Results 41 to 50 of about 489,634 (291)
Industrial Control Systems (ICS), which include Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and Programmable Logic Controllers (PLC), play a crucial role in managing and regulating industrial processes ...
Mary Nankya, Robin Chataut, Robert Akl
doaj +1 more source
Ghera: A Repository of Android App Vulnerability Benchmarks
Security of mobile apps affects the security of their users. This has fueled the development of techniques to automatically detect vulnerabilities in mobile apps and help developers secure their apps; specifically, in the context of Android platform due ...
Arzt Steven +4 more
core +1 more source
Reducing uncertainties of climate projections on solar energy resources in Brazil
The share of solar power in Brazil’s electrical grid has rapidly increased, relieving GHG emissions and diversifying energy sources for greater energy security.
Francisco José Lopes de Lima +7 more
doaj +1 more source
Study region: The Upper Niger and Bani River basins in West Africa. Study focus: The growing demand for food, water, and energy led Mali and Guinea to develop ambitious hydropower and irrigation plans, including the construction of a new dam and the ...
Stefan Liersch +10 more
doaj +1 more source
Prevalence and Trajectory of Household Material Hardship Among Children With Advanced Cancer
ABSTRACT Background/Objectives Families of children with advanced cancer living in poverty experience inferior outcomes including poor parent mental health and worse child quality of life. Household material hardship (HMH: food, housing, transportation, and/or utility insecurity) is a modifiable poverty exposure—and potential intervention target—that ...
Sarah Wright +13 more
wiley +1 more source
ABSTRACT Background Survivors of childhood acute lymphoblastic leukemia (ALL) often exhibit early deficits in muscle and movement competence, which can compromise long‐term health. Integrative neuromuscular training (INT), a multifaceted approach combining fundamental movement activities with strength exercises, may help address these deficits during ...
Anna Maria Markarian +7 more
wiley +1 more source
STRATEGIC ANALYSIS OF UKRAINE’S SECURITY ENVIRONMENT
The article reports on the results of a strategic analysis of Ukraine's security environment based on a SWOT analysis. The focus is on the security environment as of the eve of the large-scale war launched by the Russian Federation against Ukraine in ...
Olga Reznikova
doaj +1 more source
Securing library information system: Vulnerabilities and threats [PDF]
Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet.
Husin, Mohd Zabidin +3 more
core
ABSTRACT Background This study investigated how neighborhood‐level social determinants of health (SDOH), including redlining and neurological risk, interact to influence cognitive outcomes in children treated for brain tumors (CTBT). Methods A retrospective chart review of 161 CTBT aged 5–17 was conducted.
Alannah R. Srsich +5 more
wiley +1 more source
ABSTRACT Background Children with acute lymphoblastic leukemia (ALL) are at risk of severe outcomes from SARS‐CoV‐2 (SCV2). In the post‐pandemic context, where most children have been infected with SCV2, there are limited data on whether vaccination remains beneficial in children with ALL.
Janna R. Shapiro +11 more
wiley +1 more source

