Results 41 to 50 of about 2,116,286 (342)
Bear management changes management actions according to the horizontal axis of the population size and the vertical axis of the number of nuisance bears. Aiming for the target population size of Ntar, Actions I and II protect the bears, and Action IV reduces the population.
Hiroyuki Matsuda +5 more
wiley +1 more source
People who are concerned with security (such as security professionals) are naturally interested in methods of achieving security. This paper proposes an approach to creating a taxonomic framework of security methods. The taxonomic framework is developed
Yejun Wu
doaj +1 more source
A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo +3 more
core +2 more sources
From omics to AI—mapping the pathogenic pathways in type 2 diabetes
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan +2 more
wiley +1 more source
Integralus informacijos saugumo valdymo modelis
Saugumo sąvoka yra daugialypė ir nevienareikšmiškai apibrėžiama, saugumas gali būti suprantamas kaip būsena, kuri gali reikšti ir apsisaugojimą nuo pavojaus (objektyvus saugumas), ir saugumo jausmą (subjektyvus saugumas). Siekiant sumažinti neapibrėžtumą,
Saulius Jastiuginas
doaj +1 more source
How does intellectual capital align with cyber security? [PDF]
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen +2 more
core +3 more sources
Bridging the gap: Multi‐stakeholder perspectives of molecular diagnostics in oncology
Although molecular diagnostics is transforming cancer care, implementing novel technologies remains challenging. This study identifies unmet needs and technology requirements through a two‐step stakeholder involvement. Liquid biopsies for monitoring applications and predictive biomarker testing emerge as key unmet needs. Technology requirements vary by
Jorine Arnouts +8 more
wiley +1 more source
Possibilities for Experimental Testing of Alarm Transmission Systems
In the current digital era, information is a basis of some systems. In the area of information, great emphasis is also placed on its security and possibilities of use.
Martin Boros +3 more
doaj +1 more source
An Overview of Economic Approaches to Information Security Management [PDF]
The increasing concerns of clients, particularly in online commerce, plus the impact of legislations on information security have compelled companies to put more resources in information security.
Su, X.
core +2 more sources
Plasma‐based detection of actionable mutations is a promising approach in lung cancer management. Analysis of ctDNA with a multigene NGS panel identified TP53, KRAS, and EGFR as the most frequently altered, with TP53 and KRAS in treatment‐naïve patients and TP53 and EGFR in previously treated patients.
Giovanna Maria Stanfoca Casagrande +11 more
wiley +1 more source

