Results 171 to 180 of about 40,010 (281)
Enhancing the LEACH protocol and lightweight chaotic cryptography for secure data transmission in wireless sensor networks. [PDF]
Zarei M +3 more
europepmc +1 more source
Associations of Rheumatoid Arthritis Disease Activity With Frailty Over Five Years of Follow‐up
Objective To evaluate whether rheumatoid arthritis (RA) disease activity is associated with frailty both in cross‐section and longitudinally. Methods Participants within the Veterans Affairs Rheumatoid Arthritis (VARA) registry enrolled from 2003 to 2022 were included.
Courtney N. Loecker +14 more
wiley +1 more source
A collaborative multi-party encryption for mitigating man-in-the-middle attacks in smart grid and energy IoT systems. [PDF]
Alfawair M.
europepmc +1 more source
Purpose The study aimed to identify symptom‐based predictors of dry eye disease (DED) signs in the Sjögrens International Collaborative Clinical Alliance (SICCA) cohort. Methods Retrospective analysis examining 16 ocular symptoms (most graded 0‐4) and artificial tear (AT) use (graded 0‐3) as predictors of DED signs [abnormal ocular surface staining ...
Pragnya R Donthineni +7 more
wiley +1 more source
A Kyber-Based Lightweight Cloud-Assisted Authentication Scheme for Medical IoT. [PDF]
Yan H, Wang Z, Lin L, Sun J, Liu S.
europepmc +1 more source
Objective Hydroxychloroquine (HCQ) is a cornerstone therapy in systemic lupus erythematosus (SLE), but the weight‐based dosing does not account for clinical factors that can introduce individual variability in drug metabolism and clearance. We leveraged longitudinal data from a prospective SLE cohort to identify clinical factors that predict ...
Jay J. Patel +6 more
wiley +1 more source
Objective The concern that nonsteroidal anti‐inflammatory drugs (NSAIDs) may precipitate flares of inflammatory bowel disease (IBD) has limited their use in managing musculoskeletal symptoms in those with IBD, but safety data are mixed. Methods This retrospective cohort study included patients with IBD aged at least 18 years from Optum's deidentified ...
Adam S. Mayer +4 more
wiley +1 more source
Enhancement of cryptography algorithms for security of cloud-based IoT with machine learning models. [PDF]
Qasem MA +5 more
europepmc +1 more source
Predicting extreme defects in additive manufacturing remains a key challenge limiting its structural reliability. This study proposes a statistical framework that integrates Extreme Value Theory with advanced process indicators to explore defect–process relationships and improve the estimation of critical defect sizes. The approach provides a basis for
Muhammad Muteeb Butt +8 more
wiley +1 more source
Quantum cryptography integrating an optical quantum memory. [PDF]
Mamann H +8 more
europepmc +1 more source

