Results 71 to 80 of about 199,972 (293)

Patterns of Postictal Abnormalities in Relation to Status Epilepticus in Adults

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Abnormalities on peri‐ictal diffusion‐weighted magnetic resonance imaging (DWI‐PMAs) are well‐established for patients with status epilepticus (SE), but knowledge on patterns of DWI‐PMAs and their prognostic impact is sparse. Methods This systematic review and individual participant data meta‐analysis included observational studies ...
Andrea Enerstad Bolle   +11 more
wiley   +1 more source

Securing the Shared Kernel: Exploring Kernel Isolation and Emerging Challenges in Modern Cloud Computing

open access: yesIEEE Access
Containerization is a rapidly advancing technology in cloud computing, facilitating the seamless development, deployment, and management of applications across diverse computing environments.
Sehar Zehra   +5 more
doaj   +1 more source

U.S. Customs and Border Protection: Trade Facilitation, Enforcement, and Security [PDF]

open access: yes, 2013
[Excerpt] This report describes and analyzes import policy and CBP’s role in the U.S. import process. (The report does not cover CBP’s role in the U.S. export control system.) The first section of the report describes the three overarching goals of U.S ...
Jones, Vivian C, Rosenblum, Marc R
core   +2 more sources

Innate Immune Reprogramming Mediated by Endogenous Retroelement Dysregulation Drives Multiple Sclerosis Progression

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
Epigenetic reprogramming in hematopoietic stem and progenitor cells (HSPCs) and downstream myeloid cells, mediated by H3.3 downregulation and endogenous retroelement (ERE) overexpression, contributes to the progression of multiple sclerosis (MS). ABSTRACT Background Skewed myelopoiesis in the bone marrow has been identified as a key driver of multiple ...
Li‐Mei Xiao   +6 more
wiley   +1 more source

Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation

open access: yesIEEE Photonics Journal, 2017
The conventional ghost-imaging-based encryption (GIE) scheme has low-quality decrypted images and unsatisfied security. In this paper, we propose to cope with these issues using customized data container and exclusive-OR (XOR) operation.
Yi Qin, Yingying Zhang
doaj   +1 more source

Location‐Specific Hematoma Volume Predicts Early Neurological Deterioration in Supratentorial ICH

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Early neurological deterioration (END) adversely affects outcomes in patients with intracerebral hemorrhage (ICH). This study aimed to determine the location‐specific hematoma volumes for END in supratentorial ICH patients. Methods We retrospectively analyzed supratentorial ICH patients presenting from two prospective cohorts.
Zuoqiao Li   +10 more
wiley   +1 more source

Modeling IoT-aware Business Processes - A State of the Art Report [PDF]

open access: yes, 2018
This research report presents an analysis of the state of the art of modeling Internet of Things (IoT)-aware business processes. IOT links the physical world to the digital world. Traditionally, we would find information about events and processes in the
Asensio, E. Serral   +4 more
core   +1 more source

Preferences for post‐traumatic osteoarthritis prevention strategies in individuals with anterior cruciate ligament injury

open access: yesArthritis Care &Research, Accepted Article.
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy   +9 more
wiley   +1 more source

Strategy of container migration and honeypot deployment based on signal game in cloud environment

open access: yes网络与信息安全学报, 2022
Multi-tenant coexistence and resource sharing in the SaaS cloud pose serious security risks.On the one hand, soft isolation of logical namespaces is easy to be bypassed or broken.On the other hand, it is easy to be subjected to co-resident attacks due to
Lingshu LI   +3 more
doaj  

Effectiveness and Safety of Baricitinib for Juvenile Idiopathic Arthritis–Associated Uveitis or Chronic Anterior Antinuclear Antibody–Positive Uveitis

open access: yesArthritis Care &Research, EarlyView.
Objective To evaluate the efficacy and safety of baricitinib in pediatric patients with active juvenile idiopathic arthritis–associated uveitis (JIA‐U) or chronic anterior antinuclear antibody–positive uveitis, who had an inadequate response to methotrexate (MTX) or biologic disease‐modifying antirheumatic drugs (bDMARDs).
Athimalaipet V. Ramanan   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy