Results 91 to 100 of about 1,839,877 (306)

Network Localization of Fatigue in Multiple Sclerosis

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Fatigue is among the most common symptoms and one of the main factors determining the quality of life in multiple sclerosis (MS). However, the neurobiological mechanisms underlying fatigue are not fully understood. Here we studied lesion locations and their connections in individuals with MS, aiming to identify brain networks ...
Olli Likitalo   +12 more
wiley   +1 more source

Design of Mutually Authenticated Key Agreement Protocol Resistant to Impersonation Attacks for Multi-Server Environment

open access: yesIEEE Access, 2017
Three-factor mutually authenticated key agreement protocols for multi-server environments have gained momentum in recent times due to advancements in wireless technologies and associated constraints.
Alavalapati Goutham Reddy   +4 more
doaj   +1 more source

IoV-SMAP: Secure and Efficient Message Authentication Protocol for IoV in Smart City Environment

open access: yesIEEE Access, 2020
With the emergence of the concept of smart city and the increasing demands for a range of vehicles, Internet of Vehicles (IoV) has achieved a lot of attention by providing multiple benefits, including vehicle emergence, accidents, levels of pollution ...
Sungjin Yu   +4 more
doaj   +1 more source

Reduced Muscular Carnosine in Proximal Myotonic Myopathy—A Pilot 1H‐MRS Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Myotonic dystrophy type 2 (proximal myotonic myopathy, PROMM) is a progressive multisystem disorder with muscular symptoms (proximal weakness, pain, myotonia) and systemic manifestations such as diabetes mellitus, cataracts, and cardiac arrhythmias.
Alexander Gussew   +11 more
wiley   +1 more source

Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment

open access: yesIEEE Access, 2018
Remote user authentication is a cryptographic mechanism through which a remote server verifies the legitimacy of an authorized user over an insecure communication channel.
Subhas Barman   +5 more
doaj   +1 more source

Association of Corticospinal Tract Asymmetry With Ambulatory Ability After Intracerebral Hemorrhage

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Ambulatory ability after intracerebral hemorrhage (ICH) is important to patients. We tested whether asymmetry between ipsi‐ and contra‐lesional corticospinal tracts (CSTs) assessed by diffusion tensor imaging (DTI) is associated with post‐ICH ambulation.
Yasmin N. Aziz   +25 more
wiley   +1 more source

On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services

open access: yesIEEE Access, 2017
Secure and efficient lightweight user authentication protocol for mobile cloud computing becomes a paramount concern due to the data sharing using Internet among the end users and mobile devices.
Sandip Roy   +5 more
doaj   +1 more source

An Extended Coding Theorem with Application to Quantum Complexities

open access: yes, 2020
This paper introduces a new inequality in algorithmic information theory that can be seen as an extended coding theorem. This inequality has applications in new bounds between quantum complexity measures.Comment: 18 pages, 4 ...
Epstein, Samuel
core  

Functional Connectivity Linked to Cognitive Recovery After Minor Stroke

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Patients with minor stroke exhibit slowed processing speed and generalized alterations in functional connectivity involving frontoparietal cortex (FPC). The pattern of connectivity evolves over time. In this study, we examine the relationship of functional connectivity patterns to cognitive performance, to determine ...
Vrishab Commuri   +7 more
wiley   +1 more source

Shannon Information and Kolmogorov Complexity

open access: yes, 2004
We compare the elementary theories of Shannon information and Kolmogorov complexity, the extent to which they have a common purpose, and where they are fundamentally different.
Grunwald, Peter, Vitanyi, Paul
core   +1 more source

Home - About - Disclaimer - Privacy