Results 31 to 40 of about 70,483 (286)

The nature of female genital mutilation according to the Istanbul Convention and other international instruments [PDF]

open access: yesTemida, 2023
The paper deals with the nature of female genital mutilation (FGM) as a highly gendered, harmful practice, which has in the meantime been formalized as a crime.
Marković Ivana
doaj   +1 more source

Mathematical modeling of ultra wideband in vivo radio channel [PDF]

open access: yes, 2018
This paper proposes a novel mathematical model for an in vivo radio channel at ultra-wideband frequencies (3.1–10.6 GHz), which can be used as a reference model for in vivo channel response without performing intensive experiments or simulations.
Abbasi, Qammer H.   +4 more
core   +1 more source

Optimal security limits of RFID distance bounding protocols [PDF]

open access: yes, 2010
In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two specific classes, leaving the security bounds for the general case as an open problem.
Avoine, Gildas   +5 more
core   +2 more sources

Institutionalizing torture in Israel: The Firas Tbeish decision. A commentary by John W. Schiemann, PhD

open access: yesTorture, 2019
In her discussion of the court’s dismissal of the IP, she says there “is a legal system that discredits the IP’s potential while digging deeper into its own conception of torture.'' Shir has helped show that this is true more broadly of torture, beyond ...
John Wilson Schiemann
doaj   +1 more source

Detainees' perception of the doctors and the medical institution in Spanish police stations: An impediment in the fight against torture and ill-treatment

open access: yesTorture, 2017
Background: As part of a program by the Basque Government (Spain) and the University of the Basque Country, persons who have alleged exposure to torture and ill-treatment have been examined by psychol ogists and psychiatrists according to the Istanbul ...
Hans Draminsky Petersen, Benito Morentin
doaj   +1 more source

Opportunities and risks for CO2 intense sectors in Turkey [PDF]

open access: yes, 2012
The Carbon Disclosure Project (CDP) is an independent not-for-profit organization holding the largest database of primary corporate climate change information in the world.
Sabuncu, Tanyeli Behic   +1 more
core   +1 more source

Incommunicado detention and torture in Spain, Part III: 'Five days is enough’: the concept of torturing environments

open access: yesTorture, 2018
Background: Torture is changing in western societies, evolving from pain-producing torture to more subtle mixed psychological methods that are harder to detect.
Lilla Hárdi   +5 more
doaj   +1 more source

Evaluation of liver stiffness measurement–based scores in liver transplantation recipients

open access: yesLiver Transplantation, EarlyView., 2022
Abstract Combining bioclinical parameters with liver stiffness measurement (LSM) has improved the diagnostic performance of vibration‐controlled transient elastography (VCTE) for detection of advanced fibrosis in patients with chronic liver disease. However, this approach has not yet been tested in liver transplantation (LT) recipients.
Tamoore Arshad   +11 more
wiley   +1 more source

Giving Neurons to Sensors: An Approach to QoS Management Through Artificial Intelligence in Wireless Networks [PDF]

open access: yes, 2006
For the latest ten years, many authors have focused their investigations in wireless sensor networks. Different researching issues have been extensively developed: power consumption, MAC protocols, selforganizing network algorithms, data-aggregation ...
Barbancho Concejero, Antonio   +3 more
core   +1 more source

A distributed key establishment scheme for wireless mesh networks using identity-based cryptography [PDF]

open access: yes, 2010
In this paper, we propose a secure and efficient key establishment scheme designed with respect to the unique requirements of Wireless Mesh Networks. Our security model is based on Identity-based key establishment scheme without the utilization of a ...
Karaoglan, Duygu   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy