Results 1 to 10 of about 23,358 (316)

Development of a Series Elastic Tendon Actuator (SETA) Based on Gait Analysis for a Knee Assistive Exosuit [PDF]

open access: goldActuators, 2022
An exosuit is a wearable robot that assists the muscular strength of a human that wears it by using multiple wires with similar functions to human muscles. This study focuses on the development of a series elastic tendon actuator (SETA) for the actuation
Hee Don Lee   +3 more
doaj   +3 more sources

Critical success factors for Security Education, Training and Awareness (SETA) programme effectiveness: an empirical comparison of practitioner perspectives [PDF]

open access: hybridInformation and Computer Security, 2023
Purpose Cyber security has never been more important than it is today in an ever more connected and pervasive digital world. However, frequently reported shortages of suitably skilled and trained information system (IS)/cyber security professionals ...
Areej Alyami   +3 more
semanticscholar   +2 more sources

An Exploratory Study on Sustaining Cyber Security Protection through SETA Implementation [PDF]

open access: goldSustainability, 2022
It is undeniable that most business organizations rely on the Internet to conduct their highly competitive businesses nowadays. Cyber security is one of the important elements for companies to guarantee the normal operation of their business activities ...
Guangxu Wang   +3 more
semanticscholar   +2 more sources

Evaluation of selective embolization of thyroid arteries (SETA) as a preresective treatment in selected cases of toxic goitre [PDF]

open access: goldThyroid Research, 2009
Background in recent years, an increasing interest in the application of selective embolization of thyroid arteries (SETA) in the treatment of thyroid diseases is observed.
Dedecjus Marek   +6 more
doaj   +2 more sources

As setas de Cronos e as setas de Eros

open access: diamondViso: Cadernos de estética aplicada, 2023
Este texto é baseado na interlocução estabelecida no contexto do XI Encontro do GT de Estética da ANPOF com o texto apresentado por Marcela Oliveira no mesmo evento, intitulado “Escrever a palavra fim: cem anos da morte de Proust”. Aqui se propõe, com Anne Carson e Walter Benjamin, que a operação estabelecida por Proust de “isolar uma fatia do tempo” é
Rafael Zacca Fernandes
openalex   +4 more sources

The Glioma-associated Protein SETA Interacts with AIP1/Alix and ALG-2 and Modulates Apoptosis in Astrocytes* [PDF]

open access: hybridJournal of Biological Chemistry, 2000
Expression of the src homology 3 (SH3) domain-containing expressed in tumorigenic astrocytes (SETA) gene is associated with the tumorigenic state in astrocytes.
Baihua Chen   +4 more
semanticscholar   +2 more sources

Glucosylation by the Legionella Effector SetA Promotes the Nuclear Localization of the Transcription Factor TFEB

open access: yesiScience, 2020
Summary: Legionella pneumophila is an intracellular pathogen that requires nutrients from the host for its replication. It has been shown that replicating L. pneumophila prefers amino acids as main sources of carbon and energy.
Wendy H.J. Beck   +5 more
doaj   +2 more sources

Domain organization of Legionella effector SetA [PDF]

open access: yesCellular Microbiology, 2012
Legionella pneumophila is a human pathogen causing severe pneumonia called Legionnaires' disease. Multiple Legionella effectors are type IV‐secreted into the host cell to establish a specific vesicular compartment for pathogen replication.
T. Jank   +5 more
semanticscholar   +5 more sources

Fabrication and adhesion of hierarchical micro-seta [PDF]

open access: yesChinese Science Bulletin, 2012
Spark-erosion perforating technology was used to fabricate a Cu-based template characterized by pores with radius of 0.5 mm inclined at 75°. A commercial silicone elastomer of poly(dimethylsiloxane) (PDMS) with a rich Si-H content was used to produce an inclined array of primary setae.
Hao Zhang   +4 more
semanticscholar   +2 more sources

A Taxonomy of SETA Methods and Linkage to Delivery Preferences

open access: yesACM SIGMIS Database: the DATABASE for Advances in Information Systems, 2023
Cybersecurity threats targeting users are common in today's information systems. Threat actors exploit human behavior to gain unauthorized access to systems and data.
Joakim Kävrestad   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy