Showing 201 - 220 results of 229 for search 'complex optimization vulnerabilities', query time: 0.10s Refine Results
  1. 201

    Experiences, Challenges, and Needs of People Living with HIV in Hunan Province, China: A Qualitative Study by Shi C, Li X, Dai Y, Chen M, Mao L, Zhou X, Lei Y, Yuan W

    Published 2025-03-01
    “…The interview data revealed four themes: (1) the physiological dimension: multi-organ physical symptoms, increased physical vulnerability, and a desire for healthcare guidance; (2) the psychological dimension: emotional distress, inadequate HIV-related knowledge, considerable stigma and discrimination, and a desire for respect and dignity; (3) the societal dimension: huge economic burden, fragile social networks, and a desire for social support; and (4) the spiritual dimension: mixed feelings about death, negative expectations of the future, seeking solace in faith, and a desire for a “good” death.Conclusion: PLHIV in this study have undergone complex journeys across physical, psychological, societal, and spiritual dimensions, expressing urgent needs for support from various stakeholders. …”
    Get full text
    Article
  2. 202

    Health-related preferences of older patients with multimorbidity: the protocol for an evidence map by Marjan Van Den Akker, Odette Wegwarth, Joerg J Meerpohl, Sharon E Straus, Tammy Hoffmann, Ferdinand M Gerlach, Christine Schmucker, Ana Isabel González-González, Christiane Muth

    Published 2019-09-01
    “…Introduction Interaction of conditions and treatments, complicated care needs and substantial treatment burden make patient–physician encounters involving multimorbid older patients highly complex. To optimally integrate patients’ preferences, define and prioritise realistic treatment goals and individualise care, a patient-centred approach is recommended. …”
    Get full text
    Article
  3. 203

    MQGA: A quantitative analysis of brain network hubs using multi-graph theoretical indices by Hongzhou Wu, Zhenzhen Yang, Qingquan Cao, Pan Wang, Bharat B. Biswal, Benjamin Klugah-Brown

    Published 2024-12-01
    “…Results indicate that as network sparsity increases, the con hub index increases while the pro hub index decreases, with the optimal hub node index at 4 % sparsity. Vulnerability tests revealed that removing con nodes had a greater impact on network integrity than removing pro nodes. …”
    Get full text
    Article
  4. 204

    CyberKnife in Pediatric Oncology: A Narrative Review of Treatment Approaches and Outcomes by Costanza M. Donati, Federica Medici, Arina A. Zamfir, Erika Galietta, Silvia Cammelli, Milly Buwenge, Riccardo Masetti, Arcangelo Prete, Lidia Strigari, Ludovica Forlani, Elisa D’Angelo, Alessio G. Morganti

    Published 2025-01-01
    “…A recent German initiative to establish a CK registry for pediatric CNS lesions holds significant promise for advancing evidence-based applications and optimizing treatment strategies in this vulnerable population.…”
    Get full text
    Article
  5. 205
  6. 206

    Spirographic study of functional reserves of masters’ athletes in track-and field by Iryna Ivanyshyn, Ihor Vypasniak, Yurii Ivanyshyn, Roman Boichuk, Oleh Vintoniak, Dmytro Tretiak

    Published 2024-12-01
    “…The functional state of the respiratory system was assessed using the SpiroCom diagnostic complex (HAI). The data were processed using the SPSS Statistics 17.0 software. …”
    Get full text
    Article
  7. 207
  8. 208

    Efficacy and safety of oxaliplatin-based chemotherapy as first-line treatment in elderly patients with metastatic colorectal cancer: a meta-analysis by Shaoqing Fan, Zeming Zhao, Haiqian Wang, Handong Wang, Wenbo Niu

    Published 2025-04-01
    “…However, the absence of significant survival gains underscores the complex interplay between tumor biology and therapeutic resistance. …”
    Get full text
    Article
  9. 209
  10. 210

    The Path Forward: A Review on Enhanced Recovery After Cardiothoracic Transplantation by Irene Bello, Irene Bello, Laurens J. Ceulemans, Laurens J. Ceulemans, Cristiano Amarelli

    Published 2025-04-01
    “…While ERAS protocols have demonstrated significant benefits across a range of surgical specialties, specific guidelines tailored for cardiothoracic transplantation have yet to be developed. Given the unique complexity and heightened vulnerability of transplant patients, the implementation of ERAS principles in this context could potentially mitigate postoperative complications, reduce the length of hospital stays, and facilitate improved recovery trajectories. …”
    Get full text
    Article
  11. 211

    Emergency department pain management in special populations by Katherine Vlasica, Amanda Hall, Mohammad Anzal Rehman, George Notas, Christina Shenvi, Sergey Motov

    Published 2025-07-01
    “…Pain is a leading cause of emergency department (ED) visits globally, yet certain patient populations experience persistent disparities in their pain management due to physiological complexities, comorbidities, and gaps in evidence-based guidelines. …”
    Get full text
    Article
  12. 212

