Results 21 to 30 of about 189,829 (257)

Household food insecurity and cooking energy access in Nigeria: A panel data approach

open access: yesEnergy Nexus, 2023
Access to sources of cooking energy has potential impacts on food security, however, there is a paucity of information and empirical evidence on their linkages.
Adegbenga Emmanuel Adekoya   +9 more
doaj   +1 more source

Internet use and depression among Chinese older adults: The mediating effect of interpersonal relationship

open access: yesFrontiers in Public Health, 2023
The number of elderly Internet users has increased significantly in the past few years, and the Internet has greatly changed the way that older adults access information and communicate.
Yan Nan, Yating Xie, Yuqun Hu
doaj   +1 more source

Combining Approaches for Systemic Behaviour Change in Groundwater Governance

open access: yesInternational Journal of the Commons
Over-extraction of groundwater is a prominent challenge in India, with profound implication for food security, livelihoods, and economic development. As groundwater is an ‘invisible’ and mobile common pool resource, sustainable governance of groundwater ...
Richu Sanil   +3 more
doaj   +1 more source

On Quantitative Security Policies [PDF]

open access: yes, 2011
We introduce a formal framework to specify and enforce quantitative security policies. The framework consists of: (i) a stochastic process calculus to express the measurable space of computations in terms of Continuous Time Markov Chains; (ii) a stochastic modal logic (a variant of CSL) to represent the bound constraints on execution speed; (iii) two ...
DEGANO, PIERPAOLO   +2 more
openaire   +2 more sources

Sustainable bioplastics manufacturing from renewable sources

open access: yesFEBS Open Bio, EarlyView.
Bioplastics are manufactured by using polymers from different bio‐based sources. These novel materials not only offer biodegradability but also possess various functional properties that make them suitable for diverse applications. Recent developments in the preparation of bioplastics are reported, highlighting the distinct properties of each type of ...
C. Valeria L. Giosafatto   +6 more
wiley   +1 more source

Violent non-state actors' patterns of power: The case of Hezbollah [PDF]

open access: yesJournal of Regional Security
Conventional International Relations emphasises the role of states as the primary actors, with control being the ultimate form of power. However, in today's interconnected and intricate global landscape, non-state actors, particularly violent non-state ...
Jaber Boushra
doaj   +1 more source

Continuing medical education and work commitment among rural healthcare workers: a cross-sectional study in 11 western provinces in China

open access: yesBMJ Open, 2020
Objectives Continuing medical education (CME) and work commitment are important for rural healthcare workers (RHWs) and rural medical work. The significant association between continuing education and work commitment has been reported in many studies ...
Jinlin Liu, Ying Mao
doaj   +1 more source

Digital twins to accelerate target identification and drug development for immune‐mediated disorders

open access: yesFEBS Open Bio, EarlyView.
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley   +1 more source

The Hong Kong Pro-democracy Movement: Challenges and Divisions in the Past Decade [PDF]

open access: yesContemporary Chinese Political Economy and Strategic Relations: An International Journal, 2023
This article is an attempt to examine the challenges to Hong Kong’s pro-democracy movement and the movement’s internal divisions in the past decade or so.
Joseph Yu-shek Cheng
doaj  

Securing Java with Local Policies. [PDF]

open access: yesThe Journal of Object Technology, 2009
We propose an extension to the security model of Java, that allows for specifying, analysing and enforcing history-based usage policies. Policies are defined by usage automata, that recognize the forbidden execution histories. Programmers can sandbox an untrusted piece of code with a policy, which is enforced at run-time through its local scope.
M. Bartoletti   +4 more
openaire   +7 more sources

Home - About - Disclaimer - Privacy