Results 161 to 170 of about 63,938 (281)
Investigating Sleep Concerns in Cervical Dystonia
Abstract Background Heterogenous, small cohorts, and co‐occurrence of pain and psychiatric burden complicate understanding of sleep in dystonia. Objective To investigate sleep concerns in cervical dystonia (CD). Methods Longitudinal data from CD‐PROBE on subjects who were toxin‐naïve, new to practice, or without injections for at least 16 weeks were ...
Abhimanyu Mahajan +2 more
wiley +1 more source
BigFlow-NIDS: A large-scale dataset for network intrusion detection in big data environment. [PDF]
Uddin MB, Arefin MS, Hussain MMM.
europepmc +1 more source
Abstract Background The Movement Disorder Society‐Unified Parkinson's Disease Rating Scale‐Part III (MDS‐UPDRS‐III) is subjective and insensitive to subtle changes in patients with Parkinson's disease (PD). Computer vision (CV) can extract objective kinematics from routine outpatient videos, potentially augmenting the accuracy of the motor assessment ...
Pasquale Maria Pecoraro +12 more
wiley +1 more source
Voice and Speech in Atypical Parkinsonian Disorders
Background Motor speech disorders are early, common, and functionally limiting features of atypical parkinsonian disorders (APDs) such as progressive supranuclear palsy (PSP), corticobasal syndrome (CBS), and multiple system atrophy (MSA). These impairments are underrecognized and undertreated in neurology clinics.
Federico Rodriguez‐Porcel +48 more
wiley +1 more source
A hybrid XGBoost-SVM ensemble framework for robust cyber-attack detection in the internet of medical things (IoMT). [PDF]
Abdelhaq M +5 more
europepmc +1 more source
Abstract Background Spinocerebellar ataxia type 3 (SCA3) is a polyglutamine (polyQ) neurogenerative disorder that results from CAG trinucleotide repeat expansions in the ATXN3 gene, leading to toxic protein aggregate formation and cellular pathway dysfunction.
Tiago Moreira‐Gomes +9 more
wiley +1 more source
Explainable attention based few shot LSTM for intrusion detection in imbalanced cyber physical system networks. [PDF]
Abdulganiyu OH +6 more
europepmc +1 more source
Data‐Based Detection of Antagonistic Agents in a Robot Swarm Solving a Dynamic Coverage Task
ABSTRACT Robot swarms can be deployed as moving surveillance systems, for instance, as mobile anti‐poaching systems for monitoring wildlife and detecting poaching activities. Since poachers have an interest in evading detection, robots are at risk of being hijacked and manipulated to behave antagonistically, for example, to prevent the correct ...
Ingeborg Wenger +2 more
wiley +1 more source
An Analysis and Simulation of Security Risks in Radar Networks from the Perspective of Cybersecurity. [PDF]
Chen R, Zhang Y, Li X, Ran J.
europepmc +1 more source
Proteome Analysis of Corynebacterium diphtheriae–Macrophage Interaction
ABSTRACT Contact of Corynebacterium diphtheriae with macrophages induces adaptations on both bacterial and cellular sides. The study presented here was aiming to shed light on the simultaneous intracellular adaptation of the bacteria and changes in the proteome of the phagocytes in response to the internalization of C. diphtheriae.
Luca Musella +6 more
wiley +1 more source

