Results 61 to 70 of about 275,215 (238)
Lessons Learned From a Delayed‐Start Trial of Modafinil for Freezing of Gait in Parkinson's Disease
ABSTRACT Objective Freezing of gait (FOG) in people with Parkinson's disease (PwPD) is debilitating and has limited treatments. Modafinil modulates beta/gamma band activity in the pedunculopontine nucleus (PPN), like PPN deep brain stimulation. We therefore tested the hypothesis that Modafinil would improve FOG in PwPD.
Tuhin Virmani +8 more
wiley +1 more source
Dynamic Error Analysis Method for Vibration Shape Reconstruction of Smart FBG Plate Structure
Shape reconstruction of aerospace plate structure is an important issue for safe operation of aerospace vehicles. One way to achieve such reconstruction is by constructing smart fiber Bragg grating (FBG) plate structure with discrete distributed FBG ...
Hesheng Zhang +4 more
doaj +1 more source
We determine the infinite volume coefficients of the perturbative expansions of the self-energies of static sources in the fundamental and adjoint representations in SU(3) gluodynamics to order \alpha^{20} in the strong coupling parameter \alpha.
Bali, Gunnar S. +3 more
core +1 more source
Sex Differences in Medication Discontinuation in Axial Spondyloarthritis
Objective We examined sex differences in medication discontinuation among patients with axial spondyloarthritis (axSpA) initiating tumor necrosis factor inhibitors (TNFi), interleukin‐17 inhibitors (IL‐17i), or JAK inhibitors (JAKi). Methods Using data from the Rheumatology Informatics System for Effectiveness (RISE) Registry (2003–2025), we assessed ...
Rachael Stovall +9 more
wiley +1 more source
Dual Learning-Based Safe Semi-Supervised Learning
In many real-world applications, labeled instances are generally limited and expensively collected, while the most instances are unlabeled and the amount is often sufficient.
Haitao Gan +3 more
doaj +1 more source
A unified formalism for side-channel and fault attacks on cryptographic circuits [PDF]
National audienceSecurity is a key component for information technologies and communication. Security is a very large research area involved in the whole information technology, related to both hardware and software.
Dutertre, Jean-Max +3 more
core +1 more source
Objective The objective of this study was to estimate the minimal important change (MIC) and minimal clinically important difference (MCID) for pain and physical function in individuals with hip osteoarthritis (OA) following a physiotherapist‐guided exercise intervention.
Yareni Guerrero +8 more
wiley +1 more source
The Safe System Approach and technology—what works?
The Safe System Approach is an evidence-based strategy committed to eliminating fatalities and serious injuries among all road users. The Safe System Approach as developed in Sweden, acknowledges that human errors will occur, but the cost of these ...
Nicole Booker +2 more
doaj +1 more source
Objective We aimed to estimate the prevalence and cumulative incidence of hydroxychloroquine retinopathy (HCQ‐R) and its risk factors among long‐term HCQ users with rheumatic diseases through a systematic review and meta‐analysis of observational studies that used spectral‐domain OCT (SD‐OCT) for screening. Methods A systematic search of PubMed, Scopus,
Narsis Daftarian +4 more
wiley +1 more source
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security [PDF]
Elliptic Curve Cryptography implementations are known to be vulnerable to various side-channel attacks and fault injection attacks, and many countermeasures have been proposed.
C. Giraud +32 more
core +1 more source

