Results 81 to 90 of about 5,764,266 (332)

​Did a Non‐Medical Biosimilar Switching Policy Cause an Increase in Non‐Biologic/Biosimilar Health Care Resource Utilization or Cost in Patients With Inflammatory Arthritis?

open access: yesArthritis Care &Research, EarlyView.
Objective This study aimed to evaluate the impact of a series of policies that mandated switching patients with inflammatory arthritis (IA) from an originator biologic to a biosimilar in British Columbia, Canada, on health care resource use and cost.
HaoHung Dang   +4 more
wiley   +1 more source

Lived and Care Experiences of Chronic Musculoskeletal Shoulder Pain in Australian Adults: A Qualitative Study

open access: yesArthritis Care &Research, EarlyView.
Objective Australian evidence on lived and care experiences of chronic musculoskeletal shoulder pain (CMSP), irrespective of disorder classification or disease, is limited. However, such evidence is important for person‐centered care and informing local service pathways and care guidelines or standards.
Sonia Ranelli   +8 more
wiley   +1 more source

A Type of Annulus-Based Energy Balanced Data Collection Method in Wireless Rechargeable Sensor Networks

open access: yesSensors, 2018
With the increasing number of ubiquitous terminals and the continuous expansion of network scale, the problem of unbalanced energy consumption in sensor networks has become increasingly prominent in recent years. However, a node scheduling strategy or an
Chao Sha   +3 more
doaj   +1 more source

Secure Scrum: Development of Secure Software with Scrum

open access: yes, 2015
Nowadays, the use of agile software development methods like Scrum is common in industry and academia. Considering the current attacking landscape, it is clear that developing secure software should be a main concern in all software development projects.
Hof, Hans-Joachim, Pohl, Christoph
core  

Sound and Complete Runtime Security Monitor for Application Software [PDF]

open access: yes, 2016
Conventional approaches for ensuring the security of application software at run-time, through monitoring, either produce (high rates of) false alarms (e.g. intrusion detection systems) or limit application performance (e.g. run-time verification).
Khan, Muhammad Taimoor   +2 more
core   +1 more source

Economic Burden of Rheumatoid Arthritis in Low‐ and Middle‐Income Countries: Systematic Review and Meta‐Analysis

open access: yesArthritis Care &Research, EarlyView.
Objective The aim of this systematic review was to synthesize the economic impact of rheumatoid arthritis (RA) on households, health systems, and society in low‐ and middle‐income countries (LMICs). Methods Electronic databases such as PubMed, Web of Science, and CINAHL were searched using keywords related to RA and cost of illness.
Tadesse Gebrye   +6 more
wiley   +1 more source

APPAS: A Privacy-Preserving Authentication Scheme Based on Pseudonym Ring in VSNs

open access: yesIEEE Access, 2019
Vehicular social networks (VSNs) provide a variety of services for users based on social relationships through vehicular ad hoc networks (VANETs). During the communication in VSNs, vehicles are at risk of exposure to privacy information.
Tianhan Gao   +4 more
doaj   +1 more source

Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering

open access: yesIEEE Access, 2020
In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption.
Asma'a Mahfoud Hezam Al-Hakimi   +4 more
doaj   +1 more source

SOFTWARE SECURITY OVERVIEW

open access: yesСистеми управління, навігації та зв’язку. Збірник наукових праць, 2019
The article analyzes the main threats and problems of software protection. Methods for protecting information, their advantages and disadvantages are considered, and the possibility of using existing tools to protect software is studied. The possibility of improving and using a number of software protection methods against active fraud attacks was ...
O. Sytnikova   +3 more
openaire   +2 more sources

Evolution Oriented Monitoring oriented to Security Properties for Cloud Applications [PDF]

open access: yes, 2018
Internet is changing from an information space to a dynamic computing space. Data distribution and remotely accessible software services, dynamism, and autonomy are prime attributes.
Muñoz, Antonio
core  

Home - About - Disclaimer - Privacy