Results 61 to 70 of about 2,693,777 (322)
InSPeCT: Integrated Surveillance for Port Container Traffic [PDF]
This paper describes a fully-operational content-indexing and management system, designed for monitoring and profiling freight-based vehicular traffic in a seaport environment.
Ferguson, Paul +4 more
core
Standardization of Information Security Management System: ISO/IEC 27001: 2005, ITIL®, CoBIT®
Information is currently the most important asset of modern companies. Its security is therefore very important and becomes the top priority of each company. Unfortunately, there is no simple recipe providing 100 % security of information. A company must
M. Jakábová +2 more
semanticscholar +1 more source
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point +7 more
wiley +1 more source
Principles of information security management system
Abstract The main element of a complex system that determines its performance and efficiency is its management system. Modern management systems are widely used, including in the management of teams of people united by common goals (organizations, departments, groups of developers, etc.).
V Y Dronov, G A Dronova
openaire +1 more source
Tracking Motor Progression and Device‐Aided Therapy Eligibility in Parkinson's Disease
ABSTRACT Objective To characterise the progression of motor symptoms and identify eligibility for device‐aided therapies in Parkinson's disease, using both the 5‐2‐1 criteria and a refined clinical definition, while examining differences across genetic subgroups.
David Ledingham +7 more
wiley +1 more source
Information Security Risk Management in the Automated System
The urgency of researches in the field of working out of new techniques of risk management of information security in the automated systems is described.
I. I. Zenzin
doaj
Possibilistic Information Flow Control for Workflow Management Systems
In workflows and business processes, there are often security requirements on both the data, i.e. confidentiality and integrity, and the process, e.g. separation of duty.
Bauereiss, Thomas, Hutter, Dieter
core +2 more sources
ABSTRACT Background Poststroke fatigue (PSF) and frailty share substantial overlap in their manifestations, yet previous research has yielded conflicting results due to the use of heterogeneous frailty assessment tools. Objective To evaluate the independent impact of frailty on PSF using a unified measurement system (Tilburg Frailty Indicator, TFI ...
Chuan‐Bang Chen +6 more
wiley +1 more source
Lessons Learned: Quality Analysis of Optical Coherence Tomography in Neuromyelitis Optica
ABSTRACT Introduction Optical coherence tomography (OCT)‐derived retina measurements are markers for neuroaxonal visual pathway status. High‐quality OCT scans are essential for reliable measurements, but their acquisition is particularly challenging in eyes with severe visual impairment, as often observed in neuromyelitis optica spectrum disorders ...
Hadi Salih +40 more
wiley +1 more source
IMPLEMENTATION OF SECURITY CONTROLS ACCORDING TO ISO/IEC 27002 IN A SMALL ORGANISATION [PDF]
Information security should be today a key issue in any organization. With the implementation of information security management system (ISMS) the organization can identify and reduce risks in this area.
MATÚŠ HORVÁTH, MARTIN JAKUB
doaj

