Results 31 to 40 of about 6,929,434 (416)
Modified Total Evaporation Method for Highly Precise Measurement of Uranium Isotopes Ratio [PDF]
Thermal ionization mass spectrometry (TIMS) is a well-established instrumental technique for accurately analyzing isotopes of elements with low first ionization potential.
ZHANG Ji-long1+8 more
doaj +1 more source
Social Security Programs Throughout the World: Africa, 2011 [PDF]
[Excerpt] This third issue in the current four-volume series of Social Security Programs Throughout the World reports on the countries of Africa. The combined findings of this series, which also includes volumes on Europe, Asia and the Pacific, and the ...
International Social Security Association+1 more
core +4 more sources
The objective of this review is to explore and discuss the concept of local food system resilience in light of the disruptions brought to those systems by the 2020 COVID-19 pandemic.
C. Béné
semanticscholar +1 more source
Risk Assessment for Illegal Waste Open Burning [PDF]
The area of Naples and Campania region, in Italy, has been experiencing the dramatic consequences of diffuse open burning of illegal waste, resulting in possible threats to human health. The need of evaluating a risk index of open burning rises from this
Buzzo Gianpiero+5 more
doaj +1 more source
Particle Propagation Model for Dynamic Node Classification
With the popularity of online social networks, researches on dynamic node classification have received further attention. Dynamic node classification also helps the rapid popularization of online social networks.
Wenzheng Li+4 more
doaj +1 more source
Security-Informed Safety: Supporting Stakeholders with Codes of Practice [PDF]
Codes of practice provide principles and guidance on how organizations can incorporate security considerations into their safety engineering lifecycle and become more security ...
Bishop, P. G.+3 more
core +1 more source
5G Security Threat Assessment in Real Networks
Advances in mobile communication networks from 2G to 5G have brought unprecedented traffic growth, and 5G mobile communication networks are expected to be used in a variety of industries based on innovative technologies, fast not only in terms of ...
Seongmin Park+5 more
doaj +1 more source
Person Re-Identification Method Based on Dual Descriptor Feature Enhancement
Person re-identification is a technology used to identify individuals across different cameras. Existing methods involve extracting features from an input image and using a single feature for matching.
Ronghui Lin+5 more
doaj +1 more source
IoT Security Configurability with Security-by-Contract [PDF]
Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions,
Alberto Giaretta+2 more
openaire +5 more sources
Do Software Security Practices Yield Fewer Vulnerabilities? [PDF]
Due to the ever-increasing security breaches, practitioners are motivated to produce more secure software. In the United States, the White House Office released a memorandum on Executive Order (EO) 14028 that mandates organizations provide self-attestation of the use of secure software development practices.
arxiv