Results 241 to 250 of about 781,799 (337)
Enhanced repeated measurement of psychological tasks and form questions via a web-based mobile app. [PDF]
Nishimura Y +6 more
europepmc +1 more source
Search-based security testing of web applications
Julian Thomé +2 more
openalex +2 more sources
Objective To identify and summarize existing telerehabilitation interventions for people living with rheumatic and musculoskeletal diseases (RMDs), including the rehabilitation components, the technology used, the type of health care professional (HCP) interaction, and how the effectiveness is evaluated.
Thomas A. Ingram +5 more
wiley +1 more source
Architectural patterns for health information systems: a systematic review. [PDF]
Casanova R +2 more
europepmc +1 more source
A phase 2 trial of hydroxychloroquine in individuals at risk for rheumatoid arthritis
Background Individuals with serum elevations of anti‐cyclic citrullinated peptide (anti‐CCP) antibodies are at increased risk for future rheumatoid arthritis (RA). No pharmacologic interventions have been approved for the prevention of RA in such ‘at‐risk’ individuals. However, hydroxychloroquine (HCQ) is used without supporting clinical trial evidence.
Kevin D. Deane +33 more
wiley +1 more source
Objective To develop evidence‐based criteria to classify SURF patients. Methods 112 SURF patients followed in a single tertiary referral center were analyzed. Patients with genetically confirmed hereditary recurrent fever (HRF) or with periodic fever, aphthosis, pharyngitis and adenitis (PFAPA) syndrome already analyzed for the Eurofever classification
Riccardo Papa +54 more
wiley +1 more source
Application of digital technology intervention in palliative care: a scoping review. [PDF]
Zhang Y +6 more
europepmc +1 more source
Reflexive thematic analysis and men's embodiment following injury or illness: A worked example
Abstract Reflexive thematic analysis (reflexive TA) originated within psychology and the social sciences and has become an increasingly popular qualitative analytic method across a range of disciplines. In this article, we offer a brief methodological guide for researchers hoping to use the method, suitable for beginners through to those experienced in
Gareth Terry, Nikki Hayfield
wiley +1 more source
Network security analysis based on feature selection and optimized fireworks algorithm. [PDF]
Zhou L +5 more
europepmc +1 more source

