Results 41 to 50 of about 462,135 (294)
ABSTRACT Objective In multiple sclerosis, the optimal time for deploying a therapeutic intervention is before the central nervous system is damaged; given the success of trials treating the earliest stage of MS, the radiologically isolated syndrome, developing primary prevention strategies is an important next challenge.
Amy W. Laitinen +7 more
wiley +1 more source
A Novel Image Encryption Algorithm Based on Chaotic Sequences and Cross-Diffusion of Bits
To protect image information security, we propose an encryption algorithm based on chaotic sequences and bits' cross-diffusion. First, two chaotic sequences are generated by two-dimensional logic-sine coupling mapping, and the original image is scrambled
Geng Shengtao +4 more
doaj +1 more source
A method of enciphering quantum states [PDF]
In this paper, we propose a method of enciphering quantum states of two-state systems (qubits) for sending them in secrecy without entangled qubits shared by two legitimate users (Alice and Bob). This method has the following two properties.
Bennett C H +12 more
core +5 more sources
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy +9 more
wiley +1 more source
This paper investigates how to reduce the elliptic curve discrete logarithm problem over prime fields to the quadratic unconstrained binary optimization (QUBO) problem in order to obtain as few logical qubits as possible. In the best case scenario, if n
Michał Wroński +3 more
doaj +1 more source
Routing-Verification-as-a-Service (RVaaS): Trustworthy Routing Despite Insecure Providers
Computer networks today typically do not provide any mechanisms to the users to learn, in a reliable manner, which paths have (and have not) been taken by their packets.
Schiff, Liron +2 more
core +1 more source
Quantum key distribution using non-classical photon number correlations in macroscopic light pulses [PDF]
We propose a new scheme for quantum key distribution using macroscopic non-classical pulses of light having of the order 10^6 photons per pulse. Sub-shot-noise quantum correlation between the two polarization modes in a pulse gives the necessary ...
A. C. Funk +11 more
core +2 more sources
Cognitive Behavioral Therapy for Youth With Childhood‐Onset Lupus: A Randomized Clinical Trial
Objective Our objective was to determine the feasibility and acceptability of the Treatment and Education Approach for Childhood‐Onset Lupus (TEACH), a six‐session cognitive behavioral intervention addressing depressive, fatigue, and pain symptoms, delivered remotely to individual youth with lupus by a trained interventionist.
Natoshia R. Cunningham +29 more
wiley +1 more source
This study examines how pore shape and manufacturing‐induced deviations affect the mechanical properties of 3D‐printed lattice materials with constant porosity. Combining µ‐CT analysis, FEM, and compression testing, the authors show that structural imperfections reduce stiffness and strength, while bulk material inhomogeneities probably enhance ...
Oliver Walker +5 more
wiley +1 more source
A network security situation awareness method based on layered attack graph
The real-time of network security situation awareness(NSSA) is always affected by the state explosion problem. To solve this problem, a new NSSA method based on layered attack graph(LAG) is proposed.
ZHU Yu-hui, SONG Li-peng
doaj

