Results 61 to 70 of about 5,018 (225)
Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 7 No. 2, February 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis/
openaire +2 more sources
Effectiveness and acceptability of oral migraine preventives: A prospective, observational study
Abstract Objective To explore the adherence, effectiveness, safety, tolerability, and acceptability of frequently used oral migraine preventive drugs in a real‐world setting. Background Oral migraine preventives are previously mainly explored in randomized controlled trials, whereas real‐world data on treatment outcomes remain limited. Methods MigriNor
Hedda S. Riise +13 more
wiley +1 more source
Abstract Objectives To explore missed opportunities for PrEP use among people with recently acquired HIV in the United Kingdom. Methods Data were derived from CASCADE, an international, longitudinal, mixed‐methods study of adults (≥16 years) with recently acquired HIV (≤12 months).
Argyro Karakosta +145 more
wiley +1 more source
IP Telephony: Comparison of Subjective Assessment Methods for Voice Quality Evaluation
One problem that often occurs after installing/implementing an IP telephony system is voice quality. Although there are objective measurement tools for voice quality evaluation, the prices of these are very expensive.
Therdpong DAENGSI +3 more
doaj +1 more source
Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers [PDF]
Network intrusion detection systems (NIDSs) face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic.
Bazara I. A. Barry
doaj
Economic Development Potential through IP Telephony for Namibia [PDF]
IP telephony, economic growth, telecommunications, ICT, Granger causality ...
Aochamub, Albertus +2 more
core
Using data network metrics, graphics, and topology to explore network characteristics
Yehuda Vardi introduced the term network tomography and was the first to propose and study how statistical inverse methods could be adapted to attack important network problems (Vardi, 1996).
Adhikari, A. +3 more
core +1 more source
ABSTRACT Aim To clarify how public health nurses allocate their time across various tasks and compare time‐use patterns between prefectural and municipal public health nurses in Japan, where distinct administrative mandates define their roles. Design A self‐reported, prospective time study.
Kyoko Yoshioka‐Maeda +10 more
wiley +1 more source
New opportunities for studying digital information transmission technologies using Cisco equipment [PDF]
The article describes a methodology for studying network technologies using Cisco equipment to create a model of a digital three-level information transmission network with further analysis of the network state and network traffic research.
Prosviryakova L. V. +2 more
doaj +1 more source
Abstract The Russian aggression in Ukraine, launched on 24 February 2022, marked the return of conventional war in the European continent. While Western leaders have framed the ongoing conflict through a common narrative when speaking internationally, which varies in its national nuances, much less is known about the images and lenses that the European
Carlotta Mingardi +2 more
wiley +1 more source

