761 results found

Felipe Webster-Cordero, Lydia Giménez-Llort

The presence of subjective cognitive complaints (SCC) in older adults, especially at the executive level, is a major reason for consultation in clinical practice. These changes, though often subtle, m...

BMC Neurology 2026-04-23 rs-9059640
Subjective cognitive complaints Dementia Executive performance Neuropsychological assessment self- and informant report

Małgorzata Bronikowska

Background This longitudinal study investigated the development of moral competence among adolescents and examined the influence of selected environmental factors, including religion, education, paren...

BMC Public Health 2026-04-23 rs-9278671
Moral competence Adolescents Moral development Environmental influences Longitudinal study

Xin Guan, Xinyu Liu, Lingyu Su

High pressure culture is an important source of workplace stress. In the global environment, the high-pressure culture of enterprises is one of the crucial factors leading to turnover.However, are hig...

BMC Psychology 2026-04-23 rs-9121603
high pressure culture burnout turnover intention emotional labour organizational commitment

Caiping Liu, Xinghan Wang, Yan Wang, Yuan Ao, Bo Bian

Background: Population aging and family nuclearization in China have increased the number of a growing number of elderly individuals living alone or with only their spouse ("spousal cohabitation"). Cu...

BMC Geriatrics 2026-04-23 rs-9112025
Elderly Residential patterns Social support Mental health Sleep quality Healthcare demand Community health services

Hwan Kim, Jiha Kim, Seunghyun Park, Hyunhee Park

Trusted computing systems and blockchain-enabled security applications increas- ingly rely on Graph Neural Networks (GNNs) for trust graph analysis, fraud detection, and anomaly identification. In the...

Discover Computing 2026-04-23 rs-9264474
Graph Neural Networks Noise Robustness KL Divergence Adaptive Correction Trusted Computing Blockchain Security

Arthur Berger, Guillaume Pere, Anna Sebbagh, Matthieu Bruzzi, Amaury D'Angelo, Hadrien Alric, Thomas Viel, Irami Araújo-Filho, Marion Marty, Corinne Lesaffre, Chloé Broudin, Leila M'Harzi, Guillaume Perrod, Elise Madec, Florence Gazeau, Bertrand Tavitian, Amanda Silva Brun, Gabriel Rahmi

Background: Gastrocutaneous fistulae following sleeve gastrectomy represent a serious complication associated with prolonged and complex management. To explore innovative therapeutic options, we aimed...

Obesity Surgery 2026-04-23 rs-9139067

André Vitor Santana Souza, Paulo Ivson, André Heriberto Nunes, Yiselis Rodriguez Vignon

Nitrogen oxide (NOx) emissions from heavy-duty vehicles pose significant environmental and health risks, especially in urban regions with high traffic density. This study presents a comparative multi-...

Scientific Reports 2026-04-23 rs-9283128
Deep Learning Heavy-duty Vehicles NOx Emissions LSTM Meteorological Data Kriging

Tushar Pathare, Sandeep Patil, Frank Lee

Large-scale genomics pipelines generate petabyte-class datasets whose I/O access patterns are governed by discrete biological processingstages rather than by file recency or age. Conventional time-bas...

The Journal of Supercomputing 2026-04-23 rs-8987940
IBM GPFS IBM Spectrum Scale Integrated Lifecycle Management genomics bioinformatics storage tiering workflow metadata NVMe HPC data lifecycle management POSIX extended attributes xattr Nextflow Snakemake GATK variant calling sequencing autonomous storage policy

Biao Tan, Yi Tang

Skeleton-based action recognition has wide applications, but its performance degrades significantly with subtle action variations. This deficiency primarily arises because existing methods overemphasi...

Scientific Reports 2026-04-23 rs-9273421

Somnath Kumar, Kunal Dey, Vikas Srivastava, Sumit Kumar Debnath, Ashok Kumar Das, Shehzad Ashraf Chaudhry

 The rapid growth of the Internet of Things (IoT) introduces challenges in secure authentication and delegation due to the limited computational capabilities of devices. Proxy signature schemes offer ...

Scientific Reports 2026-04-23 rs-9295947
Isogeny-based public-key cryptography IoT proxy signature post-quantum cryptography elliptic curve cryptography
Back to Top
Home
Browse
Submit
About
0.020744s