Results 81 to 90 of about 8,750,178 (391)

Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems [PDF]

open access: yes, 2019
Compliance with the new European General Data Protection Regulation (Regulation (EU) 2016/679) and security assurance are currently two major challenges of Cloud-based systems.
Dominiak, Jacek   +8 more
core   +2 more sources

Laundering of Criminal Proceeds Through Cryptocurrency Transactions: A Digital Threat to Economic Security

open access: yesRevista de Direito, Estado e Telecomunicações
[Purpose] The purpose of this study is to discuss, based on international as well as national laws and practices, various issues and potential solutions surrounding the growing problem of money laundering practices using cryptocurrency transactions ...
Dmitriy Kamensky   +4 more
doaj   +1 more source

Method of induction control of iron weight fraction in magnetite ore

open access: yesЗаписки Горного института, 2018
This paper analyzes the peculiarities of existing methods and means of induction control of magnetic susceptibility of the medium are analyzed. It is concluded that these means have a common drawback due to the low measurement accuracy caused by the wave-
I. N. Bazhenov, O. O. Basov
doaj   +1 more source

American College of Rheumatology Guidance Statements for Addressing Mental Health Concerns in Youth With Pediatric Rheumatologic Diseases

open access: yesArthritis Care &Research, EarlyView.
Objective Pediatric rheumatologic diseases (PRDs) are characterized by high rates of anxiety and depression known to impact health‐related outcomes. We present guidance statements to assess and manage mental health concerns for youth with PRDs in pediatric rheumatology practice.
Natoshia R. Cunningham   +21 more
wiley   +1 more source

Legislative Alert: Rokita Amendment [PDF]

open access: yes, 2011
[Excerpt] The AFL-CIO urges you to oppose the Rokita Amendment to the Homeland Security bill that would deny basic collective bargaining rights to Transportation Security Officers (TSOs). The Rokita Amendment would single out TSOs from among the hundreds
Samuel, William
core   +1 more source

ASM: Augmented Security Module for Commercial IoT Devices

open access: yesTehnički Vjesnik
The rapid expansion of the Internet of Things (IoT) has led to increased concerns regarding the security of IoT systems. Attacks targeting IoT devices, such as code injection and code reuse, have become more sophisticated, compromising device control and
Heeseung Son   +3 more
doaj   +1 more source

Screening for Social Determinants of Health in Patients with Systemic Lupus Erythematosus: A Point‐of‐Care Feasibility Study

open access: yesArthritis Care &Research, Accepted Article.
Objectives Social determinants of health (SDoH) can impact outcomes but are not routinely screened for in US outpatient rheumatology clinics. This study determined the feasibility of routine point‐of‐care SDoH screening among patients with systemic lupus erythematosus (SLE), and associated barriers and facilitators at the physician, care team, and ...
S. Sam Lim   +11 more
wiley   +1 more source

An Introduction to Neural Networks

open access: yesProceedings of the International Florida Artificial Intelligence Research Society Conference, 2023
Neural networks ares an important type of machine learning that have generated significant interest due to their success on difficult problems.. This tutorial will provide an introduction and a high-level overview of artificial neural networks.
David Bisant
doaj   +1 more source

Using a Supramolecular Approach to Engineer Modular Hydrogel Platforms for Culturing Protoplasts – from General Tissue Engineering to Cellular Agriculture

open access: yesAdvanced Biology, EarlyView.
Using supramolecular monomers, various hydrogel culture systems were formulated to culture protoplasts; including 2D, 2.5D, and 3D hydrogels. Depending on the culture platform, bioactive functionalization led to protoplast enlargement (2D and 2.5D) or plasmolysis (3D). This work shows the potential to modularly engineer synthetic platforms for cellular
Maritza M. Rovers   +3 more
wiley   +1 more source

A Security Pattern for Cloud service certification [PDF]

open access: yes, 2019
Cloud computing is interesting from the economic, operational and even energy consumption perspectives but it still raises concerns regarding the security, privacy, governance and compliance of the data and software services offered through it. However,
López, Javier   +1 more
core  

Home - About - Disclaimer - Privacy