Results 141 to 150 of about 557,385 (336)

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

Modeling Cyber Threat Intelligence

open access: yesProceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Siri Bromander   +4 more
openaire   +1 more source

Australia's Migration Strategy: An Effective Response to Migrant Worker Exploitation?

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT A series of publicised migrant worker injuries and deaths has drawn attention to the issue of migrant worker exploitation (MWE) in Australia. In response, the Australian Government has included ‘Tackling Worker Exploitation’ as a key area of its Migration Strategy which it introduced in 2023. However, it is unclear how effective the Strategy’s
Evelyn Dowling, Alexandra Ridgway
wiley   +1 more source

Sex as a biological variable in nonclinical studies: Bridging scientific rigor, animal welfare, and regulatory expectations

open access: yesAnimal Models and Experimental Medicine, EarlyView.
Sex as a biological variable (SABV) is a critical determinant of pharmacokinetics, pharmacodynamics, and toxicity in nonclinical studies. This review highlights how inappropriate neglect of sex differences compromises animal welfare, scientific reproducibility, and regulatory compliance.
Kenta Onuma   +2 more
wiley   +1 more source

Partition-then-Overlap Method for Labeling Cyber Threat Intelligence Reports by Topics over Time

open access: diamond, 2021
Ryusei Nagasawa   +7 more
openalex   +2 more sources

Porcine kidney xenotransplantation: From primate models to clinical reality

open access: yesAnimal Models and Experimental Medicine, EarlyView.
In the face of a critical shortage of human donor kidneys for end‐stage renal disease patients, porcine kidney xenotransplantation has emerged as a viable solution. This field has navigated major hurdles, including immune rejection, physiological incompatibilities, potential biomechanical differences and the risk of cross‐species infection. To overcome
Zihang Guo   +3 more
wiley   +1 more source

Threat Intelligence Platform

open access: yes, 2018
The threat intelligence platform is a security system that collects malicious feeds from different sources using help of a tool called intelMQ, the threat intelligence platform provides a solution for IT security networks through collecting and processing security feeds and stores the results in mango database.
NICHOLAS MASETE   +5 more
openaire   +1 more source

Cancer therapy‐induced ototoxicity: Current challenges and emerging management strategies

open access: yesAnimal Models and Experimental Medicine, EarlyView.
This review comprehensively examines the key risk factors for cancer therapy‐induced ototoxicity, including cumulative drug dose, genetic susceptibility, and combined treatment regimens. It highlights current challenges in ototoxicity monitoring, such as insufficient timeliness and limited clinical adoption, and advocates for standardized auditory ...
Yuqi Huang   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy