Results 91 to 100 of about 5,764,266 (332)

Virtual or In‐Person: Does It Matter? Comparing Pain, Function, Quality of Life, Self‐Efficacy, and Physical Function Outcomes of Virtual, Hybrid, and In‐Person Education and Exercise Program Participants

open access: yesArthritis Care &Research, EarlyView.
Objective This study aimed to determine if program format (in‐person, virtual, or hybrid) results in differences in 3‐month outcomes of pain, function, quality of life, self‐efficacy, and chair stands in a hip/knee osteoarthritis‐management program. Methods A secondary analysis of the Good Life with osteoArthritis in Denmark (GLA:D) Canada database was
Jill Van Damme   +7 more
wiley   +1 more source

Modeling Enterprise Authorization: A Unified Metamodel and Initial Validation

open access: yesComplex Systems Informatics and Modeling Quarterly, 2016
Authorization and its enforcement, access control, have stood at the beginning of the art and science of information security, and remain being crucial pillar of security in the information technology (IT) and enterprises operations.
Matus Korman   +2 more
doaj   +1 more source

Persistent issues in encryption software: A heuristic and cognitive walkthrough [PDF]

open access: yes, 2014
The support information accompanying security software can be difficult to understand by end-users, who have little knowledge in cyber security.
El-Abed, Jad, Szewczyk, Patryk S
core   +1 more source

Identifying High‐Impact Solutions to Address Racial and Ethnic Health Disparities in Lupus: A Consensus‐Based Approach

open access: yesArthritis Care &Research, EarlyView.
Objective We conducted formative research aimed at identifying solutions that address inequitable health outcomes in lupus due to adverse social determinants of health (SDoH). Methods We conducted a search for keywords, which provided insights into potential solutions and initiatives underway. An advisory panel of lupus experts iteratively reviewed the
Joy Buie   +11 more
wiley   +1 more source

Improving deep learning-based neural distinguisher with multiple ciphertext pairs for speck and Simon

open access: yesScientific Reports
The neural network-based differential distinguisher has attracted significant interest from researchers due to its high efficiency in cryptanalysis since its introduction by Gohr in 2019.
Yufei Hou   +5 more
doaj   +1 more source

Cloud Removal Advances: A Comprehensive Review and Analysis for Optical Remote Sensing Images

open access: yesIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing
Cloud cover significantly decreases the quality of optical remote sensing (ORS) images, adversely impacting its effectiveness in geographic monitoring, disaster prevention, and advanced visual applications.
Jin Ning   +3 more
doaj   +1 more source

Web development evolution: the business perspective on security [PDF]

open access: yes, 2006
Protection of data, information, and knowledge is a hot topic in today’s business environment. Societal, legislative and consumer pressures are forcing companies to examine business strategies, modify processes and acknowledge security to accept and ...
Glisson, L.M.   +2 more
core  

BlockChain: A distributed solution to automotive security and privacy

open access: yes, 2017
Interconnected smart vehicles offer a range of sophisticated services that benefit the vehicle owners, transport authorities, car manufacturers and other service providers.
Dorri, Ali   +3 more
core   +1 more source

Preferences for post‐traumatic osteoarthritis prevention strategies in individuals with anterior cruciate ligament injury

open access: yesArthritis Care &Research, Accepted Article.
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy   +9 more
wiley   +1 more source

Weakly supervised video anomaly detection based on hyperbolic space

open access: yesScientific Reports
In recent years, there has been a proliferation of weakly supervised methods in the field of video anomaly detection. Despite significant progress in existing research, these efforts have primarily focused on addressing this issue within Euclidean space.
Meilin Qi, Yuanyuan Wu
doaj   +1 more source

Home - About - Disclaimer - Privacy