Showing 1,161 - 1,180 results of 19,848 for search 'Alternet~', query time: 6.65s Refine Results
  1. 1161

    Buprenorphine for Chronic Pain: A Safer Alternative to Traditional Opioids by Suhani Dalal, Ahish Chitneni, Amnon A. Berger, Vwaire Orhurhu, Bilal Dar, Bennett Kramer, Anvinh Nguyen, John Pruit, Charles Halsted, Alan D. Kaye, Jamal Hasoon

    Published 2021-08-01
    “…With the ongoing public health crisis with prescription opioids, there is a need for safer alternatives for medication management in chronic pain patients. …”
    Get full text
    Article
  2. 1162
  3. 1163
  4. 1164
  5. 1165

    Türkiye'de İnternet Gazeteciliği Açısından Yerel Basının Genel Görünümü ve Bölgeler Arası Bir Değerlendirme by Halil Gürcan, Onur Bekiroğlu

    Published 2013-11-01
    Subjects: “…i̇nternet gazeteciliği; internet ortamı; yerel basın.…”
    Get full text
    Article
  6. 1166

    Halkla İlişkiler Bakış Açısından Kriz Durumlarında İnternetin Rolü ve İnternet Kriz Planlaması by Başak Solmaz

    Published 2013-11-01
    Subjects: “…i̇nternet; internet kriz planlaması; halkla ilişkiler…”
    Get full text
    Article
  7. 1167

    Research on Road Adhesion Condition Identification Based on an Improved ALexNet Model by QiMing Wang, JinMing Xu, Tao Sun, ZhiChao Lv, GaoQiang Zong

    Published 2021-01-01
    “…First, the ALexNet network model is pretrained on the ImageNet dataset offline. …”
    Get full text
    Article
  8. 1168
  9. 1169
  10. 1170
  11. 1171
  12. 1172
  13. 1173
  14. 1174
  15. 1175
  16. 1176

    Ring-based efficient batch authentication and group key agreement protocol with anonymity in Internet of vehicles by Haibo ZHANG, Kai LAN, Zhou CHEN, Ruyan WANG, Can ZOU, Mingyue WANG

    Published 2023-06-01
    “…Aiming at the problem that the current batch authentication and key agreement protocol were relied on semi-trusted road side unit (RSU) and were not suitable for key update in large-scale Internet of vehicles (IoV), a ring-based efficient batch authentication and group key agreement protocol with anonymity in IoV was proposed.The anonymity was ensured by the pseudonym mechanism.The authentication key pairs were constructed by the chaotic map, and the batch authentication for many vehicles was quickly completed by a small number of bilinear maps.The joining and leaving of vehicles in large-scale IoV scenario were fully considered, a ring session group was efficiently constructed by using the semi-group property of chaotic maps, and a group key establishment and update mechanism suitable for large-scale vehicles was designed.In addition, a pseudonym update mechanism and an anonymous tracing mechanism were designed to ensure a more secure session process.At the same time, the BAN logic model was used to prove the semantic security of the protocol.The security analysis and simulation results show that the proposed protocol has multiple security attributes and certain efficiency advantages.…”
    Get full text
    Article
  17. 1177
  18. 1178
  19. 1179

    Entropy-based feature selection with applications to industrial internet of things (IoT) and breast cancer prediction by Ismail Mageed

    Published 2024-09-01
    “…More potentially, some significant applications of entropy-based FS to the Internet of Things (IoT) and breast cancer prediction are provided.…”
    Get full text
    Article
  20. 1180