Results 71 to 80 of about 2,344,167 (352)
Analysis of Security Service Oriented Architecture (SOA) with Access Control Models Dynamic Level [PDF]
Now we are moving towards the "Internet of Things" (IOT) in millions of devices will be interconnected with each other, giving and taking information provided within a network that can work together. Because of computing and information processing itself
Fernando, E. (Erick) +1 more
core
Purging the Past: The Current State of Lustration Laws in the Former Communist Bloc [PDF]
Lustration laws are used in the nations of the former communist bloc to determine whether suspected individuals collaborated with the former state security service.
Ellis, Mark S.
core +2 more sources
Large-scale IT systems play a central role in the management of European borders. These systems not only support the management of mobility but also require management in and of themselves. Based on fieldwork carried out at the headquarters of the European Union Agency for the Operational Management of Large-Scale IT systems in the Area of Freedom ...
openaire +2 more sources
Objective The aim of this systematic review was to synthesize the economic impact of rheumatoid arthritis (RA) on households, health systems, and society in low‐ and middle‐income countries (LMICs). Methods Electronic databases such as PubMed, Web of Science, and CINAHL were searched using keywords related to RA and cost of illness.
Tadesse Gebrye +6 more
wiley +1 more source
Method of induction control of iron weight fraction in magnetite ore
This paper analyzes the peculiarities of existing methods and means of induction control of magnetic susceptibility of the medium are analyzed. It is concluded that these means have a common drawback due to the low measurement accuracy caused by the wave-
I. N. Bazhenov, O. O. Basov
doaj +1 more source
Analysing and attacking the 4-way handshake of IEEE 802.11i standard [PDF]
The IEEE 802.11i standard has been designed to enhance security in wireless networks. In the 4-way handshake the supplicant and the authenticator use the pairwise master key (PMK) to derive a fresh pairwise transient key (PTK).
Alabdulatif, A, Ma, X, Nolle, L
core +1 more source
Comprehensive Assessment of Mobile Service Privacy Security Based on FAHP and D–S Theory [PDF]
Ming Yang +4 more
openalex +1 more source
Objective This study aimed to determine if program format (in‐person, virtual, or hybrid) results in differences in 3‐month outcomes of pain, function, quality of life, self‐efficacy, and chair stands in a hip/knee osteoarthritis‐management program. Methods A secondary analysis of the Good Life with osteoArthritis in Denmark (GLA:D) Canada database was
Jill Van Damme +7 more
wiley +1 more source
Federal Employees’ Retirement System: The Role of the Thrift Savings Plan [PDF]
[Excerpt] Federal employees participate in one of two retirement systems. The Civil Service Retirement System (CSRS) was established in 1920 and covers only employees hired before 1984.
Isaacs, Katelin P
core +2 more sources
Objective We conducted formative research aimed at identifying solutions that address inequitable health outcomes in lupus due to adverse social determinants of health (SDoH). Methods We conducted a search for keywords, which provided insights into potential solutions and initiatives underway. An advisory panel of lupus experts iteratively reviewed the
Joy Buie +11 more
wiley +1 more source

