Results 61 to 70 of about 2,427,716 (339)

Lessons Learned: Quality Analysis of Optical Coherence Tomography in Neuromyelitis Optica

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Introduction Optical coherence tomography (OCT)‐derived retina measurements are markers for neuroaxonal visual pathway status. High‐quality OCT scans are essential for reliable measurements, but their acquisition is particularly challenging in eyes with severe visual impairment, as often observed in neuromyelitis optica spectrum disorders ...
Hadi Salih   +40 more
wiley   +1 more source

Network Localization of Fatigue in Multiple Sclerosis

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Fatigue is among the most common symptoms and one of the main factors determining the quality of life in multiple sclerosis (MS). However, the neurobiological mechanisms underlying fatigue are not fully understood. Here we studied lesion locations and their connections in individuals with MS, aiming to identify brain networks ...
Olli Likitalo   +12 more
wiley   +1 more source

Formal Verification of Language-Based Concurrent Noninterference

open access: yesJournal of Formalized Reasoning, 2013
We perform a formal analysis of compositionality techniques for proving possibilistic noninterference for a while language with parallel composition.
Andrei Popescu   +2 more
doaj   +1 more source

Persistent Leukoencephalopathy Following H1N1 Infection Associated With a Novel MYRF Variant (p.Gly735Asp)

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Mutations in myelin regulatory factor (MYRF) are linked to demyelinating disorders. We report a 38‐year‐old male who developed acute symmetric leukoencephalopathy mimicking a stroke following an influenza A virus infection. While clinical symptoms markedly improved with corticosteroids, MRI revealed persistent white matter lesions, contrasting
Jinghan Hu   +5 more
wiley   +1 more source

Precise Modelling of Compensating Business Transactions and its Application to BPEL

open access: yes, 2005
We describe the StAC language which can be used to specify the orchestration of activities in long running business transactions. Long running business transactions use compensation to cope with exceptions. StAC supports sequential and parallel behaviour
Butler, Michael   +2 more
core   +4 more sources

Fluid and Neuroimaging Biomarkers in Microgliopathy Colony‐Stimulating Factor‐1 Receptor‐Related Disorders

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective This study aims to identify both fluid and neuroimaging biomarkers for CSF1R‐RD that can inform the optimal timing of treatment administration to maximize therapeutic benefit, while also providing sensitive quantitative measurements to monitor disease progression.
Tomasz Chmiela   +13 more
wiley   +1 more source

A Formal Semantic Model of the Semantic Web Service Ontology (WSMO)

open access: yes, 2007
Semantic Web Services, one of the most significant research areas within the Semantic Web vision, has attracted increasing attention from both the research community and industry. The Web Service Modelling Ontology (WSMO) has recently been proposed as an
Gibbins, Nick   +4 more
core   +1 more source

Prediction of Myasthenia Gravis Worsening: A Machine Learning Algorithm Using Wearables and Patient‐Reported Measures

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Myasthenia gravis (MG) is a rare disorder characterized by fluctuating muscle weakness with potential life‐threatening crises. Timely interventions may be delayed by limited access to care and fragmented documentation. Our objective was to develop predictive algorithms for MG deterioration using multimodal telemedicine data ...
Maike Stein   +7 more
wiley   +1 more source

Specifics of Development and Implementation of Information Security Policies for Computer Networks

open access: yesБезопасность информационных технологий, 2013
The paper considers basic features and requirements for information security policies and issues of their implementation in network security systems.
Dmitry Sergeevich Chernyavskiy
doaj  

Home - About - Disclaimer - Privacy