Results 101 to 110 of about 12,389 (249)

Strength and Durability Parameters of Brick Aggregate Concrete Incorporating Rice Husk Ash as a Partial Replacement of Cement

open access: yesAdvances in Materials Science and Engineering, 2022
This study assessed the strength and durability parameters of brick aggregate concrete (BAC) incorporating rice husk ash (RHA) as a partial replacement of cement.
Md. Abu Noaman   +3 more
doaj   +1 more source

Extended Role Based Access Control with Blob Service on Cloud [PDF]

open access: yesarXiv, 2013
Role-based access control (RBAC) models have generated a great interest in the security community as a powerful and generalized approach to security management and ability to model organizational structure and their capability to reduce administrative expenses. In this paper, we highlight the drawbacks of latest developed RBAC models in terms of access
arxiv  

A blockchain‐based secure framework for data management

open access: yesIET Communications, Volume 18, Issue 10, Page 628-653, June 2024.
Data management is a crucial requirement due to the autonomous and constrained nature of Unmanned Aerial Vehicles (UAVs), Internet of Things (IoTs) and the aviation domain. This research underscores the shortcomings of previously suggested and existing frameworks emphasizing the absence of a comprehensive approach that successfully incorporates ...
Ozan Zorlu, Adnan Ozsoy
wiley   +1 more source

Baculovirus Displaying Hemagglutinin Elicits Broad Cross-Protection against Influenza in Mice. [PDF]

open access: yesPLoS ONE, 2016
The widespread influenza virus infection further emphasizes the need for novel vaccine strategies that effectively reduce the impact of epidemic as well as pandemic influenza.
Sang-Hee Sim   +4 more
doaj   +1 more source

Design of a large language model for improving customer service in telecom operators

open access: yesElectronics Letters, Volume 60, Issue 10, May 2024.
This study addresses the inefficiencies of traditional customer service systems in telecom operations, which need help with timely data retrieval and precision. A customized large language model (LLM) is developed using the LangChain framework tailored for telecom customer service.
Ma Xiaoliang   +4 more
wiley   +1 more source

Reconfiguring Role-Based Access Control via Role Clustering

open access: yesIEEE Access
Role-based access control (RBAC) systems have become a widely used and accepted method by many organizations today due to their efficiency and ease of management.
Osman Durdag, Ahmet Coskuncay
doaj   +1 more source

Optimized Recombinant Expression and Purification of the SARS‐CoV‐2 Polymerase Complex

open access: yesCurrent Protocols, Volume 4, Issue 3, March 2024.
Abstract An optimized protocol has been developed to express and purify the core RNA‐dependent RNA polymerase (RdRP) complex from the severe acute respiratory syndrome coronavirus‐2 (SARS‐CoV‐2). The expression and purification of active core SARS‐CoV‐2 RdRp complex is challenging due to the complex multidomain fold of nsp12, and the assembly of the ...
Ana Podadera   +5 more
wiley   +1 more source

RBAC/MAC Security for UML [PDF]

open access: yes, 2006
In software construction, analysis investigates system requirements and design captures system functionality. To facilitate analysis and design, one popular technique is the unified modeling language, UML. In UML, there are use-case diagrams for the interaction of users with system components, class diagrams for the static classes and relations among ...
Doan, T.   +3 more
openaire   +2 more sources

RBAC and XML security in adhoc networks [PDF]

open access: yes2007 9th International Symposium on Signal Processing and Its Applications, 2007
The rules and specifications for formations of adhoc networks are becoming increasingly important due to variety of applications. In this paper, we describe how roles of participating devices can be framed to facilitate access and formation of an adhoc network.
Memon, Q, Khoja, S A
openaire   +3 more sources

A Blockchain‐Based Trustworthy Access Control Scheme for Medical Data Sharing

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
Blockchain is commonly employed in access control to provide safe medical data exchange because of the characteristics of decentralization, nontamperability, and traceability. Patients share personal health data by granting access rights to users or medical institutions.
Canling Wang   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy