Results 151 to 160 of about 463,296 (299)
Strategies and Process of Trade Secret Misappropriation Mitigation: The Case of UK
ABSTRACT Trade Secrets (TS) are vital for innovation‐driven companies, and their loss can inflict significant financial and reputational damage, particularly in the absence of established policies to mitigate misappropriation in the UK. The current academic literature lacks detailed strategies for firms to effectively address these threats.
Oleksandra Ozcan, David Pickernell
wiley +1 more source
An efficient deep learning model for brain tumour detection with privacy preservation
Abstract Internet of medical things (IoMT) is becoming more prevalent in healthcare applications as a result of current AI advancements, helping to improve our quality of life and ensure a sustainable health system. IoMT systems with cutting‐edge scientific capabilities are capable of detecting, transmitting, learning and reasoning.
Mujeeb Ur Rehman +8 more
wiley +1 more source
Entwined economies of violence: understanding borderland conflict and resource politics in northern Kenya. [PDF]
Rogei DS.
europepmc +1 more source
The effect of livestock theft on household poverty in developing countries: The case of Lesotho [PDF]
While livestock theft in Lesotho is primarily caused by increased poverty among unemployed workers and drought stricken crop farmers, its effect on stock farmers can be devastating. It reduces the affected households’ own consumption of both the “returns”
Philip Black, Selloane Khoabane
core
ABSTRACT Mitochondria provide multiple functions for cellular physiology. Transplantation of mitochondria isolated from gastric epithelial cells GES‐1 reducing the malignancy of gastric cancer cells AGS was previously reported. To elucidate the underlying mechanisms, TMT‐based proteomic analysis coupling ingenuity pathway software prediction revealed ...
Ping‐Chen Chen +9 more
wiley +1 more source
Abstract Autonomous vehicles are required to operate in an uncertain environment. Recent advances in computational intelligence techniques make it possible to understand driving scenes in various environments by using a semantic segmentation neural network, which assigns a class label to each pixel.
Yining Hua +4 more
wiley +1 more source
PrivEdge: a hybrid split-federated learning framework for real-time electricity theft detection on edge nodes. [PDF]
Ramadan A +4 more
europepmc +1 more source
The determinants of employee crime in the UK [PDF]
For the first time, we present evidence on employee theft in the UK using data on actual recorded crime. We present a model where employees are rational cheaters with consciences to produce hypotheses about the role of labour market (wages, unemployment)
Neil Rickman, Robert Witt
core
Abstract Purpose To compare return to play (RTP), time to RTP, level of RTP, and anterior cruciate ligament (ACL) graft failure among elite and professional athletes from different sports after anterior cruciate ligament reconstruction (ACLR). Methods The PubMed, Embase and Cochrane Library databases were searched to identify potentially relevant ...
Riccardo D'Ambrosi +11 more
wiley +1 more source
OxyContin reformulation and drug-related-arrest rates, property-related crimes, child maltreatment and food pantry participation. [PDF]
Zhao H, Sun X.
europepmc +1 more source

