Results 21 to 30 of about 4,851,518 (333)
Attendees at 6:30 P.M. Meeting [PDF]
Attendees at 6:30 P.M. Meeting: The President, Secretary of State Rusk, Secretary of Defense Clifford, Secretary of Treasury Fowler, CIA Director Helms, Joint Chief of Staff Chairman Wheeler, and ...
National Security Council (U.S.)
core +1 more source
Well‐being on supportive techniques in amyotrophic lateral sclerosis: from neurologists' perspective
Abstract Objective To investigate intercultural neurologists' perception of well‐being in patients with amyotrophic lateral sclerosis (ALS) using gastrostomy (PEG), non‐invasive, and/or invasive ventilation (NIV/IV) and to analyse the determinants and impact on the management of the above medical interventions (MIs).
Krzysztof Barć+7 more
wiley +1 more source
Attention-based message passing and dynamic graph convolution for spatiotemporal data imputation
Although numerous spatiotemporal approaches have been presented to address the problem of missing spatiotemporal data, there are still limitations in concurrently capturing the underlying spatiotemporal dependence of spatiotemporal graph data ...
Yifan Wang+6 more
doaj +1 more source
Bone metastatic carcinoma coexisting with plasma cell myeloma: a case report
Objective Multiple myeloma is a clonal plasma cell proliferation often causing bone lytic lesions. It is sometimes challenging to differentiate these lytic lesions associated with multiple myeloma from bone destruction due to a metastasis.
Marwa Aloui+5 more
doaj +1 more source
Person Re-Identification Method Based on Dual Descriptor Feature Enhancement
Person re-identification is a technology used to identify individuals across different cameras. Existing methods involve extracting features from an input image and using a single feature for matching.
Ronghui Lin+5 more
doaj +1 more source
Conceptualizing Security Governance [PDF]
This article examines the changing transatlantic security architecture since the end of the Cold War. It argues that the absence of a unifying military threat and the subsequent broadening of the notion of security from states to societies has led to the
Elke Krahman
core +2 more sources
The rapid expansion of nuclear technology across various sectors due to global economic growth has led to a substantial rise in the transportation of radioactive materials.
Panpan Jiang+7 more
doaj +1 more source
5G Security Threat Assessment in Real Networks
Advances in mobile communication networks from 2G to 5G have brought unprecedented traffic growth, and 5G mobile communication networks are expected to be used in a variety of industries based on innovative technologies, fast not only in terms of ...
Seongmin Park+5 more
doaj +1 more source
Security in online learning assessment towards an effective trustworthiness approach to support e-learning teams [PDF]
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or ...
Caballé Llobet, Santiago+3 more
core +1 more source
Social Security Programs Throughout the World: The Americas, 2011 [PDF]
[Excerpt] This fourth issue in the current four-volume series of Social Security Programs Throughout the World reports on the countries of the Americas.
International Social Security Association+1 more
core +4 more sources