Results 71 to 80 of about 7,184,030 (395)

Arctic security in international security

open access: yes, 2020
Peace and war in the Arctic security is driven by international systemic forces of great power conflict. Since the Seven Years’ War (1756-1763) the geostrategic role of and thinking about the North Atlantic Arctic has been stable. The Napoleonic Wars, Crimean War, World War I and II and the Cold War affected the Arctic for geostrategic reasons. Current
openaire   +3 more sources

Translating a Preclinically Tested 15 Hz rTMS Protocol to Humans With Chronic Spinal Cord Injury: A Safety and Feasibility Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objectives Repetitive transcranial magnetic stimulation (rTMS) is a non‐invasive brain stimulation strategy with a demonstrated potential to reinforce the residual pathways after a spinal cord injury (SCI). A preclinically tested high‐frequency (15 Hz) rTMS (15 Hz rTMS) protocol was shown to induce corticospinal tract axon regeneration growth ...
Nabila Brihmat   +8 more
wiley   +1 more source

Towards Security Goals in Summative E-Assessment Security

open access: yes, 2009
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core   +1 more source

Long COVID in People With Multiple Sclerosis and Related Disorders: A Multicenter Cross‐Sectional Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Managing long COVID in people with multiple sclerosis and related disorders (pwMSRD) is complex due to overlapping symptoms. To address evidence gaps, we evaluated long COVID susceptibility in pwMSRD versus controls and its associations with multi‐domain function and disability.
Chen Hu   +15 more
wiley   +1 more source

Validation of a multiplex amplification system of 19 autosomal STRs and 27 Y-STRs

open access: yesForensic Sciences Research, 2020
This article describes a newly devised autosomal short tandem repeat (STR) multiplex polymerase chain reaction (PCR) system for 19 autosomal loci (D12S391, D13S317, D16S539, D18S51, D19S433, D2S1338, D21S11, D3S1358, D5S818, D6S1043, D7S820, D8S1179 ...
Feng Liu   +4 more
doaj   +1 more source

Complexity and Unwinding for Intransitive Noninterference [PDF]

open access: yes, 2013
The paper considers several definitions of information flow security for intransitive policies from the point of view of the complexity of verifying whether a finite-state system is secure. The results are as follows.
Eggert, Sebastian   +3 more
core  

Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]

open access: yes, 2010
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M.   +2 more
core   +3 more sources

Improving Documentation Rates of Contraception and Reproductive Planning in Patients With Rheumatic Disease

open access: yesArthritis Care &Research, EarlyView.
Objective This study aimed to improve contraception and reproductive planning documentation within rheumatology providers’ notes at a single academic center. Methods Female patients aged 18 to 45 years with autoimmune inflammatory rheumatic diseases were identified, and chart review was performed for documentation of contraception and pregnancy ...
Benjamin Moon   +6 more
wiley   +1 more source

Facilitators and barriers to implementing successful exclusion among children with shiga toxin-producing Escherichia coli: a qualitative analysis of public health case management records

open access: yesBMC Public Health
Background Shiga toxin-producing Escherichia coli (STEC) infections are a significant public health concern as they can cause serious illness and outbreaks.
Amoolya Vusirikala   +12 more
doaj   +1 more source

IoT Privacy and Security: Challenges and Solutions

open access: yesApplied Sciences, 2020
Privacy and security are among the significant challenges of the Internet of Things (IoT). Improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among the challenges that IoT ...
L. Tawalbeh   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy