Results 31 to 40 of about 202,881 (332)

Enhancement of groundwater resources quality prediction by machine learning models on the basis of an improved DRASTIC method

open access: yesScientific Reports
Determining situation of groundwater vulnerability plays a crucial role in studying the groundwater resource management. Generally, the preparation of reliable groundwater vulnerability maps provides targeted and practical scientific measures for the ...
Ali Bakhtiarizadeh   +2 more
doaj   +1 more source

Changes in Body Composition in Children and Young People Undergoing Treatment for Acute Lymphoblastic Leukemia: A Systematic Review and Meta‐Analysis

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Ongoing evidence indicates increased risk of sarcopenic obesity among children and young people (CYP) with acute lymphoblastic leukemia (ALL), often beginning early in treatment, persisting into survivorship. This review evaluates current literature on body composition in CYP with ALL during and after treatment.
Lina A. Zahed   +5 more
wiley   +1 more source

A Model-Based Approach to Security Analysis for Cyber-Physical Systems

open access: yes, 2018
Evaluating the security of cyber-physical systems throughout their life cycle is necessary to assure that they can be deployed and operated in safety-critical applications, such as infrastructure, military, and transportation.
Bakirtzis, Georgios   +3 more
core   +1 more source

Identifying Cloud Computing Vulnerabilities

open access: yesInternational Journal of Scientific Research in Science, Engineering and Technology, 2014
Cloud computing is passing through development stage and with the passage process of development, cloud is also posing with security threats, challenges and risks. Lots of security threats, risks and challenges are directly or indirectly due to vulnerabilities in cloud environment.
openaire   +1 more source

Parent‐to‐Child Information Disclosure in Pediatric Oncology

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Despite professional consensus regarding the importance of open communication with pediatric cancer patients about their disease, actual practice patterns of disclosure are understudied. Extant literature suggests a significant proportion of children are not told about their diagnosis/prognosis, which is purported to negatively ...
Rachel A. Kentor   +12 more
wiley   +1 more source

VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms

open access: yesTongxin xuebao, 2015
Based on the analysis of security overlay service (SOS) approach of defending against DDoS attacks in large scale network,the vulnerability in the exit mechanism of being attacked nodes in SOS approach is explored.The vulnerability is solved by improving
UZhi-jun W, UIYi C, UEMeng Y
doaj   +2 more sources

Art of singular vectors and universal adversarial perturbations

open access: yes, 2017
Vulnerability of Deep Neural Networks (DNNs) to adversarial attacks has been attracting a lot of attention in recent studies. It has been shown that for many state of the art DNNs performing image classification there exist universal adversarial ...
Khrulkov, Valentin, Oseledets, Ivan
core   +1 more source

Psychological Safety Among Interprofessional Pediatric Oncology Teams in Germany: A Nationwide Survey

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Psychological safety (PS) is essential for teamwork, communication, and patient safety in complex healthcare environments. In pediatric oncology, interprofessional collaboration occurs under high emotional and organizational demands. Low PS may increase stress, burnout, and adverse events.
Alexandros Rahn   +4 more
wiley   +1 more source

Characterizing Parental Concerns About Lasting Impacts of Treatment in Children With B‐Acute Lymphoblastic Leukemia

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background B‐acute lymphoblastic leukemia (B‐ALL) is the most common pediatric cancer, and while most children in high‐resource settings are cured, therapy carries risks for long‐term toxicities. Understanding parents’ concerns about these late effects is essential to guide anticipatory support and inform evolving therapeutic approaches ...
Kellee N. Parker   +7 more
wiley   +1 more source

Recurrent quantum embedding neural network and its application in vulnerability detection

open access: yesScientific Reports
In recent years, deep learning has been widely used in vulnerability detection with remarkable results. These studies often apply natural language processing (NLP) technologies due to the natural similarity between code and language.
Zhihui Song   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy