Showing 9,141 - 9,160 results of 9,720 for search '"security"', query time: 0.06s Refine Results
  1. 9141

    Towards Dynamic Remote Data Auditing in Computational Clouds by Mehdi Sookhak, Adnan Akhunzada, Abdullah Gani, Muhammad Khurram Khan, Nor Badrul Anuar

    Published 2014-01-01
    “…The comparative analysis with the state-of-the-art RDA schemes shows that the proposed scheme is secure and highly efficient in terms of the computation and communication overhead on the auditor and server.…”
    Get full text
    Article
  2. 9142

    From Tradition to Future: Sundanese Indigenous Laws as the Vanguard of Environmental Conservation and Disaster Mitigation by Dimas Febriansyah Krisna Dwiputra, Enok Maryani, Fahmi Nugraha Heryanto

    Published 2024-08-01
    “…Pikukuh principles need to be incorporated more broadly and actively applied in policies and strategic initiatives to advance sustainable development, as this goes beyond romanticizing traditions and is essential for securing a sustainable future life…”
    Get full text
    Article
  3. 9143

    Design and Analysis of Nuclear Transportation Cask Using Phase Changing Material by Girish Venkatesh Gudi, R. G. Nagraj, Abhijit Dandavate

    Published 2025-01-01
    “…In the nuclear sector, secure transportation of radioactive materials is crucial in the nuclear sector, and cask design and analysis are crucial for maintaining fuel integrity. …”
    Get full text
    Article
  4. 9144

    Werner Syndrome Caused by Homozygous Frameshift Variant c.1578del in WRN by Jovita Patricija Druta, Gunda Petraitytė, Aušra Sasnauskienė, Eglė Preikšaitienė

    Published 2024-12-01
    “…Molecular diagnosis brings better treatment of manifestations and monitoring options for the patients, helping to establish more sufficient and secure patient care. …”
    Get full text
    Article
  5. 9145

    From Boole to Leggett-Garg: Epistemology of Bell-Type Inequalities by Karl Hess, Hans De Raedt, Kristel Michielsen

    Published 2016-01-01
    “…This implies that the Leggett-Garg inequality does not mean that the SQUID flux is not there when nobody looks, as Leggett and Garg suggest, but instead that the probability measures may not be what Leggett and Garg have assumed them to be, when no data can be secured that directly relate to them. We show that similar considerations apply to other quantum interpretation-puzzles such as two-slit experiments.…”
    Get full text
    Article
  6. 9146

    Radiofrequency Ablation of Hepatocellular Carcinoma: A Literature Review by Yasunori Minami, Masatoshi Kudo

    Published 2011-01-01
    “…An accurate evaluation of treatment response is very important to secure successful RFA therapy since a sufficient safety margin (at least 0.5 cm) can prevent local tumor recurrences. …”
    Get full text
    Article
  7. 9147

    Channel modeling and testing of wireless transmission for underground in-pipe leak and material loss detection by S Mekid, D Wu, R Hussain, K Youcef-Toumi

    Published 2017-11-01
    “…This will support the on-device power management to secure large autonomy operations. Experimental tests have shown that the overall received energy was mixed with ambient energy if the latter is sent at the same frequency and that the optimum frequency range used to transmit energy was rather at low frequency range of 100–200 MHz.…”
    Get full text
    Article
  8. 9148

    Behavioural bias in investment decisions: moderate role of self-control by Muhadjir Anwar, Sulastri Irbayuni, Ira Wikartika, Heri Pratikto

    Published 2023-03-01
    “…Behavioural aspects in making financial or investment decisions have been inspired by the increasing role of behaviour as determinants of buying and selling securities. This study aims to analyze the effect of loss aversion and mental accounting on investment decisions and the role of self-control as a moderating variable on the effect of loss aversion and mental accounting on investment decisions. …”
    Get full text
    Article
  9. 9149

    Role of E-cadherin in epithelial barrier dysfunction: implications for bacterial infection, inflammation, and disease pathogenesis by Peter Lialios, Peter Lialios, Stella Alimperti, Stella Alimperti

    Published 2025-02-01
    “…E-cadherin, an essential component of adherens junctions, has emerged as a pivotal molecule that secures epithelial homeostasis. Lately, its pleiotropic role beyond barrier function, including its involvement in immune responses, has become more evident. …”
    Get full text
    Article
  10. 9150

    Effectiveness of Mobile Health Services in Remote Papua under Indonesia’s Minister of Health Regulation No. 90 of 2015 by Nora Lelyana, Aris Sarjito

    Published 2024-12-01
    “…Key strategies to address these issues include securing stable funding, enhancing workforce capacity, leveraging digital technologies, and fostering community engagement. …”
    Get full text
    Article
  11. 9151

    A cyanobacteria-derived intermolecular salt bridge stabilizes photosynthetic NDH-1 and prevents oxidative stress by Mei Zheng, Yuanyuan Jiang, Zhaoxing Ran, Shengjun Liang, Tingting Xiao, Xiafei Li, Weimin Ma

    Published 2025-02-01
    “…The salt bridge and transmembrane helix 16, both situated at the C-terminus of NdhF1, collaboratively secure the linkage between NdhD1 and NdhB, akin to a cramping mechanism. …”
    Get full text
    Article
  12. 9152

    Countermeasures to Avoid Noncooperation in Fully Self-Organized VANETs by Jezabel Molina-Gil, Pino Caballero-Gil, Cándido Caballero-Gil

    Published 2014-01-01
    “…The secure and efficient exchange of information in vehicular ad hoc networks (VANETs) involves more challenges than in any other type of ad hoc networks. …”
    Get full text
    Article
  13. 9153

    Mbamois women and land tenure: a study of the actors in the Mbam-And-Inoubou Division (Centre, Cameroon) by Esther Laurentine NYA, Junior Chatelain Avore

    Published 2025-01-01
    “… Context and background  In rural regions, a striking reality emerges : many women, trapped in an overwhelming financial dependency, are engaged in fierce battles to secure a tiny plot of land where they can carry out their essential activities (agriculture). …”
    Get full text
    Article
  14. 9154

    Edge or Cloud Architecture: The Applicability of New Data Processing Methods in Large-Scale Poultry Farming by Gergo Toth, Sandor Szabo, Tamas Haidegger, Marta Alexy

    Published 2025-01-01
    “…The transmission and analysis of data collected on birds and the farming environment in large-scale production environments using digital tools on a secure platform are not straightforward. In our on-site research, we have investigated two architectures, a cloud-based processing architecture and an edge computing-based one, in large-scale poultry farming circumstances. …”
    Get full text
    Article
  15. 9155

    Fast Frequency Control Strategy Based on Worst-Case Network Attack Perception by Wentao Xu, Zhenghang Song, Peiyuan Guan

    Published 2024-12-01
    “…Furthermore, the strategy is easy to implement, highly adaptable, and suitable for the complex and dynamic operational environment of power systems, providing strong support for the secure and stable operation of smart grids.…”
    Get full text
    Article
  16. 9156

    Effect Improved for High-Dimensional and Unbalanced Data Anomaly Detection Model Based on KNN-SMOTE-LSTM by Fuguang Bao, Yongqiang Wu, Zhaogang Li, Yongzhao Li, Lili Liu, Guanyu Chen

    Published 2020-01-01
    “…This model can continuously filter out and securely generate samples to improve the performance of the model through kNN discriminant classifier and avoid the blindness and limitations of the SMOTE algorithm in generating new samples. …”
    Get full text
    Article
  17. 9157

    Community Participation in Programme Planning for Universal Health Coverage in India: An exploratory study by Yogesh Chandra, Ajai Kumar Jain

    Published 2025-02-01
    “…Traditional Indian society is cut across by rigid religion and caste lines, and the appropriate role for each caste group has been a serious obstacle in securing complete community participation. This study employed a quantitative exploratory survey design aimed at understanding public health professionals' perceptions of community participation in healthcare planning. …”
    Get full text
    Article
  18. 9158

    Hydrogen production via dehydrogenation of alcohols using ruthenium hexamethylenetetramine complex by Preeti Devi, Senthilkumar Muthaiah

    Published 2024-08-01
    “…The use of liquid organic hydrogen carriers (LOHCs) such as alcohols, amines, etc. has been found to be a better and more secure way to store and transport hydrogen. Catalytic hydrogenation and dehydrogenation of LOHCs using transition metal complexes are known as the best methods to load and unload hydrogen for storage and transportation. …”
    Get full text
    Article
  19. 9159

    Bone Lid Technique Using a Piezoelectric Device for the Treatment of a Mandibular Bony Lesion by Ronald Younes, Ibrahim Nasseh, Pierre Lahoud, Elie Wassef, Maroun Dagher

    Published 2017-01-01
    “…The underlying lesion was enucleated and sent for pathology as a routine procedure, and the removed bony lid was repositioned in situ and secured with a collagen tape. Healing was uneventful with limited swelling and reduced pain. …”
    Get full text
    Article
  20. 9160

    FEASIBILITY OF USING LOW-PARAMETER LOCAL LLMS IN ANSWERING QUESTIONS FROM ENTERPRISE KNOWLEDGE BASE by Marcin BADUROWICZ, Stanisław SKULIMOWSKI, Maciej LASKOWSKI

    Published 2024-12-01
    “…This research underscores the potential of offline-capable LLMs as cost-effective tools for secure knowledge management in Polish SMEs. …”
    Get full text
    Article