Full Text Available
Access Full Text at Repository
Search Results - "Cybersecurity"
-
Development, system design, safety, and performance metrics of a conversational agent for reducing depressive and anxious symptoms based on a large language model: The MHAI study
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
Online Article RSS Article -
Fisheries ecological knowledge, FEK: Contribution to the knowledge of the ecology and distribution of houndsharks and dogfish shark (family Triakidae and Squalidae) in the Canary I...
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Using national virtual maternal death reviews to improve the quality of care during Pregnancy, labour and birth, and Postpartum in Tanzania
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Exploring patient interpretation of an orthosis adherence checklist: A cognitive interview study
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Emergence of appetite and circadian rhythmicity in Atlantic salmon brain transcriptome from endogenous to exogenous feeding
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Mode of action-specific and cause-specific retention of biologic and targeted synthetic disease-modifying antirheumatic drugs in anti-SS-A antibody-positive rheumatoid arthritis: T...
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Association between vaginal washing and group B Streptococcus colonization from periconception through the first trimester of pregnancy in a cohort of Kenyan women
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
When revealed after the fact, selfish intentions undermine prosocial actions in 5-year-olds
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Accessible and cost-effective methods for patterning cell monolayers on compliant substrates
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
SegMan-based dual-prior network with boundary-augmented hybrid attention for robust skin lesion segmentation
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Nutritional status and health of community-dwelling older adults in urban areas of the Lalitpur district, Nepal
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
How do hospital goals resonate with leaders, clinicians, managers, and patient and family partners? A critical discourse analysis of institutional logics
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Thiamine status of whitefish (Coregonus maraena) in the Baltic Sea
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Food and feed safety of a novel Vip3C insecticidal protein derived from Paenibacillus spp. for protection of crop plants against key Lepidopteran pests
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Intrinsic over extrinsic: Species identity shapes spatial and interannual Mg/Ca patterns in Arctic marine calcifiers
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Maternal prothrombin time as an independent predictor of neonatal sepsis: A retrospective case–control study
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Correction: Risk of ciguatoxins is shaped by Gambierdiscus community structure
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
No Thesis, No Future! Exploring the associations between research inaccessibility and suicidal ideation
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Comparison of CD34+ cell enumeration between flow cytometric analysis and ADAMII-CD34 image-based fluorescence cell counter
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text
-
Visual self-assessment of dental appearance: A comparison of mirror types and digital reflection via smartphone front facing camera
Published in PLOS ONE (2026)Subjects: “…Cybersecurity, Cryptography and Privacy…”
Get full text