Results 11 to 20 of about 275,215 (238)
This article describes a study of transitivity of preference and of transparent dominance with 220 participants who judged each choice problem 4 times. It shows how a true-and-error model with 2 error terms per choice problem can be applied to replicated
Michael H. Birnbaum
doaj +1 more source
Differential fault analysis on EMV application cryptogram
The process of application cryptogram in EMV was researched and dummy bits in session key were found.Based on the session key’s dummy bits and compressive property of DES’s Sbox,much information of the application cryptogram master key was got by using ...
Qian PENG,Zeng-ju LI,Ru-hui SHI
doaj +3 more sources
Background and objective Medication use often causes errors that are dangerous to the health of patients. Previous studies indicate that the use of pharmaceutical pictograms can effectively reduce medication errors.
Piotr Merks +8 more
doaj +1 more source
Protection Loop Error Measurement Based on Factor Analysis and Statistics Technology
In order to improve the reliability of the protection measurement circuit and ensure the safe operation of the power system, which requires the measurement error of the protection device to be solved in time.
Yawen YI +5 more
doaj +1 more source
Background: Accurate delivery of radiotherapy is a paramount component of providing safe oncological care. Margins are applied when planning radiotherapy to account for subclinical tumour spread, physiological movement and setup error.
Andre Vos +2 more
doaj +1 more source
Background In a non-inferiority trial, the choice of margin depends on the expected control event risk. If the true risk differs from expected, power and interpretability of results can be affected. A non-inferiority frontier pre-specifies an appropriate
Matteo Quartagno +4 more
doaj +1 more source
Formal verification of a software countermeasure against instruction skip attacks [PDF]
Fault attacks against embedded circuits enabled to define many new attack paths against secure circuits. Every attack path relies on a specific fault model which defines the type of faults that the attacker can perform.
Encrenaz, Emmanuelle +3 more
core +7 more sources
A Knife Is Not a Pill Cutter (And Other Home Medication Safety Tips)
Children are more than twice as likely as adults to experience a medication error at home. Dr. Kathleen Walsh, pediatrician at Boston Children’s Hospital, discusses why that is the case and tips to keep kids (and anyone) safe.
Kathleen E. Walsh +2 more
doaj +1 more source
Spatially extended estimates of analysis and short-range forecast error variances
Accurate estimates of ‘true’ error variance between Numerical Weather Prediction (NWP) analyses and forecasts and the ‘reality’ interpolated to a NWP model grid (Analysis and true Forecast Error Variance, hereafter AFEV) are critical for successful data ...
Jie Feng, Zoltan Toth, Malaquias Peña
doaj +1 more source
Diagnostic Concordance between the Visual Analogue Anxiety Scale (VAS-A) and the State-Trait Anxiety Inventory (STAI) in Nursing Students during the COVID-19 Pandemic [PDF]
Anxiety is one of the most common problems among nursing students. The State-Trait Anxiety Inventory (STAI) is used to detect anxiety in this population; however, its length hinders speedy detection.
Botigué, Teresa +5 more
core +2 more sources

