Results 41 to 50 of about 2,116,286 (342)

An Adaptive Management Model for Brown Bears in Hokkaido: Based on Total Population and the Number of Nuisance Bears

open access: yesPopulation Ecology, EarlyView.
Bear management changes management actions according to the horizontal axis of the population size and the vertical axis of the number of nuisance bears. Aiming for the target population size of Ntar, Actions I and II protect the bears, and Action IV reduces the population.
Hiroyuki Matsuda   +5 more
wiley   +1 more source

Developing a Taxonomic Framework of Security Methods for Security Management and Information Resource Management

open access: yesJournal of Strategic Security, 2020
People who are concerned with security (such as security professionals) are naturally interested in methods of achieving security. This paper proposes an approach to creating a taxonomic framework of security methods. The taxonomic framework is developed
Yejun Wu
doaj   +1 more source

A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]

open access: yes, 2020
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo   +3 more
core   +2 more sources

From omics to AI—mapping the pathogenic pathways in type 2 diabetes

open access: yesFEBS Letters, EarlyView.
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan   +2 more
wiley   +1 more source

Integralus informacijos saugumo valdymo modelis

open access: yesInformacijos Mokslai, 2012
Saugumo sąvoka yra daugialypė ir nevienareikšmiškai apibrėžiama, saugumas gali būti suprantamas kaip būsena, kuri gali reikšti ir apsisaugojimą nuo pavojaus (objektyvus saugumas), ir saugumo jausmą (subjektyvus saugumas). Siekiant sumažinti neapibrėžtumą,
Saulius Jastiuginas
doaj   +1 more source

How does intellectual capital align with cyber security? [PDF]

open access: yes, 2019
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen   +2 more
core   +3 more sources

Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology

open access: yesMolecular Oncology, EarlyView.
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts   +8 more
wiley   +1 more source

Possibilities for Experimental Testing of Alarm Transmission Systems

open access: yesCommunications, 2020
In the current digital era, information is a basis of some systems. In the area of information, great emphasis is also placed on its security and possibilities of use.
Martin Boros   +3 more
doaj   +1 more source

An Overview of Economic Approaches to Information Security Management [PDF]

open access: yes, 2006
The increasing concerns of clients, particularly in online commerce, plus the impact of legislations on information security have compelled companies to put more resources in information security.
Su, X.
core   +2 more sources

Feasibility of a ctDNA multigenic panel for non‐small‐cell lung cancer early detection and disease surveillance

open access: yesMolecular Oncology, EarlyView.
Plasma‐based detection of actionable mutations is a promising approach in lung cancer management. Analysis of ctDNA with a multigene NGS panel identified TP53, KRAS, and EGFR as the most frequently altered, with TP53 and KRAS in treatment‐naïve patients and TP53 and EGFR in previously treated patients.
Giovanna Maria Stanfoca Casagrande   +11 more
wiley   +1 more source

Home - About - Disclaimer - Privacy