Results 61 to 70 of about 684,823 (349)

The Role of Brics in The International ICT Security Regime

open access: yesRussian Journal of World Politics and Law of Nations, 2023
The ubiquitous implementation of information and communication technologies (ICTs) is giving rise to cross-border security threats that require joint international responses. Fragmentation and growing conflict in the global information space complicate international cooperation within the UN to form a comprehensive global information security regime ...
Elena Zinovieva, Alexander Ignatov
openaire   +1 more source

A Systematic Comparison of Alpha‐Synuclein Seed Amplification Assays for Increasing Reproducibility

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Seed amplification assays (SAAs) enable ultrasensitive detection of misfolded α‐synuclein across biofluids and tissues. Yet, heterogeneity in protocols limits cross‐study comparability and clinical translation. Here, we review α‐synuclein SAA methods and their performance across various biological matrices.
Manuela Amaral‐do‐Nascimento   +3 more
wiley   +1 more source

Preferences for Posttraumatic Osteoarthritis Prevention Strategies in Individuals With Anterior Cruciate Ligament Injury

open access: yesArthritis Care &Research, EarlyView.
Objective There is growing interest in evaluating new strategies to delay or prevent posttraumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury. Methods Participants with a history of
Kevin Kennedy   +9 more
wiley   +1 more source

CRISIS ON THE TRADITIONAL CONCEPT OF INTERNAL SECURITY OF THE STATE [PDF]

open access: yesBezbednosni Dijalozi, 2011
The concept of national security is one of the so-called old, traditional approaches to security. In its center is a "survival" of a sovereign state, its territorial integrity and political independence (sovereignty) to be protected by diplomatic ...
Саша МИЈАЛКОВИЌ   +1 more
doaj  

Does Long‐Term Lower Extremity Strength Training in Adults With Knee Osteoarthritis and Varus Alignment Reduce Knee Joint Loading During Gait?

open access: yesArthritis Care &Research, EarlyView.
Objective We examined whether 18 months of strength training in individuals with knee varus alignment and medial tibiofemoral osteoarthritis (OA) reduced knee joint loads during walking compared to an attention control group. Methods This study was a secondary analysis of a randomized clinical trial that compared the effects of strength training to a ...
Stephen P. Messier   +12 more
wiley   +1 more source

The crisis of international arms control regimes in the conditions of a shifting international system. The case of the Treaty on Conventional Armed Forces in Europe (CFE) [version 2; peer review: 1 approved, 2 approved with reservations]

open access: yesStosunki Międzynarodowe
The cognitive goal of the article is to analyze the CFE Treaty as a case of an international security regime in the field of arms control, with particular emphasis on the variability of the geopolitical context that determines the emergence ...
Marek Pietras
doaj   +1 more source

ORTADOĞU'DA REJİM GÜVENLİĞİNDEN İNSAN GÜVENLİĞİNE:ÜRDÜN ÖRNEĞİ

open access: yesTürkiye Ortadoğu Çalışmaları Dergisi, 2016
ÖZETOrtadoğu’da Büyük Britanya sömürgesi iken İkinci Dünya Savaşı sonrası bağımsızlığını kazanmış olan Ürdün; zayıf ekonomisi, yetersiz kurumsal altyapısı ve toplum ile devlet arasındaki sosyo-politik oydaşmanın zayıflığı sebepleriyle bir üçüncü dünya ...
Selahattin ertürk Çiftçi
doaj   +1 more source

Egypt Adrift Five Years After The Uprising [PDF]

open access: yes, 2016
As Egypt approaches the fifth anniversary of its 2011 uprising, one would be forgiven for assuming that a major challenge to the regime of President Abdel Fattah el-Sisi was gathering coherence and force, based upon its panicked and paranoid current ...
Michael Wahid Hanna
core  

Security Proof for Quantum Key Distribution Using Qudit Systems

open access: yes, 2010
We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use $d$-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase ...
A. Acín   +6 more
core   +1 more source

Prevalence of Systemic Lupus Erythematosus in Australia, 2010–2022: A Population‐Based Study Using Linked National Administrative Health Data

open access: yesArthritis Care &Research, EarlyView.
Objective Systemic lupus erythematosus (SLE) is a heterogenous inflammatory condition with widely varying global prevalence estimates. The frequency of SLE in the general population of Australia has been reported to be notably lower than contemporary estimates in countries such as the United States or United Kingdom, at 19 to 39 per 100,000 as opposed ...
Lucinda Roper   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy