Results 111 to 120 of about 89,634 (258)

Using job-title-based physical exposures from O*NET in an epidemiological study of carpal tunnel syndrome [PDF]

open access: yes, 2014
OBJECTIVE: We studied associations between job title based measures of force and repetition and incident carpal tunnel syndrome (CTS). BACKGROUND: Job exposure matrices (JEMs) are not commonly used in studies of work-related upper extremity disorders ...
Dale, Ann Marie   +3 more
core   +1 more source

Tunneling spectroscopy probing magnetic and nonmagnetic electrodes in tunnel junctions [PDF]

open access: yesarXiv, 2010
Tunneling spectroscopy is applied to tunnel junctions with only one or no ferromagnetic electrode to study the excitation of quasi particles in magnetic tunnel junctions. The bias dependence is investigated with high accuracy by inelastic electron tunneling spectroscopy.
arxiv  

Electromyographic diagnosis of the carpal tunnel syndrome

open access: yesArquivos de Neuro-Psiquiatria, 1978
Sensory conduction velocities of the median nerVe were studied from digit to palm and from palm to wrist in normal subjects and in patients with the carpal tunnel syndrome. Definite slowing was noted in the palm to wrist segment, even in the early carpal
K. Toyonaga, C. R. de Faria
doaj   +1 more source

Sex-related differences in carpal arch morphology.

open access: yesPLoS ONE, 2019
The purpose of this study was to investigate the sex-based differences in the carpal arch morphology. Carpal arch morphology was quantified using palmar bowing and area of the arch formed by the transverse carpal ligament.
Kishor Lakshminarayanan   +2 more
doaj   +1 more source

IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model:A Case Study for University of Mysore Network [PDF]

open access: yesInternational Journal of Computer Science and Information Security, IJCSIS July 2009, Vol. 3, No. 1, USA, 2009
The actual transition from IPv4 to IPv6 requires network administrators to become aware of the next generation protocol and the associated risk problems.Due to the scale and complexity of current internet architecture how to protect from the existing investment and reduce the negative influence to users and service providers during the transition from ...
arxiv  

Home - About - Disclaimer - Privacy