Results 61 to 70 of about 684,823 (349)
The Role of Brics in The International ICT Security Regime
The ubiquitous implementation of information and communication technologies (ICTs) is giving rise to cross-border security threats that require joint international responses. Fragmentation and growing conflict in the global information space complicate international cooperation within the UN to form a comprehensive global information security regime ...
Elena Zinovieva, Alexander Ignatov
openaire +1 more source
A Systematic Comparison of Alpha‐Synuclein Seed Amplification Assays for Increasing Reproducibility
ABSTRACT Seed amplification assays (SAAs) enable ultrasensitive detection of misfolded α‐synuclein across biofluids and tissues. Yet, heterogeneity in protocols limits cross‐study comparability and clinical translation. Here, we review α‐synuclein SAA methods and their performance across various biological matrices.
Manuela Amaral‐do‐Nascimento +3 more
wiley +1 more source
Objective There is growing interest in evaluating new strategies to delay or prevent posttraumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury. Methods Participants with a history of
Kevin Kennedy +9 more
wiley +1 more source
CRISIS ON THE TRADITIONAL CONCEPT OF INTERNAL SECURITY OF THE STATE [PDF]
The concept of national security is one of the so-called old, traditional approaches to security. In its center is a "survival" of a sovereign state, its territorial integrity and political independence (sovereignty) to be protected by diplomatic ...
Саша МИЈАЛКОВИЌ +1 more
doaj
Objective We examined whether 18 months of strength training in individuals with knee varus alignment and medial tibiofemoral osteoarthritis (OA) reduced knee joint loads during walking compared to an attention control group. Methods This study was a secondary analysis of a randomized clinical trial that compared the effects of strength training to a ...
Stephen P. Messier +12 more
wiley +1 more source
The cognitive goal of the article is to analyze the CFE Treaty as a case of an international security regime in the field of arms control, with particular emphasis on the variability of the geopolitical context that determines the emergence ...
Marek Pietras
doaj +1 more source
ORTADOĞU'DA REJİM GÜVENLİĞİNDEN İNSAN GÜVENLİĞİNE:ÜRDÜN ÖRNEĞİ
ÖZETOrtadoğu’da Büyük Britanya sömürgesi iken İkinci Dünya Savaşı sonrası bağımsızlığını kazanmış olan Ürdün; zayıf ekonomisi, yetersiz kurumsal altyapısı ve toplum ile devlet arasındaki sosyo-politik oydaşmanın zayıflığı sebepleriyle bir üçüncü dünya ...
Selahattin ertürk Çiftçi
doaj +1 more source
Egypt Adrift Five Years After The Uprising [PDF]
As Egypt approaches the fifth anniversary of its 2011 uprising, one would be forgiven for assuming that a major challenge to the regime of President Abdel Fattah el-Sisi was gathering coherence and force, based upon its panicked and paranoid current ...
Michael Wahid Hanna
core
Security Proof for Quantum Key Distribution Using Qudit Systems
We provide security bounds against coherent attacks for two families of quantum key distribution protocols that use $d$-dimensional quantum systems. In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase ...
A. Acín +6 more
core +1 more source
Objective Systemic lupus erythematosus (SLE) is a heterogenous inflammatory condition with widely varying global prevalence estimates. The frequency of SLE in the general population of Australia has been reported to be notably lower than contemporary estimates in countries such as the United States or United Kingdom, at 19 to 39 per 100,000 as opposed ...
Lucinda Roper +7 more
wiley +1 more source

