Results 21 to 30 of about 932,981 (241)
Tamper-proof Operating System [PDF]
Due to the sensibility of biometric data, security in biometric devices has to be considered. One of the ways to protect privacy is to include a tamper-proof operating system. This O.S. would not allow direct access to hardware resources of the device, neither to temporary nor permanent data.This O.S.
openaire +5 more sources
Solid State Drive (SSD) merupakan solusi terkni untuk mempercepat pemrosesan data dari berbagai komputer desktop yang bersifat multiplatform. Fitur TRIM yang ada pada SSD berguna untuk menghilangkan garbage data yang dihapus permanen oleh user, dimana ...
Rizdqi Akbar Ramadhan, Desti Mualfah
doaj +1 more source
Operator systems connect operator algebra, free semialgebraic geometry and quantum information theory. In this work we generalize operator systems and many of their theorems. While positive semidefinite matrices form the underlying structure of operator systems, our work shows that these can be promoted to far more general structures.
Gemma De les Coves +2 more
openaire +2 more sources
ABSTRACT Chemotherapy‐induced peripheral neuropathy remains a major complication in pediatric cancer, with disrupted somatosensory and nociceptive processing being a key aspect. This review synthesizes empirical studies on alterations in somatosensory and nociceptive processing in children and adolescents with cancer.
Julia Schweiger +4 more
wiley +1 more source
ABSTRACT Primary lung carcinomas and bronchial carcinoid tumors (BC) are very rare malignancies in childhood. While typical BC and mucoepidermoid carcinomas are mostly low‐grade, localized tumors with a more favorable prognosis than in adults, necessitating avoidance of overtreatment, adenocarcinomas of the lung are often diagnosed at advanced disease ...
Michael Abele +19 more
wiley +1 more source
Criterion Validity of iOS and Android Applications to Measure Steps and Distance in Adults
The growing popularity of physical activity (PA) applications (apps) in recent years and the vast amounts of data that they generate present attractive possibilities for surveillance.
Manolis Adamakis
doaj +1 more source
ABSTRACT Introduction Adolescent siblings of children with cancer are at elevated risk for psychosocial problems. Unfortunately, various barriers such as limited family time and resources, conflicting schedules, and psychosocial staffing constraints at cancer centers hinder sibling access to support.
Christina M. Amaro +10 more
wiley +1 more source
Decomposing and Modeling Acoustic Signals to Identify Machinery Defects in Industrial Soundscapes
Acoustic sound-based condition monitoring (ASCM) systems, which typically utilize machine learning algorithms on established audio features, have demonstrated effectiveness under controlled conditions.
Christof Pichler +5 more
doaj +1 more source
UNIX License Makes Linux the Last Major Piece of the Puzzle
From 1992 to 1994, BSD which was UNIX developed at the University of California, Berkeley (UC Berkeley), found itself involved in a license-related lawsuit filed by AT&T. At around the same time, the GNU project, which developed a UNIX-like free software
Nobuo TAKAHASHI, Tomofumi TAKAMATSU
doaj +1 more source
Reciprocal control of viral infection and phosphoinositide dynamics
Phosphoinositides, although scarce, regulate key cellular processes, including membrane dynamics and signaling. Viruses exploit these lipids to support their entry, replication, assembly, and egress. The central role of phosphoinositides in infection highlights phosphoinositide metabolism as a promising antiviral target.
Marie Déborah Bancilhon, Bruno Mesmin
wiley +1 more source

