Results 91 to 100 of about 7,184,030 (395)

5G wireless P2MP backhaul security protocol: an adaptive approach

open access: yesEURASIP Journal on Wireless Communications and Networking, 2019
5G has introduced various emerging demands for new services and technologies that raised the bar for quality of service, latency, handovers, and data rates.
Jiyoon Kim   +4 more
doaj   +1 more source

Family Security Insurance: A New Foundation for Economic Security [PDF]

open access: yes, 2010
A report released by Georgetown Law\u27s Workplace Flexibility 2010 and the Berkeley Center on Health, Economic & Family Security (Berkeley CHEFS) outlining a blueprint for establishing and financing a new national insurance program to provide wage ...
Berkeley Center on Health, Economic & Family Security, UC Berkeley School of Law   +1 more
core   +1 more source

Identifying High‐Impact Solutions to Address Racial and Ethnic Health Disparities in Lupus: A Consensus‐Based Approach

open access: yesArthritis Care &Research, Accepted Article.
Objective We conducted formative research aimed at identifying solutions that address inequitable health outcomes in lupus due to adverse social determinants of health. Methods We conducted a search for keywords which provided insights into potential solutions and initiatives underway. An advisory panel of lupus experts iteratively reviewed the list of
Joy Buie   +11 more
wiley   +1 more source

Facilitating Effective Food Security Policy Reform [PDF]

open access: yes
Food Security and Poverty, Downloads December 2008 - July 2009: 10,
Food Security II Faculty
core   +1 more source

Preferences for post‐traumatic osteoarthritis prevention strategies in individuals with anterior cruciate ligament injury

open access: yesArthritis Care &Research, Accepted Article.
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy   +9 more
wiley   +1 more source

Cryptanalysis on Two Kinds of Number Theoretic Pseudo-Random Generators Using Coppersmith Method

open access: yesIET Information Security
Pseudo-random number generator (PRNG) is a type of algorithm that generates a sequence of random numbers using a mathematical formula, which is widely used in computer science, such as simulation, modeling applications, data encryption, et cetera.
Ran Zhang   +3 more
doaj   +1 more source

Evaluation of antiviral activity of Ocimum sanctum and Acacia arabica leaves extracts against H9N2 virus using embryonated chicken egg model

open access: yesBMC Complementary and Alternative Medicine, 2018
Background In the view of endemic avian influenza H9N2 infection in poultry, its zoonotic potential and emergence of antiviral resistance, two herbal plants, Ocimum sanctum and Acacia arabica, which are easily available throughout various geographical ...
S. S. Ghoke   +11 more
doaj   +1 more source

Influence Maximization with Priority in Online Social Networks

open access: yesAlgorithms, 2020
The Influence Maximization (IM) problem, which finds a set of k nodes (called seedset) in a social network to initiate the influence spread so that the number of influenced nodes after propagation process is maximized, is an important problem in ...
Canh V. Pham   +4 more
doaj   +1 more source

The Australian Cyber Security Centre threat report 2015 [PDF]

open access: yes
Introduction: The number, type and sophistication of cyber security threats to Australia and Australians are increasing. Due to the varied nature of motivations for cyber adversaries targeting Australian organisations, organisations could be a target for
Australian Cyber Security Centre
core  

Arguing security: validating security requirements using structured argumentation [PDF]

open access: yes, 2005
This paper proposes using both formal and structured informal arguments to show that an eventual realized system can satisfy its security requirements. These arguments, called 'satisfaction arguments', consist of two parts: a formal argument based upon ...
Haley, Charles B.   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy