Results 131 to 140 of about 6,124,262 (401)

Reconfigurable Security: Edge Computing-based Framework for IoT [PDF]

open access: yesarXiv, 2017
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications. In this article, we first provide requirements and existing solutions for IoT security.
arxiv  

Computational Security of Quantum Encryption [PDF]

open access: yes, 2016
Quantum-mechanical devices have the potential to transform cryptography. Most research in this area has focused either on the information-theoretic advantages of quantum protocols or on the security of classical cryptographic schemes against quantum attacks.
Alagic, G.   +5 more
openaire   +6 more sources

Threshold Values of Sleep Spindles Features in Healthy Adults Using Scalp‐EEG and Associations With Sleep Parameters

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Sleep spindles are an electrophysiological fingerprint of the sleeping human brain. They can be described in terms of duration, frequency, amplitude, and density, and vary widely according to age and sex. Spindles play a role in sleep and wake functions and are altered in several neurological and psychiatric disorders.
Julien Coelho   +8 more
wiley   +1 more source

Towards Security Requirements in Online Summative Assessments

open access: yes, 2009
Confidentiality, integrity and availability (C-I-A) are the security requirements fundamental to any computer system. Similarly, the hardware, software and data are important critical assets.
Apampa, K.M, Argles, D, Wills, G.B
core  

Secure multiparty computations without computers

open access: yesTheoretical Computer Science, 1998
AbstractMany simple calculations can be done easier without computers than by using them. We show that the same holds for secure multiparty computations if the function to be computed is simple enough. Our starting point is an observation of Bert den Boer: a multiparty computation of a logical AND-gate can be performed by five simple playing cards.
Ari Renvall, Valtteri Niemi
openaire   +2 more sources

Patient Perceptions of Medication Therapy for Prevention of Posttraumatic Osteoarthritis Following Anterior Cruciate Ligament Injury: A Qualitative Content Analysis

open access: yesArthritis Care &Research, EarlyView.
Objective Posttraumatic osteoarthritis (PTOA) accounts for nearly 12% of osteoarthritis incidences and often occurs after anterior cruciate ligament (ACL) tear. Ensuring the uptake of preventive treatments for PTOA requires that investigators and clinicians understand factors influencing patients to seek preventive therapies.
Lily M. Waddell   +10 more
wiley   +1 more source

Software for Wearable Devices: Challenges and Opportunities

open access: yes, 2015
Wearable devices are a new form of mobile computer system that provides exclusive and user-personalized services. Wearable devices bring new issues and challenges to computer science and technology.
Chen, Xin   +5 more
core   +1 more source

RhoA and Rac1 as Mechanotransduction Mediators in Colorectal Cancer

open access: yesAdvanced Biology, EarlyView.
Analysing RhoA and Rac1 protein levels in Colorectal cancer (CRC) samples under mechanical strain highlights their potential as diagnostic markers. Monitoring their activity could offer valuable insights into how cancer spreads, paving the way for new approaches to better understand and diagnose colorectal cancer.
Sharda Yadav   +5 more
wiley   +1 more source

Ontology‐Based Data Acquisition, Refinement, and Utilization in the Development of a Multilayer Ferrite Inductor

open access: yesAdvanced Engineering Materials, Volume 27, Issue 8, April 2025.
Multilayer ferrite inductor prototypes are fabricated by cofiring metallized tapes of NiCuZn ferrite and glass‐ceramic composite. Prerequisites for a predictive component simulation are discussed. An automated data‐pipeline stores and semantically links the experimental data acquired in the study according to a domain ontology.
Björn Mieller   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy