Results 71 to 80 of about 1,030,469 (325)
Secure Group Chat: Chat and Event Management System [PDF]
poster abstractDuring hostage negotiations it is important that police officers have a fast and secure method of communicating. The goal of our project is to research and develop a secure mobile multiple party chat and event management system for the ...
Albertson, Steven
core
Tracking Motor Progression and Device‐Aided Therapy Eligibility in Parkinson's Disease
ABSTRACT Objective To characterise the progression of motor symptoms and identify eligibility for device‐aided therapies in Parkinson's disease, using both the 5‐2‐1 criteria and a refined clinical definition, while examining differences across genetic subgroups.
David Ledingham +7 more
wiley +1 more source
Blockchain-Based Wireless Sensor Networks for Malicious Node Detection: A Survey
Wireless Sensor Networks (WSNs) are broadly applied for various applications in tracking and surveillance due to their ease of use and other distinctive characteristics compelled by real-time cooperation among the sensor nodes.
Lakshmana Kumar Ramasamy +5 more
doaj +1 more source
Transformational Leadership for Promoting Climate Resilient Economic Growth [PDF]
The theme paper for 20th World Congress on Environment Management and Climate Change 2018 on Transformational Leadership for Promoting Climate Resilient Economic Growth which raises various questions for directors and boards.
Coulson-Thomas, Colin
core
ABSTRACT Background Poststroke fatigue (PSF) and frailty share substantial overlap in their manifestations, yet previous research has yielded conflicting results due to the use of heterogeneous frailty assessment tools. Objective To evaluate the independent impact of frailty on PSF using a unified measurement system (Tilburg Frailty Indicator, TFI ...
Chuan‐Bang Chen +6 more
wiley +1 more source
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security.
Igor Saenko +3 more
doaj +1 more source
In an era of widespread information system usage across various sectors, digital threats to organizations have become increasingly significant. These threats have the potential to disrupt operations and result in substantial financial losses.
Farhan Ibnu Farrel Farrel +2 more
semanticscholar +1 more source
Learning from past Disasters to Improve Crisis Management [PDF]
In the event of a disaster the coordinated response of emergency services is crucial for saving lives and protecting critical infrastructure. Efficient communication and access to relevant information are essential elements in the immediate aftermath and
Dalaff, Carsten +6 more
core
Enhancing security incident response follow-up efforts with lightweight agile retrospectives [PDF]
Security incidents detected by organizations are escalating in both scale and complexity. As a result, security incident response has become a critical mechanism for organizations in an effort to minimize the damage from security incidents.
Glisson, William Bradley +2 more
core +2 more sources
Lessons Learned: Quality Analysis of Optical Coherence Tomography in Neuromyelitis Optica
ABSTRACT Introduction Optical coherence tomography (OCT)‐derived retina measurements are markers for neuroaxonal visual pathway status. High‐quality OCT scans are essential for reliable measurements, but their acquisition is particularly challenging in eyes with severe visual impairment, as often observed in neuromyelitis optica spectrum disorders ...
Hadi Salih +40 more
wiley +1 more source

