How aging affects the premotor control of lower limb movements in simulated gait. [PDF]
Abstract Gait control becomes more demanding in healthy older adults, yet what cognitive or motor process leads to this age‐related change is unknown. The present study aimed to investigate whether it might depend on specific decay in the quality of gait motor representation and/or a more general reduction in the efficiency of lower limb motor control.
Sacheli LM +7 more
europepmc +2 more sources
O CONCEITO DE ṚṆA (DÍVIDA) NO HINDUÍSMO
São bem conhecidas, no contexto dos estudos indológicos, as críticas do orientalista alemão Paul Hacker às interpretações ético-morais da ontologia não-dual (advaita) da escola Vedānta, apresentada ao Ocidente pelo monge hindu Swami Vivekananda (1863 ...
Dilip Loundo
doaj +1 more source
Abstract Efforts to set standards for artificial intelligence (AI) reveal striking patterns: technical experts hailing from geopolitical rivals, such as the United States and China, readily collaborate on technical AI standards within transnational standard‐setting organizations, whereas governments are much less willing to collaborate on global ...
Nora von Ingersleben‐Seip
wiley +1 more source
Hacker ético vs. delincuente informático: Una mirada en el contexto colombiano
El presente artículo aborda el singular mundo del Hacking Ético, buscando establecer que un hacker no es un delincuente tal y como se define en el imaginario general, haciendo especifica la disertación para el contexto colombiano. Con este fin se recurre
Federico Iván Gacharná G.
doaj +1 more source
Para una ética y una estética del software libre
El presente artículo estudia el modo en que la comunidad hacker ha desarrollado un código propio de valores estéticos y éticos. La historia del «hackerismo » supone un paso previo para la comprensión de cómo la escritura de código se ha bifurcado en dos ...
Andoni Alonso, Javier del Arco
doaj +1 more source
El avance tecnológico en la actualidad es incesante y con esta realidad surgen nuevas formas delictivas. Una de esas modalidades es el acceso no autorizado a redes informáticas.
Giovanni Michelle Grisetti Valiente
doaj +4 more sources
Intimidation as epistemological violence against social science conservation research
Abstract We investigated intimidation of conservation social scientists, which is ongoing and aimed at silencing or discrediting research findings. Although social scientists share with conservation biologists the desire to understand and address the biodiversity crisis, their analysis of structural power relations and contradictions in conservation is
Stasja Koot +16 more
wiley +1 more source
Tendencias actuales de las vulnerabilidades y ataques de inyección SQL
El objetivo de la investigación fue explorar las vulnerabilidades de ataques de inyección SQL, visto desde las temáticas trabajadas en investigaciones recientes y los reportes internacionales.
Sebastian David Duque Muñoz +3 more
doaj
In Situ/Microinvasive Adenocarcinoma of the Uterine Cervix and HPV-Type Impact: Pathologic Features, Treatment Options, and Follow-Up Outcomes-Cervical Adenocarcinoma Study Group (CAS-Group). [PDF]
Giannella L +24 more
europepmc +1 more source
A Radiomic-Based Machine Learning Model Predicts Endometrial Cancer Recurrence Using Preoperative CT Radiomic Features: A Pilot Study. [PDF]
Coada CA +16 more
europepmc +1 more source

