Results 71 to 80 of about 1,031,597 (350)

Content source selection in Bluetooth networks [PDF]

open access: yes, 2007
Large scale market penetration of electronic devices equipped with Bluetooth technology now gives the ability to share content (such as music or video clips) between members of the public in a decentralised manner.
Capra, L., Mascolo, C., McNamara, L.
core   +1 more source

CAR T‐Cell Therapy in Neurology: A Scoping Review of Neuro‐Oncology, Autoimmune Diseases & Neurotoxicity

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Chimeric antigen receptor (CAR) T‐cell therapy has been investigated in neurological diseases, encompassing both central nervous system malignancies and autoimmune disorders, thereby extending its application beyond hematological cancers.
Omar Alqaisi   +5 more
wiley   +1 more source

An in vivo comparison of accuracy of two electronic apex locators in determining working length using stainless steel and nickel titanium files

open access: yesClinical, Cosmetic and Investigational Dentistry, 2018
Sanjeeb Chaudhary, Archana Gharti, Bhawana Adhikari Department of Conservative Dentistry and Endodontics, School of Dental Sciences, Chitwan Medical College, Bharatpur, Nepal Purpose: A key factor affecting the success of endodontic treatment is correct ...
Chaudhary S, Gharti A, Adhikari B
doaj  

P2P Watch: Personal Health Information Detection in Peer-to-Peer File-Sharing Networks

open access: yesJournal of Medical Internet Research, 2012
BackgroundUsers of peer-to-peer (P2P) file-sharing networks risk the inadvertent disclosure of personal health information (PHI). In addition to potentially causing harm to the affected individuals, this can heighten the risk of data breaches for health ...
Sokolova, Marina   +5 more
doaj   +1 more source

Preferences for Posttraumatic Osteoarthritis Prevention Strategies in Individuals With Anterior Cruciate Ligament Injury

open access: yesArthritis Care &Research, EarlyView.
Objective There is growing interest in evaluating new strategies to delay or prevent posttraumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury. Methods Participants with a history of
Kevin Kennedy   +9 more
wiley   +1 more source

FROM ELECTRONIC PROCESS OF LAW TO PUBLIC DOCUMENT: AN ANALYSIS OF CONSERVATION OF COURT CASE AS A PERMANENT FILES

open access: yesRevista Eletrônica do Curso de Direito da UFSM, 2017
The management of documents produced by the Judiciary in the exercise of its judicial function constitutes a constitutional duty of the judicial public administration, since custody and access to these documents are important points of connection between
Elaine Harzheim Macedo   +1 more
doaj   +1 more source

Maximal abelian and Curci-Ferrari gauges in momentum subtraction at three loops

open access: yes, 2015
The vertex structure of QCD fixed in the maximal abelian gauge (MAG) and Curci-Ferrari gauge is analysed at two loops at the fully symmetric point for the 3-point functions corresponding to the three momentum subtraction (MOM) renormalization schemes ...
Bell, J. M., Gracey, J. A.
core   +1 more source

Sex Differences in Medication Discontinuation in Axial Spondyloarthritis

open access: yesArthritis Care &Research, EarlyView.
Objective We examined sex differences in medication discontinuation among patients with axial spondyloarthritis (axSpA) initiating tumor necrosis factor inhibitors (TNFi), interleukin‐17 inhibitors (IL‐17i), or JAK inhibitors (JAKi). Methods Using data from the Rheumatology Informatics System for Effectiveness (RISE) Registry (2003–2025), we assessed ...
Rachael Stovall   +9 more
wiley   +1 more source

Information Security Study for Information Hiding in Electronic Computers

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2005
Cryptographic technologies are nowadays widely recognized asthe essential tool for  security and trust in electronic communication. The research produces some important methods to hide information like this hide secret messages in other messages ...
H.J. Muhasin
doaj   +1 more source

Data migration in archives of Serbia and Montenegro: Concept and example [PDF]

open access: yes, 2004
We present organization of database used to store metadata about backup i.e about electronic files that make backup, and describe problems that occurred in the process of migrating data before database has been designed and ...
Porubović-Vidović, Olivera
core  

Home - About - Disclaimer - Privacy