Results 101 to 110 of about 507,576 (358)
ABSTRACT Objective To investigate the overall use of prescription medications among individuals with multiple sclerosis compared to the general population, with a focus on treatments beyond disease‐modifying therapies. Methods We conducted a nationwide, registry‐based study in Denmark.
Josefine Windfeld‐Mathiasen +4 more
wiley +1 more source
On the Cryptanalysis of Public-Key Cryptography [PDF]
Nowadays, the most popular public-key cryptosystems are based on either the integer factorization or the discrete logarithm problem. The feasibility of solving these mathematical problems in practice is studied and techniques are presented to speed-up the underlying arithmetic on parallel architectures.
openaire +1 more source
ICU‐EEG Pattern Detection by a Convolutional Neural Network
ABSTRACT Objective Patients in the intensive care unit (ICU) often require continuous EEG (cEEG) monitoring due to the high risk of seizures and rhythmic and periodic patterns (RPPs). However, interpreting cEEG in real time is resource‐intensive and heavily relies on specialized expertise, which is not always available.
Giulio Degano +5 more
wiley +1 more source
RSA: Dagli anni '70 al giorno d'oggi
In this note, after a brief historical excursus, we describe the revolution in cryptography of the 70es, due to the introduction of public key cryptography and the RSA algorithm. We also consider some contemporary applications of this algorithm.
Pellegrini, S
doaj +1 more source
Chronic Pain in Parkinson’s Disease: Prevalence, Sex Differences, Regional Anatomy and Comorbidities
Chronic pain affected 66.2% of 10,631 individuals with Parkinson's disease, with higher prevalence and severity in females. Pain most often involved the buttocks, lower back, neck, and knees, and was linked to depression, sleep disorders, and osteoarthritis.
Natalia S. Ogonowski +13 more
wiley +1 more source
A new public key cryptography using generalized Fibonacci matrices [PDF]
This work presents a new public key cryptography encryption-decryption scheme based on generalized Fibonacci matrices and the Hill cipher. This scheme proposes using Fibonacci sequences under prime modulo for key establishment.
Jyoti Panchal +2 more
doaj
High-Performance NTRU Accelerator Using a Direct Memory Access Controller
NTRU is a well-established and widely used public-key cryptography. It has been standardized in IEEE Std1363.1 and X9.98, and its variant was submitted to the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC ...
Seon Bhin Kim +2 more
doaj +1 more source
Genetic Modifiers of Parkinson's Disease: A Case–Control Study
ABSTRACT Objective To examine the associations of LRRK2 p.G2019S, GBA1 p.N409S, polygenic risk scores (PRS), and APOE E4 on PD penetrance, risk, and symptoms. Methods We conducted a US‐based observational case–control study using data from the 23andMe Inc. and Fox Insight Genetic Substudy (FIGS) databases.
Matthew J. Kmiecik +15 more
wiley +1 more source
RRFL: A rational and reliable federated learning incentive framework for mobile crowdsensing
The data privacy concern for mobile users (MUs) in mobile crowdsensing (MCS) has attracted significant attention. Federated Learning (FL) breaks down data silos, enabling MUs to train locally without revealing actual information.
Qingyi He +3 more
doaj +1 more source
ABSTRACT Background Managing long COVID in people with multiple sclerosis and related disorders (pwMSRD) is complex due to overlapping symptoms. To address evidence gaps, we evaluated long COVID susceptibility in pwMSRD versus controls and its associations with multi‐domain function and disability.
Chen Hu +15 more
wiley +1 more source

