Results 11 to 20 of about 2,344,167 (352)
In this letter, we briefly describe how we selected and implemented the quality criteria checklist (QCC) as a critical appraisal tool in rapid systematic reviews conducted to inform public health advice, guidance and policy during the COVID-19 pandemic ...
Daphne Duval +5 more
doaj +1 more source
Collection and Use of Information by Counter-Intelligence in the Context of Human Rights Protection
Obtaining complete and reliable information during counter-intelligence activities is very critical. The extraction, analytical processing, and use of information regarding signs and facts of intelligence, terroristic, and other activities of special ...
Antonina Dimich +4 more
doaj +1 more source
Performance Verification of SeqType® P52 Human Ancestry Identification SNP Detection Kit [PDF]
Objective To evaluate the discrimination efficiency of the SeqType P52 Human Ancestry Identification SNP Detection Kit based on a high-throughput sequencing platform in five Chinese ethnic groups.
WANG Ying-xi, MA Yuan, LI Fu, et al.
doaj +1 more source
SECURITY TOKEN SERVICE SYSTEM ADMINISTRATOR GUIDE [PDF]
The Security Token Service (STS) is a partial implementation of the OASIS WS-Trust specification.It is a service that can be used for transforming an existing security token into another security token ...
White, John
core +1 more source
Today, it is hardly necessary to emphasize the fact particularly that the successful existence of the enterprise as an economic unit is no longer so self-evident as it has been in former years. The achievement of commensurate profits, maintaining the substance of business or in extreme cases even the survival of the enterprise : all these are being ...
openaire +1 more source
Mathematical model for controlling CO2 concentration in greenhouses late in MATLAB [PDF]
The article is devoted to the development of an automated control system for irradiation facilities. The system will optimize the electricity cost for supplementary lighting plants in greenhouses without economic losses. A number of scientific researches
Ivliev Sergey N. +3 more
doaj +1 more source
An architecture for certification-aware service discovery [PDF]
Service-orientation is an emerging paradigm for building complex systems based on loosely coupled components, deployed and consumed over the network. Despite the original intent of the paradigm, its current instantiations are limited to a single trust ...
Bezzi, M., Sabetta, A., Spanoudakis, G.
core +1 more source
Specificities of non-intelligence work of modern security services [PDF]
The security services, from their inception to the present day have played a very important, if not decisive, role in all major events that have taken place in states since their inception.
Labović Dejan R. +2 more
doaj +1 more source
Background Since the end of January 2020, the coronavirus (COVID-19) pandemic has been responsible for a global health crisis. In England a number of non-pharmaceutical interventions have been introduced throughout the pandemic, including guidelines on ...
Claire F. Ferraro +8 more
doaj +1 more source
Mobile integrated conditional access system [PDF]
This paper presents design of a novel security architecture integrating mobile and broadcasting technologies in the Pay-TV system. The security architecture proposed herein is a state-of-the-art solution to tackle well-known problems challenging current ...
Birch, N +4 more
core +1 more source

