Results 61 to 70 of about 275,215 (238)

Lessons Learned From a Delayed‐Start Trial of Modafinil for Freezing of Gait in Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Freezing of gait (FOG) in people with Parkinson's disease (PwPD) is debilitating and has limited treatments. Modafinil modulates beta/gamma band activity in the pedunculopontine nucleus (PPN), like PPN deep brain stimulation. We therefore tested the hypothesis that Modafinil would improve FOG in PwPD.
Tuhin Virmani   +8 more
wiley   +1 more source

Dynamic Error Analysis Method for Vibration Shape Reconstruction of Smart FBG Plate Structure

open access: yesShock and Vibration, 2016
Shape reconstruction of aerospace plate structure is an important issue for safe operation of aerospace vehicles. One way to achieve such reconstruction is by constructing smart fiber Bragg grating (FBG) plate structure with discrete distributed FBG ...
Hesheng Zhang   +4 more
doaj   +1 more source

Perturbative expansion of the energy of static sources at large orders in four-dimensional SU(3) gauge theory

open access: yes, 2013
We determine the infinite volume coefficients of the perturbative expansions of the self-energies of static sources in the fundamental and adjoint representations in SU(3) gluodynamics to order \alpha^{20} in the strong coupling parameter \alpha.
Bali, Gunnar S.   +3 more
core   +1 more source

Sex Differences in Medication Discontinuation in Axial Spondyloarthritis

open access: yesArthritis Care &Research, EarlyView.
Objective We examined sex differences in medication discontinuation among patients with axial spondyloarthritis (axSpA) initiating tumor necrosis factor inhibitors (TNFi), interleukin‐17 inhibitors (IL‐17i), or JAK inhibitors (JAKi). Methods Using data from the Rheumatology Informatics System for Effectiveness (RISE) Registry (2003–2025), we assessed ...
Rachael Stovall   +9 more
wiley   +1 more source

Dual Learning-Based Safe Semi-Supervised Learning

open access: yesIEEE Access, 2018
In many real-world applications, labeled instances are generally limited and expensively collected, while the most instances are unlabeled and the amount is often sufficient.
Haitao Gan   +3 more
doaj   +1 more source

A unified formalism for side-channel and fault attacks on cryptographic circuits [PDF]

open access: yes, 2012
National audienceSecurity is a key component for information technologies and communication. Security is a very large research area involved in the whole information technology, related to both hardware and software.
Dutertre, Jean-Max   +3 more
core   +1 more source

Minimal important change and minimal clinically important difference in pain and function with exercise in hip osteoarthritis

open access: yesArthritis Care &Research, Accepted Article.
Objective The objective of this study was to estimate the minimal important change (MIC) and minimal clinically important difference (MCID) for pain and physical function in individuals with hip osteoarthritis (OA) following a physiotherapist‐guided exercise intervention.
Yareni Guerrero   +8 more
wiley   +1 more source

The Safe System Approach and technology—what works?

open access: yesFrontiers in Public Health
The Safe System Approach is an evidence-based strategy committed to eliminating fatalities and serious injuries among all road users. The Safe System Approach as developed in Sweden, acknowledges that human errors will occur, but the cost of these ...
Nicole Booker   +2 more
doaj   +1 more source

Risk of Retinopathy Associated with Long‐Term Use of Hydroxychloroquine in Patients with Rheumatic Diseases: A Systematic Review and Meta‐Analysis

open access: yesArthritis Care &Research, Accepted Article.
Objective We aimed to estimate the prevalence and cumulative incidence of hydroxychloroquine retinopathy (HCQ‐R) and its risk factors among long‐term HCQ users with rheumatic diseases through a systematic review and meta‐analysis of observational studies that used spectral‐domain OCT (SD‐OCT) for screening. Methods A systematic search of PubMed, Scopus,
Narsis Daftarian   +4 more
wiley   +1 more source

Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security [PDF]

open access: yes, 2009
Elliptic Curve Cryptography implementations are known to be vulnerable to various side-channel attacks and fault injection attacks, and many countermeasures have been proposed.
C. Giraud   +32 more
core   +1 more source

Home - About - Disclaimer - Privacy