Results 91 to 100 of about 3,831,405 (337)

Securing Internet Protocol (IP) Storage: A Case Study

open access: yes, 2010
Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast.
Murty, Ch. A. S   +1 more
core   +1 more source

Plasma Proteomic Signatures for Alzheimer's Disease: Comparable Accuracy to ATN Biomarkers and Cross‐Platform Validation

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background There is growing recognition of the potential of plasma proteomics for Alzheimer's Disease (AD) risk assessment and disease characterization. However, differences between proteomics platforms introduce uncertainties regarding cross‐platform applicability.
Manyue Hu   +9 more
wiley   +1 more source

Kondisi Migrasi Internet Protocol version 6 (IPv6) di Indonesia

open access: yesBuletin Pos dan Telekomunikasi: Media Komunikasi Ilmiah, 2011
   Sejalan dengan pertumbuhan industri Internet di Indonesia tersebut, maka kebutuhan akan alamat Internet Protocol (IP) juga pasti meningkat. Operator Internet akan membutuhkan alamat IP untuk mengembangkan layanannya hingga ke seluruh pelosok negeri ...
Fahrizal Lukman Budiono, Riza Azmi
doaj   +1 more source

Implementasi Embedded Web Server Via Modem Berbasiskan Mikrokontroler [PDF]

open access: yes, 2006
In this paper there has been implemented a web server which store web pages on a microcontroller chip. To create a web server which connect to internet, TCP/IP protocol must be implemented as a software in the microcontroller system which use as web ...
Sutantyo, D. K. (Donny)   +1 more
core  

Virtual or in‐person: does it matter? Comparing pain, function, quality of life, self‐efficacy and physical function outcomes of virtual, hybrid and in‐person GLA:D Canada participants

open access: yesArthritis Care &Research, Accepted Article.
Objective This study aimed to determine if program format (in‐person, virtual, hybrid) results in differences in three‐month outcomes of pain, function, quality of life, self‐efficacy and chair stands in a hip/knee osteoarthritis management program. Methods A secondary analysis of the GLA:DTM Canada database was completed.
Jill Van Damme   +7 more
wiley   +1 more source

ESSE: Efficient Secure Session Establishment for Internet-Integrated Wireless Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2015
The dramatically increasing number of connected things based on Internet protocol is leading to a new concept called the Internet of Things (IoT). The Internet-integrated wireless sensor network has recently become one of the most important service ...
Namhi Kang   +3 more
doaj   +1 more source

Session Initiation Protocol Attacks and Challenges

open access: yes, 2012
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP).
Keshavarz, Hassan   +2 more
core  

Cell Utilization Efficiency of Internet Protocol Traffic over Asynchronous Transfer Mode Networks [PDF]

open access: yes, 1996
In the near future, large computer networks will be connection oriented, with at least the data link connectivity being provided by the Asynchronous Transfer Mode. (ATM) networks.
S., Janakiraman
core  

Cost‐effectiveness of low dose colchicine prophylaxis when starting allopurinol using the “start‐low go‐slow” approach for gout: evidence from a non‐inferiority randomised double‐blind placebo‐controlled trial.

open access: yesArthritis Care &Research, Accepted Article.
Objective The aim of this study was to investigate the cost‐effectiveness of low‐dose colchicine prophylaxis for preventing gout flares when starting allopurinol using the “start‐low go‐slow” approach. Methods Participants with gout, fulfilling the American College of Rheumatology recommendations for starting urate‐lowering therapy and with serum urate
Yana Pryymachenko   +4 more
wiley   +1 more source

Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

open access: yesSensors, 2014
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it ...
Bruce Ndibanje   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy