Results 71 to 80 of about 12,264,579 (389)

Optical monitoring system [PDF]

open access: yes, 1973
Instrument can measure optical transmission, reflectance, and scattering. This information can be used to identify changes in optical properties or deviations from required optical standards.
Fox, M. G.   +3 more
core   +1 more source

The epithelial barrier theory proposes a comprehensive explanation for the origins of allergic and other chronic noncommunicable diseases

open access: yesFEBS Letters, EarlyView.
Exposure to common noxious agents (1), including allergens, pollutants, and micro‐nanoplastics, can cause epithelial barrier damage (2) in our body's protective linings. This may trigger an immune response to our microbiome (3). The epithelial barrier theory explains how this process can lead to chronic noncommunicable diseases (4) affecting organs ...
Can Zeyneloglu   +17 more
wiley   +1 more source

Voltage monitoring system [PDF]

open access: yes, 1975
A description is given of a system for monitoring the voltage at a remote location and determining when the voltage exceeds upper and lower levels. The system includes transmission lines for transmitting the voltage back to a central station and applying
Canicatti, C. L.
core   +1 more source

Effect of pH on Determination of Various Arsenic Species in Water by HPLC-ICP-MS

open access: yesYankuang ceshi, 2019
BACKGROUND Previous studies have focused on the effect of pH on separability, choosing an optimal pH by comparing the degree of separation in the determination of different arsenic species by high-performance liquid chromatography-inductively coupled ...
DONG Hui-jun   +4 more
doaj   +1 more source

Health inequalities among children and adolescents in Germany. Developments over time and trends from the KiGGS study [PDF]

open access: yesJournal of Health Monitoring, 2019
This study examines the extent to which health inequalities among children and adolescents in Germany have developed over the past decade. The analyses are based on data from the German Health Interview and Examination Survey for Children and Adolescents
Thomas Lampert   +12 more
doaj   +1 more source

Advances in Smart Environment Monitoring Systems Using IoT and Sensors

open access: yesItalian National Conference on Sensors, 2020
Air quality, water pollution, and radiation pollution are major factors that pose genuine challenges in the environment. Suitable monitoring is necessary so that the world can achieve sustainable growth, by maintaining a healthy society. In recent years,
S. Ullo, G. Sinha
semanticscholar   +1 more source

Goodbye flat lymphoma biology

open access: yesFEBS Letters, EarlyView.
Three‐dimensional (3D) biological systems have become key tools in lymphoma research, offering reliable in vitro and ex vivo platforms to explore pathogenesis and support precision medicine. This review highlights current 3D non‐Hodgkin lymphoma models, detailing their features, advantages, and limitations, and provides a broad perspective on future ...
Carla Faria   +3 more
wiley   +1 more source

Alaska's System for Monitoring Compliance with the Juvenile Justice and Delinquency Prevention Act [PDF]

open access: yes, 1988
Pursuant to Section 223(1)(15) of the Juvenile Justice and Delinquency Prevention Act of 1974 and 28 CFR Part 31.303(f), states are required to describe their plans and procedures for annually monitoring compliance with the Act.
Parry, David L.
core  

Towards security monitoring patterns [PDF]

open access: yes, 2007
Runtime monitoring is performed during system execution to detect whether the system’s behaviour deviates from that described by requirements. To support this activity we have developed a monitoring framework that expresses the requirements to be ...
Androutsopoulos, K.   +2 more
core   +2 more sources

Self-monitoring Monitors

open access: yes, 2009
Many different monitoring systems have been created to identify system state conditions to detect or prevent a myriad of deliberate attacks, or arbitrary faults inherent in any complex system. Monitoring systems are also vulnerable to attack. A stealthy attacker can simply turn off or disable these monitoring systems without being detected; he would ...
Stolfo, Salvatore   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy