Showing 46,781 - 46,800 results of 51,844 for search '"manager"', query time: 0.23s Refine Results
  1. 46781

    Etiology of Community Acquired Pneumonia at a Tertiary Care Hospital by Ritika Jha, Sumit Sengupta, Anshuman Mukhopadhyay, Ritam Chakraborty

    Published 2024-06-01
    “…Background: Data regarding etiological profile of community acquired pneumonia are sparse, and a variation is seen in studies from different parts of India, hence underlining the need for local data for better patient management. Methods: Retrospective database analysis was done. …”
    Get full text
    Article
  2. 46782

    Research on network slicing security for 5G mMTC by Zijun XU, Jianwei LIU, Geng LI

    Published 2022-02-01
    “…With the emergence of new 5G business, architecture and technology, more and more researchers pay attention to security issues and potential security risks.Massive machine type communication is one of the three major application scenarios of 5G.It provides high performance such as large connection and low power consumption.Due to factors such as limited resources of MTC equipment, it may also weaken the security of 5G networks.At the same time, different scenarios and applications have obvious demands for network performance, service quality and security level.The flexibility of 5G networking is realized by network slicing technology.It meets the diversity and customization of 5G network services, but also brings new security threats.5G commercial rapid development.The number of IoT devices has increased exponentially.In order to ensure that 5G networks provide more efficient and safe on-demand services, it is particularly important to study the security mechanism and strategy of network slicing for 5G mMTC application scenarios.Therefore, the characteristics and security requirements of 5G mMTC were analyzed.The main security threats of network slicing were listed.In view of the above security requirements and threats, the contribution and deficiency of existing security schemes around the aspects of specific network slice authentication, slice security isolation, security management and arrangement were summarized and expounded.And the future research in this field was prospected.A SM2-based secondary authentication and security isolation model for 5G mMTC network slicing was proposed.This model framework meeted the efficiency of large-scale authentication for 5G devices and users by introducing batch authentication and pre-authentication mechanisms.By hierarchical encryption of different communication data, the security isolation between 5G mMTC network slices was realized.The performance and security of the model were also analyzed.…”
    Get full text
    Article
  3. 46783
  4. 46784
  5. 46785
  6. 46786

    Cesarean section and the gestational duration of subsequent pregnancies: A nationwide register-based cohort study. by Felix Evers, Christopher Flatley, Karin Ytterberg, Julius Juodakis, Pol Solé-Navais, Bo Jacobsson

    Published 2025-01-01
    “…<h4>Conclusions</h4>The survival model handles bias related to management differences between the exposure and reference groups better than standard logistic regression, making it the statistical method of choice when conducting studies on this research topic. …”
    Get full text
    Article
  7. 46787
  8. 46788
  9. 46789
  10. 46790

    The Importance of Wetlands for the Conservation of Birds in Tigray National Regional State (Northern Ethiopia) by Kalayu Mesfin, Alembrhan Assefa, Weldemariam Tesfahunegny

    Published 2024-01-01
    “…Therefore, community-based conservation initiatives should be implemented to mitigate these threats. Moreover, wetland management policies should be established to safeguard wetlands and their biological resources.…”
    Get full text
    Article
  11. 46791
  12. 46792

    Variation of Leaf Area Index (LAI) under Changing Climate: Kadolkele Mangrove Forest, Sri Lanka by Randika K. Makumbura, Upaka Rathnayake

    Published 2022-01-01
    “…This research presents a comprehensive understanding of Kadolkele mangrove forest under future droughts; thus, alarming relevant authorities to develop management plans to safeguard these critical ecosystems.…”
    Get full text
    Article
  13. 46793

    A Systematic Review of Knowledge, Attitude, and Perception Towards Electroconvulsive Therapy (ECT) in Africa by Abaatyo J, Kaggwa MM

    Published 2025-01-01
    “…Joan Abaatyo,1,2 Mark Mohan Kaggwa3,4 1Department of Psychiatry, Uganda Christian University, Kampala, Uganda; 2King Ceasor University, Kampala, Uganda; 3Department of Psychiatry and Behavioural Neurosciences, McMaster University, Ontario, ON, Canada; 4Forensic Psychiatry Program, St Joseph’s Healthcare Hamilton, Ontario, CanadaCorrespondence: Joan Abaatyo, Email joandux@gmail.comBackground: Despite growing evidence showing ECT’s efficacy and efficiency in the management of severe mental health conditions, the knowledge, attitude, and perceptions (KAP) towards ECT vary around the globe. …”
    Get full text
    Article
  14. 46794
  15. 46795

    Multi-user collaborative access control scheme in cloud storage by li SHIJiao, he HUANGChuan, Jing WANG, yu QINKuang, Kai HE

    Published 2016-01-01
    “…In MCA-F scheme, hierarchical encryption is adopted,a part of decrypting computation is transferred to a cloud server to decrease the computational cost on users when decrypting.In allusion to the simultaneous write-data access control of multiple users, a method is designed to manage semi-stored modified data submitted by menders. …”
    Get full text
    Article
  16. 46796

    Lithuanian's book publishing houses in West Europe in 1945-1952 by Remigijus Misiūnas

    Published 2024-08-01
    “…Many of the owners and managers of Lithuanian publishing houses began this work only in emigration, but the book publishing traditions that had been established in Lithuania were carried over to Western Europe. …”
    Get full text
    Article
  17. 46797

    Diasporas and Armed Conflicts: beyond Being “Third Party” by I. D. Loshkariov

    Published 2021-06-01
    “…This unit played an essential role in the Civil War in Laos, as it managed to restrain the onslaught of the superior forces of the Patet Lao Front and troops from North Vietnam. …”
    Get full text
    Article
  18. 46798

    Correlates for the severity of suicidal risk in participants with common mental disorders with comorbid chronic medical conditions in rural primary healthcare settings in India by Johnson-Pradeep Ruben, Maria L. Ekstrand, Elsa Heylen, Krishnamachari Srinivasan

    Published 2023-06-01
    “…Conclusion: The severity of depression, higher disability scores, and lower social support were found to be independent correlates of mod-high suicidal risk. Screening, managing depression, and facilitating social support for patients with chronic medical illness in PHC settings may reduce suicidal risk.…”
    Get full text
    Article
  19. 46799
  20. 46800