Results 101 to 110 of about 12,389 (249)
This study assessed the strength and durability parameters of brick aggregate concrete (BAC) incorporating rice husk ash (RHA) as a partial replacement of cement.
Md. Abu Noaman+3 more
doaj +1 more source
Extended Role Based Access Control with Blob Service on Cloud [PDF]
Role-based access control (RBAC) models have generated a great interest in the security community as a powerful and generalized approach to security management and ability to model organizational structure and their capability to reduce administrative expenses. In this paper, we highlight the drawbacks of latest developed RBAC models in terms of access
arxiv
A blockchain‐based secure framework for data management
Data management is a crucial requirement due to the autonomous and constrained nature of Unmanned Aerial Vehicles (UAVs), Internet of Things (IoTs) and the aviation domain. This research underscores the shortcomings of previously suggested and existing frameworks emphasizing the absence of a comprehensive approach that successfully incorporates ...
Ozan Zorlu, Adnan Ozsoy
wiley +1 more source
Baculovirus Displaying Hemagglutinin Elicits Broad Cross-Protection against Influenza in Mice. [PDF]
The widespread influenza virus infection further emphasizes the need for novel vaccine strategies that effectively reduce the impact of epidemic as well as pandemic influenza.
Sang-Hee Sim+4 more
doaj +1 more source
Design of a large language model for improving customer service in telecom operators
This study addresses the inefficiencies of traditional customer service systems in telecom operations, which need help with timely data retrieval and precision. A customized large language model (LLM) is developed using the LangChain framework tailored for telecom customer service.
Ma Xiaoliang+4 more
wiley +1 more source
Reconfiguring Role-Based Access Control via Role Clustering
Role-based access control (RBAC) systems have become a widely used and accepted method by many organizations today due to their efficiency and ease of management.
Osman Durdag, Ahmet Coskuncay
doaj +1 more source
Optimized Recombinant Expression and Purification of the SARS‐CoV‐2 Polymerase Complex
Abstract An optimized protocol has been developed to express and purify the core RNA‐dependent RNA polymerase (RdRP) complex from the severe acute respiratory syndrome coronavirus‐2 (SARS‐CoV‐2). The expression and purification of active core SARS‐CoV‐2 RdRp complex is challenging due to the complex multidomain fold of nsp12, and the assembly of the ...
Ana Podadera+5 more
wiley +1 more source
RBAC/MAC Security for UML [PDF]
In software construction, analysis investigates system requirements and design captures system functionality. To facilitate analysis and design, one popular technique is the unified modeling language, UML. In UML, there are use-case diagrams for the interaction of users with system components, class diagrams for the static classes and relations among ...
Doan, T.+3 more
openaire +2 more sources
RBAC and XML security in adhoc networks [PDF]
The rules and specifications for formations of adhoc networks are becoming increasingly important due to variety of applications. In this paper, we describe how roles of participating devices can be framed to facilitate access and formation of an adhoc network.
Memon, Q, Khoja, S A
openaire +3 more sources
A Blockchain‐Based Trustworthy Access Control Scheme for Medical Data Sharing
Blockchain is commonly employed in access control to provide safe medical data exchange because of the characteristics of decentralization, nontamperability, and traceability. Patients share personal health data by granting access rights to users or medical institutions.
Canling Wang+9 more
wiley +1 more source