, object occlusion, and model complexity remain.
Kai Zhao   +3 more
doaj   +1 more source

Web development evolution: the assimilation of web engineering security [PDF]

open access: yes, 2005
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues.
Glisson, W.B., Welland, R.
core   +1 more source

The Economic Burden of Rheumatoid Arthritis in Low‐ and Middle‐Income Countries: Systematic Review and Meta‐Analysis

open access: yesArthritis Care &Research, Accepted Article.
Objective The aim of this systematic review was to synthesise the economic impact of rheumatoid arthritis (RA) on households, health systems, and society in low‐ and middle‐income countries (LMICs). Methods Electronic databases such as PubMed, Web of Science, and CINAHL were searched using keywords related to RA and cost of illness.
Tadesse Gebrye   +6 more
wiley   +1 more source

Reconfigurable Security: Edge Computing-based Framework for IoT

open access: yes, 2017
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications.
Chen, Jyh-Cheng   +3 more
core   +1 more source

Virtual or in‐person: does it matter? Comparing pain, function, quality of life, self‐efficacy and physical function outcomes of virtual, hybrid and in‐person GLA:D Canada participants

open access: yesArthritis Care &Research, Accepted Article.
Objective This study aimed to determine if program format (in‐person, virtual, hybrid) results in differences in three‐month outcomes of pain, function, quality of life, self‐efficacy and chair stands in a hip/knee osteoarthritis management program. Methods A secondary analysis of the GLA:DTM Canada database was completed.
Jill Van Damme   +7 more
wiley   +1 more source

Documentación I. Declaración conjunta hispano-marroquí de 7 de abril de 2022 (versiones en español y francés)

open access: yesPaix et Sécurité Internationales, 2022
Peace & Security – Paix et Sécurité Internationales
doaj   +1 more source

Home - About - Disclaimer - Privacy