Results 51 to 60 of about 86,586 (204)

The Application of Telemedicine in Surgery

open access: yesMed Research, EarlyView.
This figure provides an overview of the content presented in this article. Telemedicine is integrated throughout the entire surgical workflow, with distinct applications across the preoperative, intraoperative, and postoperative phases. These applications are enabled by a suite of supporting technologies, while the associated implementation challenges ...
Yufan Yang   +8 more
wiley   +1 more source

Investigation on the Applications of Ethernet VPN in Cloud Data Center Interconnection

open access: yesDianxin kexue, 2012
The problems existing in the current VPLS services and new requirements for ethernet VPN are summarized,and the technical characteristics of E-VPN and PBB E-VPN newly presented by IETF are introduced and analyzed.Furthermore,integrated with the actual ...
Xiaoming He   +3 more
doaj   +2 more sources

IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG

open access: yesBaca: Jurnal Dokumentasi dan Informasi, 2020
This study aims to explain to use a VPN in the UNISMA Library. The research method used is descriptive-qualitative and data was obtained through interviews with five informants, observation, and documentation. Data analysis techniques by collecting data,
Lia Umaroh, Machsun Rifauddin
doaj   +1 more source

Web-traffic filtering system

open access: yesЛитьë и металлургия, 2022
The article provides an overview of the web traffic filtering system using the Linux-based Squid software package. The system allows you to limit users on the Internet and collect statistics without interfering with the user’s computer, including the web
P. V. Pevnev
doaj   +1 more source

From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang   +5 more
wiley   +1 more source

Affordances, dread, and online fraud: Exploring and advancing social learning theory in online contexts

open access: yesCriminology, EarlyView.
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley   +1 more source

Rancang Bangun Keamanan Data Jaringan Komputer dengan Menggunakan Metode Ipsec Vpn (Studi Kasus: Pt.agrabudi Komunika) [PDF]

open access: yes, 2017
Virtual Private Network (VPN), merupakan sebuah jaringan yang dibuat untuk melakukan transaksi data yang telah dienkripsi antara dua atau lebih pengguna jaringan yang resmi : Jaringan VPN seluruhnya menggunakan internet sehingga factor keamanan menjadi ...
Burhanuddin, A. (Amieq)   +1 more
core  

On Usual, Virtual and Welded knotted objects up to homotopy

open access: yes, 2016
We consider several classes of knotted objects, namely usual, virtual and welded pure braids and string links, and two equivalence relations on those objects, induced by either self-crossing changes or self-virtualizations. We provide a number of results
Audoux, Benjamin   +3 more
core   +3 more sources

Does Investors’ Information‐acquisition Ability Affect IPO Underpricing? Evidence from a Quasi‐natural Experiment

open access: yesAbacus, EarlyView.
Initial public offering (IPO) underpricing, driven by information asymmetry, is a prevalent and serious global phenomenon. In addition to the influence of information providers such as IPO firms, investors’ ability to acquire information may also significantly affect IPO underpricing.
Haipeng Yu   +3 more
wiley   +1 more source

Accuracy of ChatGPT, Gemini, Claude and DeepSeek in Carbohydrate Counting

open access: yesDiabetes, Obesity and Metabolism, EarlyView.
ABSTRACT Aims To evaluate the accuracy of four general‐purpose artificial intelligence (AI) models—ChatGPT (OpenAI), Gemini (Google), Claude (Anthropic) and DeepSeek (DeepSeek AI)—in calculating the carbohydrate content of meals compared with clinicians‐calculated reference values.
Luca Zagaroli   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy