Results 31 to 40 of about 221,142 (145)

Towards Security Goals in Summative E-Assessment Security

open access: yes, 2009
The general security goals of a computer system are known to include confidentiality, integrity and availability (C-I-A) which prevent critical assets from potential threats.
Apampa, K.M, Argles, D, Wills, G.B
core   +1 more source

Development of 4T1 breast cancer mouse model system for preclinical carbonic anhydrase IX studies

open access: yesFEBS Open Bio, EarlyView.
Carbonic anhydrase IX (CAIX) is a well‐recognised therapeutic target and prognostic biomarker in cancer. We developed and characterised a robust murine breast cancer model system that is suitable for CAIX studies in vitro and in vivo—it comprises both CAIX‐positive and CAIX‐negative controls and provides a solid platform for the comprehensive ...
Zane Kalniņa   +13 more
wiley   +1 more source

Phenotyping Healthcare Use 2–3 Decades Before the First Multiple Sclerosis Demyelinating Event

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Phenotype hospital, physician, and emergency department (ED) visits by diagnoses and specialty up to 29 years pre‐multiple sclerosis (MS) onset versus a matched population without MS. Methods We identified people with MS (PwMS) using population‐based administrative data from Ontario, Canada (1991–2020).
Helen Tremlett   +8 more
wiley   +1 more source

Persuasiveness of inclusive language in organizational communication

open access: yesRes Rhetorica
The study hypothesized that employees better receive messages containing inclusive forms. A review of the existing literature on inclusive language and its impact on employee well-being and organizational innovation was conducted.
Jacek Wasilewski, Agata Kostrzewa
doaj   +1 more source

Mechanisms of De‐icing by Surface Rayleigh and Plate Lamb Acoustic Waves

open access: yesAdvanced Engineering Materials, EarlyView.
Ice accretion impacts daily life, renewable energy generation, maintenance, and security in industries and aeronautics. Acoustic waves (AW) are a promising method for ice removal, although de‐icing mechanisms require further investigation to optimize energy efficiency.
Shilpi Pandey   +15 more
wiley   +1 more source

A Computational Model for Gender Asset Gap Management with a Focus on Gender Disparity in Land Acquisition and Land Tenure Security

open access: yesAmerican Journal of Operations Research
Gender inequality is a significant concern in many cultures, as women face significant barriers to asset acquisition particularly land ownership and control. Land acquisition and land tenure security are complex issues that affect various cultural groups differently, leading to disparities in access and ownership especially when superimposed with other
Ogundare, Oluwatosin, Njualem, Lewis
openaire   +2 more sources

Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD [PDF]

open access: yes, 2017
Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect ...
DELLI PRISCOLI, Francesco   +6 more
core   +1 more source

Enhanced Fog Water Harvesting on Superhydrophobic Steel Meshes

open access: yesAdvanced Engineering Materials, EarlyView.
Fog harvesting using mesh designs offers a sustainable solution to water scarcity. This study highlights key considerations for fog harvesting research and develops a methodology for a standardized protocol reflecting fog characteristics and environmental conditions.
Pegah Sartipizadeh   +3 more
wiley   +1 more source

Buffer or Enabler? The Effect of Financial Slack on R&D Investment in Different Environments

open access: yesSystems
Prior studies have shown mixed findings on the role of financial slack. This study examines how environmental factors such as munificence, dynamism, and complexity moderate the relationship between financial slack and innovation activity. Using data from
Hye Kyung Yu, Minji Kim, Tohyun Kim
doaj   +1 more source

Designed-in security for cyber-physical systems [PDF]

open access: yes, 2014
An expert from academia, one from a cyber-physical system (CPS) provider, and one from an end asset owner and user offer their different perspectives on the meaning and challenges of 'designed-in security.' The academic highlights foundational issues and
Khurana, H   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy