Results 51 to 60 of about 684,823 (349)

The Canadian Security Certificate Regime. CEPS Special Report, 30 March 2009 [PDF]

open access: yes, 2009
This work was prepared as part of the EU–Canada project - The Changing Landscape of Justice and Home Affairs Cooperation in the European Union and EU-Canada Relations – funded by the European Commission, Directorate-General for External Relations ...
Macklin, Audrey.
core  

Security of continuous-variable quantum key distribution against general attacks

open access: yes, 2012
We prove the security of Gaussian continuous-variable quantum key distribution against arbitrary attacks in the finite-size regime. The novelty of our proof is to consider symmetries of quantum key distribution in phase space in order to show that, to ...
Anthony Leverrier   +5 more
core   +3 more sources

Digital twins to accelerate target identification and drug development for immune‐mediated disorders

open access: yesFEBS Open Bio, EarlyView.
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley   +1 more source

The skills required for transition to university and study in biological sciences: A student perspective

open access: yesFEBS Open Bio, EarlyView.
Bioscience students were asked for their opinions on the value and teaching of skills. 204 responded that teamwork, time management and study skills are necessary to reach University, that scientific writing, research, laboratory and presentation skills are taught effectively during their studies, while other skills are gained inherently through study ...
Janella Borrell, Susan Crennell
wiley   +1 more source

Search the securitization of the nuclear activities of the Islamic Republic of Iran by the pro-Israel lobby in America from the perspective of the Copenhagen School [PDF]

open access: yesFaṣlnāmah-i Pizhūhish/hā-yi Rāhburdī-i Siyāsat, 2016
This article intends to use the statements of the copenhagen security school for investigate activities of pro-Israel lobbies in the United States of America that Securitized the nuclear activities of the Islamic Republic of Iran.
Seyed Mohammad Ali Alavi   +1 more
doaj   +1 more source

Dynamic Credit Investment in Partially Observed Markets [PDF]

open access: yes, 2014
We consider the problem of maximizing expected utility for a power investor who can allocate his wealth in a stock, a defaultable security, and a money market account.
Capponi, Agostino   +2 more
core   +3 more sources

Remote Monitoring in Myasthenia Gravis: Exploring Symptom Variability

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Myasthenia gravis (MG) is a rare, autoimmune disorder characterized by fluctuating muscle weakness and potential life‐threatening crises. While continuous specialized care is essential, access barriers often delay timely interventions. To address this, we developed MyaLink, a telemedical platform for MG patients.
Maike Stein   +13 more
wiley   +1 more source

Labour Market Transitions and Employment Regimes: Evidence on the Flexibility-Security Nexus in Transitional Labour Markets [PDF]

open access: yes
This paper deals with the question whether the concept of transitional labour market(TLM) might be useful to formulate hypotheses about the relationship between the size and nature of labour market transitions and the performance of employment regimes ...
Heuvel, Nick van den   +2 more
core   +4 more sources

Security ties between autocracies: Insights into authoritarian alignment through the case of China

open access: yesEuropean Journal of International Security
Over the past decade, China has significantly expanded its security cooperation with other authoritarian regimes, yet existing research struggles to capture the informal and ambiguous nature of these relationships.
Sabine Mokry
doaj   +1 more source

Géohistoire des frontières sahariennes. L’héritage nomade enseveli sous les murs de sable

open access: yesBulletin de l’Association de Géographes Français, 2022
Based on the exemplary case of the borders in the central Sahara that separate the Sahel states from the Maghreb states, this analysis shows the reinforcement of a security conception of the border that is now being generalized to these peripheral ...
Laurent Gagnol
doaj   +1 more source

Home - About - Disclaimer - Privacy