Results 71 to 80 of about 6,638,555 (335)

Health Care Coverage: Job Lock and the Potential Impact of the Patient Protection and Affordable Care Act [PDF]

open access: yes, 2011
[Excerpt] The majority of Americans—about 55 percent in 2010—rely on employer-sponsored health care coverage, which is largely subsidized by most employers and thus less costly to employees than coverage purchased by individuals on their own.
United States Government Accountability Office
core   +2 more sources

The Lock-free $k$-LSM Relaxed Priority Queue

open access: yes, 2015
Priority queues are data structures which store keys in an ordered fashion to allow efficient access to the minimal (maximal) key. Priority queues are essential for many applications, e.g., Dijkstra's single-source shortest path algorithm, branch-and ...
Gruber, Jakob   +3 more
core   +2 more sources

Hands‐on protocol for preparing water‐soluble fractions from agri‐food samples for NMR‐based metabolomics analysis

open access: yesFEBS Open Bio, EarlyView.
This research protocol outlines a workflow for nuclear magnetic resonance (NMR)‐based metabolomics in the agri‐food sector. Using two case studies—strawberry leaves (solid matrix) and wine (liquid matrix)—it details the procedures for sample preparation, data acquisition, and processing.
Andrea Fernández‐Veloso   +4 more
wiley   +1 more source

Development and application of smart key security control system for wind farms

open access: yesDianzi Jishu Yingyong, 2023
The informatization and intelligence of wind farm lock and key management is the key to further improve the level of wind farm operation and maintenance management.
Liu Hailong   +3 more
doaj   +1 more source

Simple key locks turbine rotor blades [PDF]

open access: yes, 1966
Symmetrical, cruciform key has end tabs which bend up to lock tubine rotor blades against axial displacement.

core   +1 more source

A New PUF Based Lock and Key Solution for Secure In-Field Testing of Cryptographic Chips

open access: yesIEEE Transactions on Emerging Topics in Computing, 2019
Scan-based side-channel attacks have become a new threat to cryptographic chips. Existing countermeasures require a secret test key to unlock the scan chain before in-field testing is allowed.
Aijiao Cui   +3 more
semanticscholar   +1 more source

Antibiofilm activity of a chionodracine‐derived peptide by NMR‐based metabolomics of cell‐free supernatant of Acinetobacter baumannii clinical strains

open access: yesFEBS Open Bio, EarlyView.
KHS‐Cnd peptide is able to impair biofilm formation and disaggregate mature biofilms in Acinetobacter baumannii clinical isolates. Differences in extracellular metabolites reflect changes in biofilm metabolism due to KHS‐Cnd treatment. Among the differentially represented extracellular metabolites upon KHS‐Cnd treatment, the significantly altered ...
Fernando Porcelli   +9 more
wiley   +1 more source

Beyond the fuzzy lock-and-key: spontaneous symmetry shifts and glycan/lectin logic gates [PDF]

open access: yes, 2012
Changes in the molecular topology of glycan/lectin interaction may explain observed reaction punctuation driven by experimental gradients in reactant concentration. Adoption of a 'biological renormalization' perspective from statistical physics
Rodrick Wallace
core   +1 more source

The Diverse Neuromuscular Spectrum of VPS13A Disease

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective VPS13A disease (chorea‐acanthocytosis) is a rare neurodegenerative disorder caused by biallelic variants in VPS13A, typically presenting with hyperkinetic movement disorders, while neuromuscular signs are often mild. The aim of the project was to investigate the frequency and severity of neuromuscular impairment in VPS13A disease ...
Anne Buchberger   +16 more
wiley   +1 more source

IMPLEMENTASI ALGORITMA ELGAMAL DALAM SISTEM LOCK BRANKAS BERBASIS MIKROKONTROLER ATMEGA16 DAN SMARTPHONE ANDROID

open access: yesJurnal Ilmiah Informatika, 2016
Most of Safes lock system is still using conventional methods nowadays. The conventional method leads to the safes’ burglary. Some of the causes are the safes’ code that can be tracked easily and the key can be duplicated.
Muhammad Rofiq, Bambang Tri Wahjo Utomo
doaj   +1 more source

Home - About - Disclaimer - Privacy