Results 71 to 80 of about 180,917 (343)

ANALISA DAN PERANCANGAN GAME EDUKASI STUDENT ADVENTURE 2D PADA SMK NEGERI 1 AL-MUBARKEYA

open access: yesCyberspace, 2020
Penelitiant ini bertujuan merancang media belajar dalam bentuk game. penelitian ini menggunakan metode penelitian dan pengembangan ( Research and Dvelopment ). Dalam tahapan proses penelitian ini ada tahap analisis, desain, pengembangan, implementasi dan
Sulaiman Aula   +2 more
doaj   +1 more source

Functional and Structural Evidence of Neurofluid Circuit Aberrations in Huntington Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Disrupted neurofluid regulation may contribute to neurodegeneration in Huntington disease (HD). Because neurofluid pathways influence waste clearance, inflammation, and the distribution of central nervous system (CNS)–delivered therapeutics, understanding their dysfunction is increasingly important as targeted treatments emerge.
Kilian Hett   +8 more
wiley   +1 more source

Muddy rules for cyberspace: Musings of a she-blogger [PDF]

open access: yes
‘Muddy rules for cyberspace’: Musings of a she-blogger. Yvonne Downs Although referring specifically to intellectual property rights, the above quotation from Burk (1998) gives a sense of the complex, emergent, often ambiguous terms on which we enter ...
Downs, Yvonne
core  

Epilepsy‐Associated Variants of a Single SCN1A Codon Exhibit Divergent Functional Properties

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Pathogenic variants in SCN1A, which encodes the voltage‐gated sodium channel NaV1.1, are associated with multiple epilepsy syndromes exhibiting a range of clinical severity. SCN1A variants are reported in different syndromes, including Dravet syndrome, which is associated with loss‐of‐function, whereas neonatal/infantile‐onset ...
Lanie N. Liebovitz   +3 more
wiley   +1 more source

Mf-net: multi-feature fusion network based on two-stream extraction and multi-scale enhancement for face forgery detection

open access: yesComplex & Intelligent Systems
Due to the increasing sophistication of face forgery techniques, the images generated are becoming more and more realistic and difficult for human eyes to distinguish.
Hanxian Duan   +7 more
doaj   +1 more source

Women In The Web of Secondary Copyright Liability and Internet Filtering [PDF]

open access: yes, 2005
This Essay suggests possible explanations for why there is not very much legal scholarship devoted to gender issues on the Internet; and it asserts that there is a powerful need for Internet legal theorists and activists to pay substantially more ...
Bartow, Ann
core   +1 more source

Multidimensional Profiling of MRI‐Negative Temporal Lobe Epilepsy Uncovers Distinct Phenotypes

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Although hippocampal sclerosis (TLE‐HS) represents the most frequent cause of temporal lobe epilepsy (TLE), up to 30% of patients show no lesion on visual MRI inspection (TLE‐MRIneg). These cases pose diagnostic and therapeutic challenges and are underrepresented in surgical series.
Alice Ballerini   +28 more
wiley   +1 more source

The role of computer mediated environment and simulations in mediating consumers' personal and domestic life-worlds [PDF]

open access: yes, 2008
This thesis examines the impacts of consumption of simulations. Using ethnographic methods, it explores how Irish consumers are using simulated products in lieu of the real and tangible, and how consumption of these simulations impact on their lifeworlds.
Siddiqui, Shakeel
core  

Reperfusion‐Dependent Outcomes After Endovascular Thrombectomy Stratified by NIHSS‐ASPECTS Clinical‐Core Mismatch

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective This analysis evaluates the effect of successful reperfusion on functional outcomes after MT, stratified by admission National Institutes of Health Stroke Scale (NIHSS) and Alberta Stroke Program Early CT Score (ASPECTS) as surrogates for clinical‐core mismatch, using multicenter registry data.
Felix Schlicht   +53 more
wiley   +1 more source

Honey password vaults tolerating leakage of both personally identifiable information and passwords

open access: yesCybersecurity
Honey vaults are useful tools for password management. A vault usually contains usernames for each domain, and the corresponding passwords, encrypted with a master password chosen by the owner.
Chao An   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy