Results 111 to 120 of about 7,114,774 (349)

Smartphone security [PDF]

open access: yes, 2017
According to eMarketer researchers, the total number of smartphones in active use on the planet exceeded the 2 billion unit in 2016 and amounted up to 2.16 billion against 1.9 billion in 2015 and 1.6 billion devices in 2014.
Mamienko, Sergey   +2 more
core  

Weak randomness in device independent quantum key distribution and the advantage of using high dimensional entanglement

open access: yes, 2013
We show that in device independent quantum key distribution protocols the privacy of randomness is of crucial importance. For sublinear test sample sizes even the slightest guessing probability by an eavesdropper will completely compromise security.
Huber, Marcus, Pawlowski, Marcin
core   +1 more source

A Concept of a Digital and Traceable Manufacturing Documentation Based on Formalized Process Description Applied on Composite Aircraft Moveable

open access: yesAdvanced Engineering Materials, EarlyView.
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker   +4 more
wiley   +1 more source

Rapid antibiotic susceptibility testing for urinary tract infections in secondary care in England: a cost-effectiveness analysis

open access: yesBMJ Open
Objectives To perform a model-based cost-effectiveness evaluation of a rapid antimicrobial susceptibility test.Design A Markov model of a cohort of hospital inpatients with urinary tract infection (with inpatient numbers based on national administrative ...
Julie V Robotham   +7 more
doaj   +1 more source

Ecological Security [PDF]

open access: yes, 2016
This chapter appraises the concept of Ecological Security. The treatment of environmental questions as matters of security has grown over the last half century—both in theory and practice—but has also proved contentious. Firstly, environmental “securitization” is anathema to the traditional realist view that non-military issues do not warrant such ...
openaire   +2 more sources

3D‐Printed Giant Magnetoresistive (GMR) Sensors Based on Self Compliant Springs

open access: yesAdvanced Engineering Materials, EarlyView.
This work explores 3D‐printed GMR sensors utilizing self‐compliant spring structures and conductive PLA composites. By optimizing arm width, we achieved high piezoresistive (0.34%/mm) and magnetoresistive (0.77%/mT) sensitivities. Demonstrated through Bluetooth‐integrated pressure and magnetic position sensing, these full printed low‐cost, customizable
Josu Fernández Maestu   +4 more
wiley   +1 more source

Assessing inequalities in risk of invasive group A streptococcal infections according to residential setting, England 2015-2023

open access: yesInternational Journal of Infectious Diseases
Background: Longitudinal increases in rates of invasive group A streptococcal (iGAS) infection are being seen across high-income countries, including the UK. In the absence of a vaccine, opportunities for prevention remain limited.
Dr Theresa Lamagni   +10 more
doaj   +1 more source

The efficiency of private enforcement of publik law claims in Estonia. Riiginõuete sissenõudmise efektiivsus Eestis

open access: yesEesti Majanduspoliitilised Väitlused, 2016
In Estonia, since 2001 the function of the enforcement of public law claims, such as fines or taxes, has been transferred to freelance bailiffs. The intention was to create profit motives for private enforcers to increase the effectiveness of the ...
Indrek Saar   +4 more
doaj   +1 more source

Evaluation and interoperatibility of security protocols and arquitectures [PDF]

open access: yes, 2008
During the last years, use of security protocols has increased significantly. Protection of the communications had been provided by security protocols and architectures, however some problems have appeared, revealing that the potential expansion of ICT ...
Sierra Cámara, José María
core   +1 more source

Reconfigurable Security: Edge Computing-based Framework for IoT

open access: yes, 2017
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications.
Chen, Jyh-Cheng   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy