Results 71 to 80 of about 1,913,859 (295)

CAR T‐Cell Therapy in Neurology: A Scoping Review of Neuro‐Oncology, Autoimmune Diseases & Neurotoxicity

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Chimeric antigen receptor (CAR) T‐cell therapy has been investigated in neurological diseases, encompassing both central nervous system malignancies and autoimmune disorders, thereby extending its application beyond hematological cancers.
Omar Alqaisi   +5 more
wiley   +1 more source

Preferences for Posttraumatic Osteoarthritis Prevention Strategies in Individuals With Anterior Cruciate Ligament Injury

open access: yesArthritis Care &Research, EarlyView.
Objective There is growing interest in evaluating new strategies to delay or prevent posttraumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury. Methods Participants with a history of
Kevin Kennedy   +9 more
wiley   +1 more source

Designing communication-intensive web applications: experience and lessons from a real case

open access: yesJournal of Computer Science and Technology, 2005
Who uses requirements engineering and design methodologies besides the people who invented them? Are researchers -at least- actually trying to use them in real-world complex projects and not in "paper project"?
Vito Perrone, Davide Bolchini
doaj  

Detecting Structured Query Language Injections in Web Microservices Using Machine Learning

open access: yesInformatics
Structured Query Language (SQL) injections pose a constant threat to web services, highlighting the need for efficient detection to address this vulnerability.
Edwin Peralta-Garcia   +3 more
doaj   +1 more source

WEB APPLICATIONS READABILITY [PDF]

open access: yes
The emergence known by online press companies requires written filtered information for a better understanding and speed the understanding of texts and messages that are posted. Testing the readability of text in an online environment is important in the
Eugen-Gabriel Garais
core  

Detecting Conflicts and Inconsistencies in Web Application Requirements [PDF]

open access: yes, 2011
Web applications evolve fast. One of the main reasons for this evolution is that new requirements emerge and change constantly. These new requirements are posed either by customers or they are the consequence of users’ feedback about the application ...
Escalona Cuaresma, María José   +3 more
core   +1 more source

Clinical Practice Guideline for Evaluation and Management of Peripheral Nervous System Manifestations in Sjögren's Disease

open access: yesArthritis Care &Research, EarlyView.
Objective Sjögren's disease is an autoimmune disorder that can impact multiple organ systems, including the peripheral nervous system (PNS). PNS manifestations, which can exist concurrently, include mononeuropathies, polyneuropathies, and autonomic nervous system neuropathies.
Anahita Deboo   +88 more
wiley   +1 more source

Temporal Data Modeling and Reasoning for Information Systems [PDF]

open access: yes, 2006
Temporal knowledge representation and reasoning is a major research field in Artificial Intelligence, in Database Systems, and in Web and Semantic Web research.
Bry, François, Spranger, Stephanie
core   +1 more source

Association Between Symptomatic Knee Osteoarthritis and Target Glycemic Control in Individuals With Type 2 Diabetes

open access: yesArthritis Care &Research, EarlyView.
Objective Knee osteoarthritis (OA) commonly affects individuals with type 2 diabetes (T2DM) and is associated with increased risk of diabetes‐related complications. To better understand potential mechanisms, we examined the association between symptomatic knee OA and glycemic control in individuals with T2DM.
Lauren K. King   +10 more
wiley   +1 more source

WAPTT - Web Application Penetration Testing Tool

open access: yesAdvances in Electrical and Computer Engineering, 2014
Web applications vulnerabilities allow attackers to perform malicious actions that range from gaining unauthorized account access to obtaining sensitive data.
DURIC, Z.
doaj   +1 more source

Home - About - Disclaimer - Privacy