Results 81 to 90 of about 3,479,617 (281)

A Systematic Comparison of Alpha‐Synuclein Seed Amplification Assays for Increasing Reproducibility

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Seed amplification assays (SAAs) enable ultrasensitive detection of misfolded α‐synuclein across biofluids and tissues. Yet, heterogeneity in protocols limits cross‐study comparability and clinical translation. Here, we review α‐synuclein SAA methods and their performance across various biological matrices.
Manuela Amaral‐do‐Nascimento   +3 more
wiley   +1 more source

People Are the Answer to Security: Establishing a Sustainable Information Security Awareness Training (ISAT) Program in Organization

open access: yes, 2013
Educating the users on the essential of information security is very vital and important to the mission of establishing a sustainable information security in any organization and institute.
Ithnin, Norafida Binti   +1 more
core  

Information-theoretic Physical Layer Security for Satellite Channels

open access: yes, 2017
Shannon introduced the classic model of a cryptosystem in 1949, where Eve has access to an identical copy of the cyphertext that Alice sends to Bob. Shannon defined perfect secrecy to be the case when the mutual information between the plaintext and the ...
Hayashi, Masahito   +1 more
core   +1 more source

Preferences for Posttraumatic Osteoarthritis Prevention Strategies in Individuals With Anterior Cruciate Ligament Injury

open access: yesArthritis Care &Research, EarlyView.
Objective There is growing interest in evaluating new strategies to delay or prevent posttraumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury. Methods Participants with a history of
Kevin Kennedy   +9 more
wiley   +1 more source

Constructing Efficient Identity-Based Signatures on Lattices

open access: yesIET Information Security
In this work, we explore the recent developments related to lattice-based signature and preimage sampling, and specify a compact identity-based signature (IBS) on an ideal lattice for practical use.
Huiwen Jia   +3 more
doaj   +1 more source

Advanced ENF Region Classification Using UniTS-SinSpec: A Novel Approach Integrating Sinusoidal Activation Function and Spectral Attention

open access: yesApplied Sciences
The electric network frequency (ENF), often referred to as the industrial heartbeat, plays a crucial role in the power system. In recent years, it has found applications in multimedia evidence identification for court proceedings and audio–visual ...
Yujin Li   +4 more
doaj   +1 more source

The NPFIT strategy for information security of care record service [PDF]

open access: yes, 2011
The National Programme for IT in England doesn’t have a one-document strategy for its information security of the Care Records Service, which is the national EHR system.
Mohammad, Y, Stergioulas, L
core  

Validation of the Pediatric Arthritis Ultrasound Scoring System for the Elbow, Wrist, and Finger Joints in Children With Juvenile Idiopathic Arthritis

open access: yesArthritis Care &Research, EarlyView.
Objective We aimed to validate the Pediatric Arthritis Ultrasound Scoring System (PAUSS) for upper extremity joints in children with juvenile idiopathic arthritis (JIA). Methods Children with JIA were evaluated for elbow, wrist, or finger arthritis by clinical examination (CE) and musculoskeletal ultrasound (MSUS) with images scored according to the ...
Patricia Vega‐Fernandez   +12 more
wiley   +1 more source

Quantum Private Query Protocol Based on Two Non-Orthogonal States

open access: yesEntropy, 2016
We propose a loss tolerant quantum private query (QPQ) protocol based on two non-orthogonal states and unambiguous state discrimination (USD) measurement.
Yan Chang   +5 more
doaj   +1 more source

Measuring information security breach impact and uncertainties under various information sharing scenarios [PDF]

open access: yes, 2013
This study draws on information theory and aims to provide simulated evidence using real historical and statistical data to demonstrate how various levels of integration moderate the impact and uncertainties of information security breach on supply chain
Chan, Hing   +2 more
core  

Home - About - Disclaimer - Privacy