The Internet as a Pediatric Neurosurgery Information Resource

1998 ◽  
Vol 28 (4) ◽  
pp. 186-190 ◽  
Author(s):  
Todd A. Maugans ◽  
J. Gordon McComb ◽  
Michael L. Levy
1996 ◽  
Vol 60 (1) ◽  
pp. 8-15 ◽  
Author(s):  
Ivor Benjamin ◽  
Joel W. Goldwein ◽  
Stephen C. Rubin ◽  
W.Gillies McKenna

2017 ◽  
Vol 34 (12) ◽  
pp. 831-835
Author(s):  
Bastian Nucci ◽  
Pierre-Geraud Claret ◽  
Gilles Leclerc ◽  
Arnaud Chaumeron ◽  
Philippe Grillo ◽  
...  

2014 ◽  
Vol 16 (5) ◽  
pp. e128 ◽  
Author(s):  
François Beck ◽  
Jean-Baptiste Richard ◽  
Viet Nguyen-Thanh ◽  
Ilaria Montagni ◽  
Isabelle Parizot ◽  
...  

Author(s):  
Filiz Yildirim ◽  
Metin Çakir

The purpose of this study was to compare health literacy of adult men and women who use the internet for health purposes. It was conducted on 229 adults, who live in Bursa, Turkey, aged 30-69. As data collecting tool, personal along with health information (seeking) forms and 14-item health literacy scale were used. The results showed that although statistically not significant, men used the internet for health purposes more when compared with women. However, it was also calculated that health literacy scores of women who used the internet as a health information resource were higher than those of men in the same category. It can be inferred in this study that women are more health literate compared to men.


2001 ◽  
pp. 1319-1336
Author(s):  
Suzy Conway ◽  
Anna Getselman ◽  
Lucretia W. McClure

1999 ◽  
Vol 28 (2) ◽  
pp. 107-120 ◽  
Author(s):  
Ione Y. DeOllos ◽  
David C. Morris

Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Jianpeng Zhang

Short information sharing time is one of the problems to be solved in the traditional Internet. Therefore, this paper proposes a hierarchical simulation of the Internet of Things sharing structure framework that trusts the cloud to drive Internet information resource sharing. By setting thresholds and iterative adjustment parameters, a complementary judgment matrix is constructed to obtain the minimum nonnegative deviation value and the optimal weight vector. This paper sorts according to the value of the Internet information security model, obtains the optimal model to avoid human tampering, and designs the information resource acquisition process to ensure the reliability of the source data. We use radio frequency identification (RFID) equipment in the preprocessing of massive heterogeneous data in the Internet of Things. In a network environment where resources are limited and heterogeneous are fully considered, the trust-based adaptive detection algorithm is used to evaluate the credibility of the trust-driven algorithm for hierarchical information resource sharing services in the cloud environment of the Internet of Things. We propose a cloud trust-driven hierarchical information resource sharing Internet information resource model. Firstly, the key characteristics of hierarchical information resource sharing are analyzed. Then, a hierarchical information resource sharing model was established by using specific constraints, trust steepness function, cloud trust evaluation criteria, and trust constraint coefficient. Finally, an example of IoT system is designed to verify the effectiveness of the model. Experimental results show that, compared with the traditional model or algorithm, this model has a good hierarchical sharing effect of the underlying resource information.


Sign in / Sign up

Export Citation Format

Share Document