Results 11 to 20 of about 3,621,508 (286)
Background Cubital tunnel syndrome is the second most common entrapment neuropathy of the upper extremity. Surgical decompression of the ulnar nerve aims to improve complaints and prevent permanent damage to the nerve.
Philippe N. Sprangers +1 more
doaj +1 more source
Development and refinement of the open dialog adherence protocol in complex mental health care
IntroductionOpen dialog (OD) is a both a therapeutic practice and a service delivery model that offers an integrated response to mental health care through mobilizing resources within the service user’s family and community networks through joint network
Melissa Lotmore +7 more
doaj +1 more source
Intellectual property is associated with the creative work needed to design clinical trials. Two approaches have developed to protect the intellectual property associated with multicentre trial protocols prior to site initiation.
Ross Sue +3 more
doaj +1 more source
The results of surgical treatment of patients with open abdominal injury
Objective: To study the evolution of approaches to surgical treatment in patients with open abdominal trauma.Material and methods: The results of surgical treatment of 141 patients with open abdominal trauma at the age of 32.6 ± 7.3 years have been ...
G. K. Karipidi +7 more
doaj +1 more source
FairLedger: A Fair Blockchain Protocol for Financial Institutions [PDF]
Financial institutions are currently looking into technologies for permissioned blockchains. A major effort in this direction is Hyperledger, an open source project hosted by the Linux Foundation and backed by a consortium of over a hundred companies.
Keidar, Idit +3 more
core +2 more sources
Implementation of OCPP Protocol for Electric Vehicle Applications [PDF]
The ability of the software and hardware systems to interchange information is a key factor for the success of the electric vehicle industry.
Venkata Pruthvi Thota +3 more
doaj +1 more source
Un environnement formel d'assistance à la modélisation de protocoles [PDF]
The use of protocol design toolkits based on UML profiles has been hampered by the lack of methodological support. Indeed, those toolkits should include an assistant based on patterns and dedicated to driving the designer step by step through a well ...
Apvrille, Ludovic +1 more
core +1 more source
A protocol for working with open-source neuroimaging datasets
Summary: Large, publicly available neuroimaging datasets are becoming increasingly common, but their use presents challenges because of insufficient knowledge of the tool options for data processing and proper data organization.
Corey Horien +7 more
doaj +1 more source
Achieving the physical limits of the bounded-storage model [PDF]
Secure two-party cryptography is possible if the adversary's quantum storage device suffers imperfections. For example, security can be achieved if the adversary can store strictly less then half of the qubits transmitted during the protocol.
Mandayam, Prabha, Wehner, Stephanie
core +2 more sources
Functional MRI (fMRI) has become a popular technique to study brain functions and their alterations in psychiatric and neurological conditions. The sample sizes for fMRI studies have been increasing steadily, and growing studies are sourced from open ...
Xin Di, Bharat B. Biswal
doaj +1 more source