    Key Nodes Identification Method in Scale-Free Network Based on Structural Holes by Weiyan Liu

    Published 2025-01-01
    “…This study proposes a novel hybrid method that integrates structural holes importance indices with Mixed Degree Decomposition (MDD) to optimize node importance evaluation. It introduces two innovations: Dynamic multi-hop bridge detection, extending beyond the 2-hop limitation of E-Burt to quantify long-range bridging influence efficiently; and a weighted fusion model balancing coreness (via MDD) and bridging roles (via structural holes) with linear time complexity.Experiments on synthetic (Barabási-Albert), social (dolphin), infrastructure(Western U.S. power grid), and collaboration (co-authorship) networks demonstrate superiority. …”
    Get full text
    Article
  13. 213

    An image encryption scheme using 4-D chaotic system and cellular automaton by Ibrahim Al-Dayel, Muhammad Faisal Nadeem, Meraj Ali Khan, Bahreselam Sielu Abraha

    Published 2025-06-01
    “…Traditional three-dimensional chaotic systems often have restricted key space and limited complexity, making them vulnerable to cryptanalysis. …”
    Get full text
    Article
  14. 214

    Min3GISG: A Synergistic Feature Selection Framework for Industrial Control System Security with the Integrating Genetic Algorithm and Filter Methods by Saiprasad Potharaju, Swapnali N. Tambe, G. Madhukar Rao, M. V. V. Prasad Kantipudi, Kalyan Devappa Bamane, Mininath Bendre

    Published 2025-05-01
    “…Abstract Industrial control systems (ICS) are crucial for automating and optimizing industrial operations but are increasingly vulnerable to cyberattacks due to their interconnected nature. …”
    Get full text
    Article
  15. 215

    Diversity of frontier processes in Amazonian subnational jurisdictions: Frontier metrics reveal major patterns of human–nature interactions by Guido Briceño, Julie Betbeder, Agnès Bégué, Guillaume Cornu, David Katz-Asprilla, Marie-Gabrielle Piketty, Solen Le Clech, Vinicius Silgueiro, Hélène Dessard, Lilian Blanc

    Published 2025-02-01
    “…The weighted k-means approach was linked to nine metrics covering the period 1990–2021 in three subnational jurisdictions of the Brazilian and Colombian Amazon: 1. baseline forest, 2. percentage forest loss, 3. remaining forest, 4. speed of forest loss, 5. active deforestation, 6. percentage forest degradation, 7. speed of forest degradation, 8. active degradation, and 9. percentage regrowth. Four optimal archetypes were chosen using k-means classification: a. consolidated frontier, b. vulnerable frontier, c. past gradual frontier and d. rampant frontier. …”
    Get full text
    Article
  16. 216

    Screening Hospitalized Pregnant Women and Their Male Partners for Possible Distress: A Comparison of the Clinical Usefulness of Two Screening Measures by Anna Maria Della Vedova, Chiara Bani, Margherita Capretti, Silvia Lucariello, Rita Simonetti, Serena Pelamatti, Emanuela Beretta

    Published 2025-06-01
    “…Pregnancy is a period of great complexity and potential psychological vulnerability which may increase in unfavorable conditions, such as hospitalization. …”
    Get full text
    Article
  17. 217

    Time-Domain ADC and Security Co-Design for SiP-Based Wireless SAW Sensor Readers by Zhen Mao, Bing Li, Linning Peng, Jinghe Wei

    Published 2025-07-01
    “…The signal-processing architecture of passive surface acoustic wave (SAW) sensors presents significant implementation challenges due to its radar-like operational principle and the inherent complexity of discrete component-based hardware design. …”
    Get full text
    Article
  18. 218

    Virtual Reality in Building Evacuation: A Review by Ming-Chuan Hung, Ching-Yuan Lin, Gary Li-Kai Hsiao

    Published 2025-02-01
    “…VR enhances evacuation efficiency and safety compliance by enabling adaptive training for diverse populations, including students, professionals, and vulnerable groups. In public and high-risk environments, VR addresses challenges such as visibility limitations, structural complexity, and the need for customized evacuation protocols. …”
    Get full text
    Article
  19. 219

    Generalized Singular Value Decomposition-Based Secure Beam Hybrid Precoding for Millimeter Wave Massive Multiple-Input Multiple-Output Systems by Boqing Chen, Lijun Yang, Meng Wu

    Published 2025-04-01
    “…It then constructs a hybrid precoder that closely approximates the optimal digital precoder derived from the GSVD-based scheme in a fully digital system. …”
    Get full text
    Article
  20. 220

    Impact of residential density on heavy metal mobilization in urban soils: Human activity patterns and eco-health risks in the Beijing-Tianjin-Hebei region by Siyu Wang, Lingqing Wang, Xiaoyong Liao, Guangjin Zhou, Yizhong Huan, Shun Li, Tao Liang

    Published 2025-09-01
    “…Specifically, Pb mobilization was driven by TOC-metal complexation, while Cu redistribution was linked to carbon-nitrogen interactions. …”
    Get full text
    Article