Results 111 to 120 of about 139,334 (281)
ABSTRACT Background Accessing brain magnetic resonance imaging (MRI) can be challenging, especially for underserved patients, which may lead to disparities in neurological diagnosis. Method This mixed‐methods study enrolled adults with one of four neurological disorders: mild cognitive impairment or dementia of the Alzheimer type, multiple sclerosis ...
Maya L. Mastick +19 more
wiley +1 more source
Location‐Specific Hematoma Volume Predicts Early Neurological Deterioration in Supratentorial ICH
ABSTRACT Objective Early neurological deterioration (END) adversely affects outcomes in patients with intracerebral hemorrhage (ICH). This study aimed to determine the location‐specific hematoma volumes for END in supratentorial ICH patients. Methods We retrospectively analyzed supratentorial ICH patients presenting from two prospective cohorts.
Zuoqiao Li +10 more
wiley +1 more source
On the Secrecy Capacity of Fading Channels
We consider the secure transmission of information over an ergodic fading channel in the presence of an eavesdropper. Our eavesdropper can be viewed as the wireless counterpart of Wyner's wiretapper. The secrecy capacity of such a system is characterized
Gamal, Hesham El +2 more
core +2 more sources
Low Incidence of Relapses After Vaccination in Anti‐Aquaporin‐4 Antibody‐Positive NMOSD
ABSTRACT Patients with neuromyelitis optica spectrum disorder (NMOSD) may experience increased signs and symptoms of their underlying disease when vaccinated against meningococcal disease before receiving complement component 5 inhibitor therapies. This retrospective analysis indicated an overall low relapse incidence (mean [range], 3.3% [0.7%–10.6 ...
Sean J. Pittock +4 more
wiley +1 more source
Secure Communication in Millimeter Wave Relaying Networks
The use of relay can expand the coverage of millimeter-wave (mmWave) signals, whereas it may increase the risk of information leakage due to the additional link from source to relay.
Ruiqian Ma +4 more
doaj +1 more source
CSF Monoamine Metabolites and Cognitive Trajectory in Early Parkinson's Disease
ABSTRACT Background Imaging and postmortem studies indicate that abnormalities in monoaminergic neurotransmission contribute to cognitive impairment in Parkinson's disease (PD). However, it remains uncertain if cerebrospinal fluid (CSF) monoamine metabolites can serve as biomarkers of cognitive decline in early PD.
Jing‐Yu Shao +7 more
wiley +1 more source
Chaotic sequence based polar code encrypted scheme in negative secrecy capacity case
A chaos based encrypted polar coding scheme,which could be applied to the negative secrecy capacity case,was proposed.Chaotic sequences were employed to encrypt the information bits and fill the frozen bits.And multi-block polar coding structure was also
Xiaohui ZHANG, Shunliang ZHANG, Bowen LI
doaj +2 more sources
Evaluation of Secrecy Rate in Cooperative Communication System
Cooperative system is a tendency for future communications because of its spatial diversity to improve the system performance. However, the security is a critical issue in the wireless application with a highly private request. Although the encryption schemes have been proposed to approach the secure purpose, those schemes need a lot of computing ...
Cheng-Ying Yang +2 more
openaire +2 more sources
SPG4 and Dementia: Expanding the Clinical Spectrum
ABSTRACT Objective Hereditary spastic paraplegia (HSP) is a group of disorders characterized by progressive spasticity and lower limb weakness, with mutations in SPG4/SPAST being the most common cause. Detailed studies and clinical and molecular comparisons across different populations are missing.
Emanuele Panza +19 more
wiley +1 more source
Secrecy Rate Region of SWIPT Wiretap Interference Channels
The secrecy rate region of wiretap interference channels with a multi-antenna passive eavesdropper is studied under receiver energy harvesting constraints. To stay operational in the network, the legitimate receivers demand energy alongside information, which is fulfilled by power transmission and exploiting a power splitting (PS) receiver.
Kariminezhad, Ali +3 more
openaire +2 more sources

