Results 61 to 70 of about 2,693,777 (322)

InSPeCT: Integrated Surveillance for Port Container Traffic [PDF]

open access: yes, 2011
This paper describes a fully-operational content-indexing and management system, designed for monitoring and profiling freight-based vehicular traffic in a seaport environment.
Ferguson, Paul   +4 more
core  

Standardization of Information Security Management System: ISO/IEC 27001: 2005, ITIL®, CoBIT®

open access: yesInt. J. Recent Contributions Eng. Sci. IT, 2013
Information is currently the most important asset of modern companies. Its security is therefore very important and becomes the top priority of each company. Unfortunately, there is no simple recipe providing 100 % security of information. A company must
M. Jakábová   +2 more
semanticscholar   +1 more source

Mycobacterial cell division arrest and smooth‐to‐rough envelope transition using CRISPRi‐mediated genetic repression systems

open access: yesFEBS Open Bio, EarlyView.
CRISPRI‐mediated gene silencing and phenotypic exploration in nontuberculous mycobacteria. In this Research Protocol, we describe approaches to control, monitor, and quantitatively assess CRISPRI‐mediated gene silencing in M. smegmatis and M. abscessus model organisms.
Vanessa Point   +7 more
wiley   +1 more source

Principles of information security management system

open access: yesJournal of Physics: Conference Series, 2022
Abstract The main element of a complex system that determines its performance and efficiency is its management system. Modern management systems are widely used, including in the management of teams of people united by common goals (organizations, departments, groups of developers, etc.).
V Y Dronov, G A Dronova
openaire   +1 more source

Tracking Motor Progression and Device‐Aided Therapy Eligibility in Parkinson's Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To characterise the progression of motor symptoms and identify eligibility for device‐aided therapies in Parkinson's disease, using both the 5‐2‐1 criteria and a refined clinical definition, while examining differences across genetic subgroups.
David Ledingham   +7 more
wiley   +1 more source

Information Security Risk Management in the Automated System

open access: yesБезопасность информационных технологий, 2011
The urgency of researches in the field of working out of new techniques of risk management of information security in the automated systems is described.
I. I. Zenzin
doaj  

Possibilistic Information Flow Control for Workflow Management Systems

open access: yes, 2014
In workflows and business processes, there are often security requirements on both the data, i.e. confidentiality and integrity, and the process, e.g. separation of duty.
Bauereiss, Thomas, Hutter, Dieter
core   +2 more sources

The Impact of Tilburg Frailty on Poststroke Fatigue in First‐Ever Stroke Patients: A Cross‐Sectional Study With Unified Measurement Tools and Improved Statistics

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Poststroke fatigue (PSF) and frailty share substantial overlap in their manifestations, yet previous research has yielded conflicting results due to the use of heterogeneous frailty assessment tools. Objective To evaluate the independent impact of frailty on PSF using a unified measurement system (Tilburg Frailty Indicator, TFI ...
Chuan‐Bang Chen   +6 more
wiley   +1 more source

Lessons Learned: Quality Analysis of Optical Coherence Tomography in Neuromyelitis Optica

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Introduction Optical coherence tomography (OCT)‐derived retina measurements are markers for neuroaxonal visual pathway status. High‐quality OCT scans are essential for reliable measurements, but their acquisition is particularly challenging in eyes with severe visual impairment, as often observed in neuromyelitis optica spectrum disorders ...
Hadi Salih   +40 more
wiley   +1 more source

IMPLEMENTATION OF SECURITY CONTROLS ACCORDING TO ISO/IEC 27002 IN A SMALL ORGANISATION [PDF]

open access: yesKvalita Inovácia Prosperita, 2009
Information security should be today a key issue in any organization. With the implementation of information security management system (ISMS) the organization can identify and reduce risks in this area.
MATÚŠ HORVÁTH, MARTIN JAKUB
doaj  

Home - About - Disclaimer - Privacy