Results 111 to 120 of about 14,415,212 (341)

Secure & Prepared, January 10, 2007, Vol.3, no.1 [PDF]

open access: yes, 2007
Secure & Prepared is a bi-weekly publication of the Iowa Homeland Security & Emergency Management Division for those involved in the homeland security system in the state of ...

core  

Edge Computing Security: State of the Art and Challenges

open access: yesProceedings of the IEEE, 2019
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent years have been dramatically incentivizing the advancement of edge computing.
Yinhao Xiao   +5 more
semanticscholar   +1 more source

Location‐Specific Hematoma Volume Predicts Early Neurological Deterioration in Supratentorial ICH

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Early neurological deterioration (END) adversely affects outcomes in patients with intracerebral hemorrhage (ICH). This study aimed to determine the location‐specific hematoma volumes for END in supratentorial ICH patients. Methods We retrospectively analyzed supratentorial ICH patients presenting from two prospective cohorts.
Zuoqiao Li   +10 more
wiley   +1 more source

Secure & Prepared, March 7, 2006, Vol.2, no.5 [PDF]

open access: yes, 2006
Secure & Prepared is a bi-weekly publication of the Iowa Homeland Security & Emergency Management Division for those involved in the homeland security system in the state of ...

core  

Efficient decoy-state quantum key distribution with quantified security

open access: yes, 2013
We analyse the finite-size security of the efficient Bennett-Brassard 1984 protocol implemented with decoy states and apply the results to a gigahertz-clocked quantum key distribution system.
Dixon, A. R.   +8 more
core   +1 more source

A Systematic Comparison of Alpha‐Synuclein Seed Amplification Assays for Increasing Reproducibility

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Seed amplification assays (SAAs) enable ultrasensitive detection of misfolded α‐synuclein across biofluids and tissues. Yet, heterogeneity in protocols limits cross‐study comparability and clinical translation. Here, we review α‐synuclein SAA methods and their performance across various biological matrices.
Manuela Amaral‐do‐Nascimento   +3 more
wiley   +1 more source

Space as a New Category of Threats to National Security

open access: yesSafety & Defense, 2019
The scientific considerations presented in this paper concern threats to national security arising from the activity in outer space. The objective of this analysis is to identify these dangers and to propose solutions to minimize them.
Radosław BIELAWSKI
doaj   +1 more source

Secure & Prepared, October 31, 2006, Vol.2, no.21 [PDF]

open access: yes, 2006
Secure & Prepared is a bi-weekly publication of the Iowa Homeland Security & Emergency Management Division for those involved in the homeland security system in the state of ...

core  

Apply current exponential de Finetti theorem to realistic quantum key distribution

open access: yes, 2009
In the realistic quantum key distribution (QKD), Alice and Bob respectively get a quantum state from an unknown channel, whose dimension may be unknown.
Guo, Guang-Can   +2 more
core   +1 more source

Preferences for Posttraumatic Osteoarthritis Prevention Strategies in Individuals With Anterior Cruciate Ligament Injury

open access: yesArthritis Care &Research, EarlyView.
Objective There is growing interest in evaluating new strategies to delay or prevent posttraumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury. Methods Participants with a history of
Kevin Kennedy   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy