Results 81 to 90 of about 5,525,844 (353)

Identifying High‐Impact Solutions to Address Racial and Ethnic Health Disparities in Lupus: A Consensus‐Based Approach

open access: yesArthritis Care &Research, Accepted Article.
Objective We conducted formative research aimed at identifying solutions that address inequitable health outcomes in lupus due to adverse social determinants of health. Methods We conducted a search for keywords which provided insights into potential solutions and initiatives underway. An advisory panel of lupus experts iteratively reviewed the list of
Joy Buie   +11 more
wiley   +1 more source

A lightweight Xray-YOLO-Mamba model for prohibited item detection in X-ray images using selective state space models

open access: yesScientific Reports
X-ray image-based prohibited item detection plays a crucial role in modern public security systems. Despite significant advancements in deep learning, challenges such as feature extraction, object occlusion, and model complexity remain.
Kai Zhao   +3 more
doaj   +1 more source

The Australian Cyber Security Centre threat report 2015 [PDF]

open access: yes
Introduction: The number, type and sophistication of cyber security threats to Australia and Australians are increasing. Due to the varied nature of motivations for cyber adversaries targeting Australian organisations, organisations could be a target for
Australian Cyber Security Centre
core  

Preferences for post‐traumatic osteoarthritis prevention strategies in individuals with anterior cruciate ligament injury

open access: yesArthritis Care &Research, Accepted Article.
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy   +9 more
wiley   +1 more source

Facilitating Effective Food Security Policy Reform [PDF]

open access: yes
Food Security and Poverty, Downloads December 2008 - July 2009: 10,
Food Security II Faculty
core   +1 more source

Effectiveness and safety of baricitinib for juvenile idiopathic arthritis associated uveitis or chronic anterior antinuclear antibody positive uveitis

open access: yesArthritis Care &Research, Accepted Article.
Objectives Evaluate the efficacy and safety of baricitinib in paediatric patients with active JIA‐U or chronic anterior ANA‐positive uveitis, who had an inadequate response to MTX or bDMARDs. Methods JUVE‐BRIGHT was an open‐label, active‐controlled, Phase‐3 multicentre trial which utilized a novel design, including 1:1 randomization to an active ...
Athimalaipet V. Ramanan   +7 more
wiley   +1 more source

Improving Food Security in Africa: Highlights of 25 Years of Research, Capacity-Building, and Outreach. [PDF]

open access: yes
Decades of research have led to substantially improved understanding of the nature of food insecurity. A combination of economic growth and targeted programs resulted in a steady fall (until the food crisis of 2007/08) in the percentage of the world’s ...
Food Security Group at Michigan State University
core   +1 more source

Financial Distress and its Determinants in Rheumatoid Arthritis

open access: yesArthritis Care &Research, Accepted Article.
Objective To quantify the degree of financial distress and identify its determinants in adults with rheumatoid arthritis (RA) given the frequent chronic use of expensive disease modifying therapies. Methods We identified adults enrolled in the FORWARD databank with either RA or non‐inflammatory musculoskeletal disease (NIMSKD) completing the Functional
Amber Brown Keebler   +5 more
wiley   +1 more source

Cryptanalysis on Two Kinds of Number Theoretic Pseudo-Random Generators Using Coppersmith Method

open access: yesIET Information Security
Pseudo-random number generator (PRNG) is a type of algorithm that generates a sequence of random numbers using a mathematical formula, which is widely used in computer science, such as simulation, modeling applications, data encryption, et cetera.
Ran Zhang   +3 more
doaj   +1 more source

5G wireless P2MP backhaul security protocol: an adaptive approach

open access: yesEURASIP Journal on Wireless Communications and Networking, 2019
5G has introduced various emerging demands for new services and technologies that raised the bar for quality of service, latency, handovers, and data rates.
Jiyoon Kim   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy