Results 71 to 80 of about 2,757,418 (333)
Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems
More and more organizations outsource their data to remote cloud servers (RCSs). Data owners rent the cloud service providers (CSPs) infrastructure to store their unlimited resources by paying fees metered in month or gigabyte.
Jinxia Wei +3 more
doaj +1 more source
Perceived Ability to Practice in Disaster Management Among Public Health Nurses in Aceh, Indonesia [PDF]
Background: The increasing number of disaster events around the world has challenged every country to develop better disaster-management strategies. As a part of healthcare system, public health nurses (PHNs) should be involved in caring for people in ...
Maneewat, K. (Khomapak) +2 more
core +1 more source
“Build back better” approach to disaster recovery: Research trends since 2006
The “build back better” (BBB) approach to disaster recovery was first introduced in 2006 by the United Nations Secretary-General's Special Envoy for Tsunami Recovery, former US President William Clinton.
Glenn Fernandez, I. Ahmed
semanticscholar +1 more source
To improve the resilience of distribution networks (DNs), a multi-stage dynamic recovery strategy is proposed in this paper, which is designed for post-disaster DN considering an integrated energy system (IES) and transportation network (TN).
Jiang Xinyi +3 more
semanticscholar +1 more source
Highly efficient heavy‐atom‐free NIR photosensitizers based on a heptamethine cyanine platform were developed for image‐guided photodynamic therapy. Both in vitro and in vivo results revealed that the R820‐3 photosensitizer with a highly twisted molecular structure exhibited potential for NIR fluorescence image‐guided photodynamic cancer therapy ...
Van‐Nghia Nguyen +9 more
wiley +1 more source
Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks
Security problems have become obstacles in the practical application of wireless sensor networks (WSNs), and intrusion detection is the second line of defense. In this paper, an intrusion detection based on dynamic state context and hierarchical trust in
Zhihua Zhang +4 more
doaj +1 more source
The Challenges and Obstacles of Post-Disaster Road Infrastructure Reconstruction in the Pre-Construction Phase [PDF]
Purpose The reconstruction of road infrastructure in the post-disaster context require different approach when compared with road projects in the normal development context.
Amaratunga, Dilanthi +2 more
core +1 more source
Social media data and post-disaster recovery
This study introduces a multi-step methodology for analyzing social media data during the post-disaster recovery phase of Hurricane Sandy. Its outputs include identification of the people who experienced the disaster, estimates of their physical location,
M. Jamali +4 more
semanticscholar +1 more source
An advanced microneedle patch integrating niobium carbide nanosheets and curcumin is engineered for diabetic wound healing. The system enables dual ROS scavenging and NIR‐enhanced antimicrobial activity, effectively rebalancing the oxidative microenvironment, promoting macrophage repolarization and angiogenesis, and accelerating full‐thickness wound ...
Zhi Zheng +12 more
wiley +1 more source
A Privacy Measurement Framework for Multiple Online Social Networks against Social Identity Linkage
Recently, the number of people who are members of multiple online social networks simultaneously has increased. However, if these people share everything with others, they risk their privacy.
Xuefeng Li +3 more
doaj +1 more source

