Zobrazeno 1 - 10
of 24 839
pro vyhledávání: '"Raff"'
Publikováno v:
BMC Public Health, Vol 24, Iss 1, Pp 1-12 (2024)
Abstract Background Loneliness is a common experience following stroke. Stroke support groups may protect against loneliness, but little is known about how these groups exert their influence. This research drew upon current theorising on the role of
Externí odkaz:
https://doaj.org/article/0e24d34ec03646da83a337ab7f2d5a1d
Autor:
Dawn Swancutt, Mark Tarrant, Wendy Ingram, Sarah Baldrey, Lorna Burns, Richard Byng, Raff Calitri, Siobhan Creanor, Sarah Dean, Lucy Evans, Laura Gill, Elizabeth Goodwin, Lily Hawkins, Chris Hayward, Sarah Hind, Laura Hollands, Joanne Hosking, Jenny Lloyd, Shokraneh Moghadam, Helen Neilens, Mary O’Kane, Steve Perry, Rod Sheaff, Anne Spencer, Adrian Taylor, Thomas Ward, Ross Watkins, John Wilding, Jonathan Pinkney
Publikováno v:
Pilot and Feasibility Studies, Vol 8, Iss 1, Pp 1-13 (2022)
Abstract Background Approximately 15 million people in the UK live with obesity, around 5 million of whom have severe obesity (body mass index (BMI) ≥35kg/m2). Having severe obesity markedly compromises health, well-being and quality of life, and s
Externí odkaz:
https://doaj.org/article/2115fd3ec57e4c4485e3d760230ffe5f
Autor:
Gary A Abel, John L Campbell, Martin Pitt, Sarah Gerard Dean, Luke Mounce, Fiona C Warren, Emily Fletcher, Anne Spencer, Raff Calitri, Antonieta Medina-Lara, Elizabeth Shephard, Marijke Shakespeare, Adrian Mercer
Publikováno v:
BMJ Open, Vol 13, Iss 3 (2023)
Introduction The UK has worse cancer outcomes than most comparable countries, with a large contribution attributed to diagnostic delay. Electronic risk assessment tools (eRATs) have been developed to identify primary care patients with a ≥2% risk o
Externí odkaz:
https://doaj.org/article/c89773663fe0416ea4c455a5a01b29ac
Previous research on LLM vulnerabilities often relied on nonsensical adversarial prompts, which were easily detectable by automated methods. We address this gap by focusing on human-readable adversarial prompts, a more realistic and potent threat. Ou
Externí odkaz:
http://arxiv.org/abs/2412.16359
Autor:
Mohseni, Seyedreza, Mohammadi, Seyedali, Tilwani, Deepa, Saxena, Yash, Ndawula, Gerald, Vema, Sriram, Raff, Edward, Gaur, Manas
Malware authors often employ code obfuscations to make their malware harder to detect. Existing tools for generating obfuscated code often require access to the original source code (e.g., C++ or Java), and adding new obfuscations is a non-trivial, l
Externí odkaz:
http://arxiv.org/abs/2412.16135
Autor:
de Payrebrune, Kristin M., Flaßkamp, Kathrin, Ströhla, Tom, Sattel, Thomas, Bestle, Dieter, Röder, Benedict, Eberhard, Peter, Peitz, Sebastian, Stoffel, Marcus, Rutwik, Gulakala, Aditya, Borse, Wohlleben, Meike, Sextro, Walter, Raff, Maximilian, Remy, C. David, Yadav, Manish, Stender, Merten, van Delden, Jan, Lüddecke, Timo, Langer, Sabine C., Schultz, Julius, Blech, Christopher
Artificial intelligence (AI) is driving transformative changes across numerous fields, revolutionizing conventional processes and creating new opportunities for innovation. The development of mechatronic systems is undergoing a similar transformation
Externí odkaz:
http://arxiv.org/abs/2412.12230
The concern that Artificial Intelligence (AI) and Machine Learning (ML) are entering a "reproducibility crisis" has spurred significant research in the past few years. Yet with each paper, it is often unclear what someone means by "reproducibility".
Externí odkaz:
http://arxiv.org/abs/2412.03854
Trajectory optimization is a widely used tool in the design and control of dynamical systems. Typically, not only nonlinear dynamics, but also couplings of the initial and final condition through implicit boundary constraints render the optimization
Externí odkaz:
http://arxiv.org/abs/2412.03195
Autor:
Gupta, Siddhant, Lu, Fred, Barlow, Andrew, Raff, Edward, Ferraro, Francis, Matuszek, Cynthia, Nicholas, Charles, Holt, James
A strategy used by malicious actors is to "live off the land," where benign systems and tools already available on a victim's systems are used and repurposed for the malicious actor's intent. In this work, we ask if there is a way for anti-virus deve
Externí odkaz:
http://arxiv.org/abs/2411.18516
Autor:
Sarah Gerard Dean, Joshua Feyi-Waboso, Mark Tarrant, Raff Calitri, Elizabeth Shephard, Alex Burns, Brian Donnelly
Publikováno v:
BMJ Open, Vol 12, Iss 6 (2022)
Externí odkaz:
https://doaj.org/article/ea725cf1283a4fbfb870918dd639c9c2