Results 131 to 140 of about 157,357 (284)
Abstract Background and aims Lower risk guidelines for safer levels of cannabis use could help to reduce the health burden posed by cannabis use disorder (CUD). We aimed to estimate risk thresholds for CUD based on delta‐9‐tetrahydrocannabinol (THC) consumption using standard THC units (1 unit = 5 mg THC).
Rachel Lees Thorne +9 more
wiley +1 more source
Does the total consumption model apply to cannabis use?
Abstract Aims To test whether the total consumption model and its extension, the theory of collectivity, apply to adolescent cannabis use. We estimated: (1) whether the distribution of cannabis use frequency was stable over time; (2) whether changes in average cannabis use were mirrored across consumption quantiles; and (3) whether higher average use ...
Thor Norström, Håkan Leifman
wiley +1 more source
Implementation of a Data-Parallel Approach on a Lightweight Hash Function for IoT Devices
The Internet of Things is used in many application areas in our daily lives. Ensuring the security of valuable data transmitted over the Internet is a crucial challenge.
Abdullah Sevin
doaj +1 more source
The evolution of Australian cannabis policies, 1967 to 2024
Abstract Aim To describe the outcomes of cannabis policy debates in Australia from 1967 to 2024. Methods We searched popular media, public reports, parliamentary inquiries and policy documents on cannabis in Australia since the 1960s and examined peer reviewed papers, national survey data and police records of cannabis‐related arrests.
Wayne D. Hall +3 more
wiley +1 more source
Abstract Background Myocyte enhancer factor 2 transcription factors regulate essential transcriptional programs in various cell types. The activity of myocyte enhancer factor 2 factors is modulated through interactions with cofactors, chromatin remodelers, and other regulatory proteins, which are dependent on cell context and physiological state.
Karine de Mattos +4 more
wiley +1 more source
ABSTRACT Introduction Remediation is a critical component of surgical training, designed to support trainees who are not progressing as expected and to ensure they reach the standards required. Despite its importance, remediation practices remain poorly understood. A clearer understanding of current remediation practices is essential if training bodies
Kathryn McLeod +3 more
wiley +1 more source
Abstract Working memory updating is a crucial cognitive function for learning and academic achievement that develops significantly throughout childhood and adolescence. Despite the varieties of existing tasks to measure children's working memory updating, its overall developmental trajectory and task‐specific developmental patterns remain inadequately ...
Ye Song, Chen Cheng
wiley +1 more source
An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things. [PDF]
Shu H +5 more
europepmc +1 more source
We present a 25‐stage reconstruction of the ice‐flow pattern evolution of the Scandinavian Ice Sheet based on mapping and analysis of ~240 000 subglacial lineations and lineation fields across Norway, Sweden, Finland, and parts of NW Russia. Our reconstruction uses a glacial geomorphological inversion approach, in which we generated 611 individual ...
Frances E. G. Butcher +9 more
wiley +1 more source
An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things. [PDF]
Ahmed AA, Ahmed WA.
europepmc +1 more source

