Results 51 to 60 of about 2,547,954 (246)

Secure & Prepared, October 4, 2006, Vol.2, no.19 [PDF]

open access: yes, 2006
Secure & Prepared is a bi-weekly publication of the Iowa Homeland Security & Emergency Management Division for those involved in the homeland security system in the state of ...

core  

SUPER: Towards the Use of Social Sensors for Security Assessments and Proactive Management of Emergencies [PDF]

open access: yes, 2015
Social media statistics during recent disasters (e.g. the 20 million tweets relating to 'Sandy' storm and the sharing of related photos in Instagram at a rate of 10/sec) suggest that the understanding and management of real-world events by civil ...
Kaltenbrunner, Andreas   +6 more
core   +1 more source

Remote Monitoring in Myasthenia Gravis: Exploring Symptom Variability

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Myasthenia gravis (MG) is a rare, autoimmune disorder characterized by fluctuating muscle weakness and potential life‐threatening crises. While continuous specialized care is essential, access barriers often delay timely interventions. To address this, we developed MyaLink, a telemedical platform for MG patients.
Maike Stein   +13 more
wiley   +1 more source

An Autonomous Deployment Mechanism for AI Security Services

open access: yesIEEE Access
Future network architectures are expected to be autonomous, intelligent, and service-based, posing new security challenges. To address these challenges, the Artificial Intelligence (AI) security service emerges as a promising solution.
Weilin Wang   +3 more
doaj   +1 more source

Ecotourism; Implementation of Security Management Concepts

open access: yesJournal of Economic Development, Environment and People, 2020
The following paper is an essay book review, examines and links the concept of ecotourism and the concept of security management. It is hoped that this essay will become a new topic for academics and practitioners.
Dhian Tyas Untari
doaj   +1 more source

Strengthening Data Security: an Holistic Approach [PDF]

open access: yes, 2008
In the light of heightened concern around data security, this paper highlights some of the measures that can be used to develop and strengthen security in data archiving. The paper includes discussion of the different approaches that can be taken towards
Bolton, S, Woollard, M
core  

Location‐Specific Hematoma Volume Predicts Early Neurological Deterioration in Supratentorial ICH

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Early neurological deterioration (END) adversely affects outcomes in patients with intracerebral hemorrhage (ICH). This study aimed to determine the location‐specific hematoma volumes for END in supratentorial ICH patients. Methods We retrospectively analyzed supratentorial ICH patients presenting from two prospective cohorts.
Zuoqiao Li   +10 more
wiley   +1 more source

Secure & Prepared, October 31, 2006, Vol.2, no.21 [PDF]

open access: yes, 2006
Secure & Prepared is a bi-weekly publication of the Iowa Homeland Security & Emergency Management Division for those involved in the homeland security system in the state of ...

core  

Semantics for incident identification and resolution reports [PDF]

open access: yes, 2016
In order to achieve a safe and systematic treatment of security protocols, organizations release a number of technical briefings describing how to detect and manage security incidents. A critical issue is that this document set may suffer from semantic
Borrego Díaz, Joaquín   +3 more
core   +1 more source

A Systematic Comparison of Alpha‐Synuclein Seed Amplification Assays for Increasing Reproducibility

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Seed amplification assays (SAAs) enable ultrasensitive detection of misfolded α‐synuclein across biofluids and tissues. Yet, heterogeneity in protocols limits cross‐study comparability and clinical translation. Here, we review α‐synuclein SAA methods and their performance across various biological matrices.
Manuela Amaral‐do‐Nascimento   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy