Results 31 to 40 of about 202,881 (332)
Determining situation of groundwater vulnerability plays a crucial role in studying the groundwater resource management. Generally, the preparation of reliable groundwater vulnerability maps provides targeted and practical scientific measures for the ...
Ali Bakhtiarizadeh +2 more
doaj +1 more source
ABSTRACT Ongoing evidence indicates increased risk of sarcopenic obesity among children and young people (CYP) with acute lymphoblastic leukemia (ALL), often beginning early in treatment, persisting into survivorship. This review evaluates current literature on body composition in CYP with ALL during and after treatment.
Lina A. Zahed +5 more
wiley +1 more source
A Model-Based Approach to Security Analysis for Cyber-Physical Systems
Evaluating the security of cyber-physical systems throughout their life cycle is necessary to assure that they can be deployed and operated in safety-critical applications, such as infrastructure, military, and transportation.
Bakirtzis, Georgios +3 more
core +1 more source
Identifying Cloud Computing Vulnerabilities
Cloud computing is passing through development stage and with the passage process of development, cloud is also posing with security threats, challenges and risks. Lots of security threats, risks and challenges are directly or indirectly due to vulnerabilities in cloud environment.
openaire +1 more source
Parent‐to‐Child Information Disclosure in Pediatric Oncology
ABSTRACT Background Despite professional consensus regarding the importance of open communication with pediatric cancer patients about their disease, actual practice patterns of disclosure are understudied. Extant literature suggests a significant proportion of children are not told about their diagnosis/prognosis, which is purported to negatively ...
Rachel A. Kentor +12 more
wiley +1 more source
VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms
Based on the analysis of security overlay service (SOS) approach of defending against DDoS attacks in large scale network,the vulnerability in the exit mechanism of being attacked nodes in SOS approach is explored.The vulnerability is solved by improving
UZhi-jun W, UIYi C, UEMeng Y
doaj +2 more sources
Art of singular vectors and universal adversarial perturbations
Vulnerability of Deep Neural Networks (DNNs) to adversarial attacks has been attracting a lot of attention in recent studies. It has been shown that for many state of the art DNNs performing image classification there exist universal adversarial ...
Khrulkov, Valentin, Oseledets, Ivan
core +1 more source
ABSTRACT Background Psychological safety (PS) is essential for teamwork, communication, and patient safety in complex healthcare environments. In pediatric oncology, interprofessional collaboration occurs under high emotional and organizational demands. Low PS may increase stress, burnout, and adverse events.
Alexandros Rahn +4 more
wiley +1 more source
ABSTRACT Background B‐acute lymphoblastic leukemia (B‐ALL) is the most common pediatric cancer, and while most children in high‐resource settings are cured, therapy carries risks for long‐term toxicities. Understanding parents’ concerns about these late effects is essential to guide anticipatory support and inform evolving therapeutic approaches ...
Kellee N. Parker +7 more
wiley +1 more source
Recurrent quantum embedding neural network and its application in vulnerability detection
In recent years, deep learning has been widely used in vulnerability detection with remarkable results. These studies often apply natural language processing (NLP) technologies due to the natural similarity between code and language.
Zhihui Song +4 more
doaj +1 more source

