Results 21 to 30 of about 23,723 (266)

Identifying Cloud Computing Vulnerabilities

open access: yesInternational Journal of Scientific Research in Science, Engineering and Technology, 2014
Cloud computing is passing through development stage and with the passage process of development, cloud is also posing with security threats, challenges and risks. Lots of security threats, risks and challenges are directly or indirectly due to vulnerabilities in cloud environment.
openaire   +1 more source

Utility of Computed Tomography Surveillance of Asymptomatic Infection in Children and Young Adults Before Allogeneic Hematopoietic Stem Cell Transplant

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Asymptomatic infection poses a significant risk for children undergoing hematopoietic stem cell transplantation (HSCT). Pre‐transplant surveillance computed tomography (CT) is commonly used to identify occult infection, though its diagnostic yield remains uncertain.
Tyler Obermark   +9 more
wiley   +1 more source

VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms

open access: yesTongxin xuebao, 2015
Based on the analysis of security overlay service (SOS) approach of defending against DDoS attacks in large scale network,the vulnerability in the exit mechanism of being attacked nodes in SOS approach is explored.The vulnerability is solved by improving
UZhi-jun W, UIYi C, UEMeng Y
doaj   +2 more sources

Unheard and Under‐Supported: Health‐Related Quality of Life in Children, Adolescents, and Young Adults With Sickle Cell Disease

open access: yesPediatric Blood &Cancer, EarlyView.
Abstract Background Sickle cell disease (SCD) is an autosomal recessive hemoglobinopathy affecting millions of individuals worldwide. The clinical expression and psychosocial burden of SCD vary widely across geographical, cultural, and healthcare system contexts, underscoring the need for setting‐specific approaches to assessment.
Desiré Fantasia   +7 more
wiley   +1 more source

Effects of Cancer Treatment on Somatosensory and Nociceptive Processing in Children and Adolescents: A Systematic Review

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Chemotherapy‐induced peripheral neuropathy remains a major complication in pediatric cancer, with disrupted somatosensory and nociceptive processing being a key aspect. This review synthesizes empirical studies on alterations in somatosensory and nociceptive processing in children and adolescents with cancer.
Julia Schweiger   +4 more
wiley   +1 more source

Recurrent quantum embedding neural network and its application in vulnerability detection

open access: yesScientific Reports
In recent years, deep learning has been widely used in vulnerability detection with remarkable results. These studies often apply natural language processing (NLP) technologies due to the natural similarity between code and language.
Zhihui Song   +4 more
doaj   +1 more source

On Proof-of-Accuracy Consensus Protocols

open access: yesMathematics, 2022
Consensus protocols are a fundamental part of any blockchain; although several protocols have been in operation for several years, they still have drawbacks.
Fredy Andres Aponte-Novoa   +1 more
doaj   +1 more source

Parent Quality of Life at Two Years Following Their Child's Completion of Acute Lymphoblastic Leukemia Treatment

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Parents of children treated for acute lymphoblastic leukemia (ALL) often experience significant caregiver burden and disruption to their well‐being. While parent quality of life (QoL) during treatment is well characterized, little is known about outcomes during early survivorship.
Sara Dal Pra   +3 more
wiley   +1 more source

A GIS-based multi-criteria evaluation framework for uncertainty reduction in earthquake disaster management using granular computing

open access: yesGeodesy and Cartography, 2016
One of the most important steps in earthquake disaster management is the prediction of probable damages which is called earthquake vulnerability assessment.
Fatemeh Khamespanah   +3 more
doaj   +1 more source

Time after time – circadian clocks through the lens of oscillator theory

open access: yesFEBS Letters, EarlyView.
Oscillator theory bridges physics and circadian biology. Damped oscillators require external drivers, while limit cycles emerge from delayed feedback and nonlinearities. Coupling enables tissue‐level coherence, and entrainment aligns internal clocks with environmental cues.
Marta del Olmo   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy