Results 41 to 50 of about 462,135 (294)

A Prospective Study of Individuals at Risk of Multiple Sclerosis Informs the Design of Primary Prevention Studies

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective In multiple sclerosis, the optimal time for deploying a therapeutic intervention is before the central nervous system is damaged; given the success of trials treating the earliest stage of MS, the radiologically isolated syndrome, developing primary prevention strategies is an important next challenge.
Amy W. Laitinen   +7 more
wiley   +1 more source

A Novel Image Encryption Algorithm Based on Chaotic Sequences and Cross-Diffusion of Bits

open access: yesIEEE Photonics Journal, 2021
To protect image information security, we propose an encryption algorithm based on chaotic sequences and bits' cross-diffusion. First, two chaotic sequences are generated by two-dimensional logic-sine coupling mapping, and the original image is scrambled
Geng Shengtao   +4 more
doaj   +1 more source

A method of enciphering quantum states [PDF]

open access: yes, 2000
In this paper, we propose a method of enciphering quantum states of two-state systems (qubits) for sending them in secrecy without entangled qubits shared by two legitimate users (Alice and Bob). This method has the following two properties.
Bennett C H   +12 more
core   +5 more sources

Preferences for post‐traumatic osteoarthritis prevention strategies in individuals with anterior cruciate ligament injury

open access: yesArthritis Care &Research, Accepted Article.
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy   +9 more
wiley   +1 more source

Transformation of Elliptic Curve Discrete Logarithm Problem to QUBO Using Direct Method in Quantum Annealing Applications

open access: yesJournal of Telecommunications and Information Technology
This paper investigates how to reduce the elliptic curve discrete logarithm problem over prime fields to the quadratic unconstrained binary optimization (QUBO) problem in order to obtain as few logical qubits as possible. In the best case scenario, if n
Michał Wroński   +3 more
doaj   +1 more source

Routing-Verification-as-a-Service (RVaaS): Trustworthy Routing Despite Insecure Providers

open access: yes, 2016
Computer networks today typically do not provide any mechanisms to the users to learn, in a reliable manner, which paths have (and have not) been taken by their packets.
Schiff, Liron   +2 more
core   +1 more source

Quantum key distribution using non-classical photon number correlations in macroscopic light pulses [PDF]

open access: yes, 2001
We propose a new scheme for quantum key distribution using macroscopic non-classical pulses of light having of the order 10^6 photons per pulse. Sub-shot-noise quantum correlation between the two polarization modes in a pulse gives the necessary ...
A. C. Funk   +11 more
core   +2 more sources

Cognitive Behavioral Therapy for Youth With Childhood‐Onset Lupus: A Randomized Clinical Trial

open access: yesArthritis Care &Research, EarlyView.
Objective Our objective was to determine the feasibility and acceptability of the Treatment and Education Approach for Childhood‐Onset Lupus (TEACH), a six‐session cognitive behavioral intervention addressing depressive, fatigue, and pain symptoms, delivered remotely to individual youth with lupus by a trained interventionist.
Natoshia R. Cunningham   +29 more
wiley   +1 more source

Mechanical Properties of Architected Polymer Lattice Materials: A Comparative Study of Additive Manufacturing and CAD Using FEM and µ‐CT

open access: yesAdvanced Functional Materials, EarlyView.
This study examines how pore shape and manufacturing‐induced deviations affect the mechanical properties of 3D‐printed lattice materials with constant porosity. Combining µ‐CT analysis, FEM, and compression testing, the authors show that structural imperfections reduce stiffness and strength, while bulk material inhomogeneities probably enhance ...
Oliver Walker   +5 more
wiley   +1 more source

A network security situation awareness method based on layered attack graph

open access: yesJournal of Measurement Science and Instrumentation, 2019
The real-time of network security situation awareness(NSSA) is always affected by the state explosion problem. To solve this problem, a new NSSA method based on layered attack graph(LAG) is proposed.
ZHU Yu-hui, SONG Li-peng
doaj  

Home - About - Disclaimer - Privacy