Results 11 to 20 of about 962,172 (272)

Security Awareness in Smart Homes and Internet of Things Networks through Swarm-Based Cybersecurity Penetration Testing

open access: yesInformation, 2023
Internet of Things (IoT) devices are common in today’s computer networks. These devices can be computationally powerful, yet prone to cybersecurity exploitation.
Thomas Schiller   +3 more
doaj   +1 more source

Systematic review of the current status of cadaveric simulation for surgical training [PDF]

open access: yes, 2019
Background: There is growing interest in and provision of cadaveric simulation courses for surgical trainees. This is being driven by the need to modernize and improve the efficiency of surgical training within the current challenging training climate ...
Chapman, A. W.   +4 more
core   +1 more source

Identifying the effects of scaffolding on learners’ temporal deployment of self-regulated learning operations during game-based learning using multimodal data

open access: yesFrontiers in Psychology, 2023
IntroductionSelf-regulated learning (SRL), or learners’ ability to monitor and change their own cognitive, affective, metacognitive, and motivational processes, encompasses several operations that should be deployed during learning including Searching ...
Daryn A. Dever   +7 more
doaj   +1 more source

Simulation in paediatric training [PDF]

open access: yesArchives of disease in childhood - Education & practice edition, 2015
We are what we repeatedly do. Excellence then is not an act but a habitAristotle This quote from the Greek philosopher Aristotle from over 2000 years ago is still relevant today in the context of paediatric medical education. Simulation is a tool that can reinforce standards of clinical practice as ‘habit’ contributing to trainee's development as ...
Clerihew, Linda   +2 more
openaire   +3 more sources

Overview of Side Channel Analysis Based on Convolutional Neural Network [PDF]

open access: yesJisuanji kexue, 2022
The profiled side-channel analysis method can effectively attack the implementation of cryptographic,and the side-channel cryptanalysis method based on convolutional neural network (CNNSCA) can efficiently carry out cryptographic attacks,and even can ...
LIU Lin-yun, CHEN Kai-yan, LI Xiong-wei, ZHANG Yang, XIE Fang-fang
doaj   +1 more source

Research on Electromagnetic Side-channel Signal Extraction for Mobile Device PCM-9589F Multi-COM

open access: yesMATEC Web of Conferences, 2018
The portability and various functions of mobile devices enable them to go deep into people's study, work and life. While it is convenient for people, mobile devices contain a large number of user’s private information, such as the user's personal ...
Hu Xiao-yang   +4 more
doaj   +1 more source

The neurocognitive gains of diagnostic reasoning training using simulated interactive veterinary cases [PDF]

open access: yes, 2019
The present longitudinal study ascertained training-associated transformations in the neural underpinnings of diagnostic reasoning, using a simulation game named “Equine Virtual Farm” (EVF).
Nassar, Maaly
core   +1 more source

The impact of facemask on patients with COPD: A systematic review and meta-analysis

open access: yesFrontiers in Public Health, 2022
BackgroundSince the emergence of COVID-19, mandatory facemask wearing has been implemented around the world to prevent viral transmission, however, the impact of wearing facemasks on patients with COPD was unclear.MethodsThe current study undertakes a ...
Xuwen Chen   +10 more
doaj   +1 more source

Research priorities in light of current trends in microsurgical training: revalidation, simulation, cross-training, and standardisation. [PDF]

open access: yes, 2014
This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/ licenses/by-nc/3.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any ...
Aggarwal   +51 more
core   +2 more sources

Thermally damaged porcine skin is not a surrogate mechanical model of human skin

open access: yesScientific Reports, 2022
Porcine skin is considered a de facto surrogate for human skin. However, this study shows that the mechanical characteristics of full thickness burned human skin are different from those of porcine skin.
Samara Gallagher   +10 more
doaj   +1 more source

Home - About - Disclaimer - Privacy