Results 91 to 100 of about 3,831,405 (337)
Securing Internet Protocol (IP) Storage: A Case Study
Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast.
Murty, Ch. A. S +1 more
core +1 more source
ABSTRACT Background There is growing recognition of the potential of plasma proteomics for Alzheimer's Disease (AD) risk assessment and disease characterization. However, differences between proteomics platforms introduce uncertainties regarding cross‐platform applicability.
Manyue Hu +9 more
wiley +1 more source
Kondisi Migrasi Internet Protocol version 6 (IPv6) di Indonesia
Sejalan dengan pertumbuhan industri Internet di Indonesia tersebut, maka kebutuhan akan alamat Internet Protocol (IP) juga pasti meningkat. Operator Internet akan membutuhkan alamat IP untuk mengembangkan layanannya hingga ke seluruh pelosok negeri ...
Fahrizal Lukman Budiono, Riza Azmi
doaj +1 more source
Implementasi Embedded Web Server Via Modem Berbasiskan Mikrokontroler [PDF]
In this paper there has been implemented a web server which store web pages on a microcontroller chip. To create a web server which connect to internet, TCP/IP protocol must be implemented as a software in the microcontroller system which use as web ...
Sutantyo, D. K. (Donny) +1 more
core
Objective This study aimed to determine if program format (in‐person, virtual, hybrid) results in differences in three‐month outcomes of pain, function, quality of life, self‐efficacy and chair stands in a hip/knee osteoarthritis management program. Methods A secondary analysis of the GLA:DTM Canada database was completed.
Jill Van Damme +7 more
wiley +1 more source
ESSE: Efficient Secure Session Establishment for Internet-Integrated Wireless Sensor Networks
The dramatically increasing number of connected things based on Internet protocol is leading to a new concept called the Internet of Things (IoT). The Internet-integrated wireless sensor network has recently become one of the most important service ...
Namhi Kang +3 more
doaj +1 more source
Session Initiation Protocol Attacks and Challenges
In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP).
Keshavarz, Hassan +2 more
core
Cell Utilization Efficiency of Internet Protocol Traffic over Asynchronous Transfer Mode Networks [PDF]
In the near future, large computer networks will be connection oriented, with at least the data link connectivity being provided by the Asynchronous Transfer Mode. (ATM) networks.
S., Janakiraman
core
Objective The aim of this study was to investigate the cost‐effectiveness of low‐dose colchicine prophylaxis for preventing gout flares when starting allopurinol using the “start‐low go‐slow” approach. Methods Participants with gout, fulfilling the American College of Rheumatology recommendations for starting urate‐lowering therapy and with serum urate
Yana Pryymachenko +4 more
wiley +1 more source
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it ...
Bruce Ndibanje +2 more
doaj +1 more source

