Results 71 to 80 of about 94,819 (182)
Urban growth pattern identification : a case study in Siem Reap, Cambodia [PDF]
The main purpose of this paper is to identify the pattern of urban growth from 1993 to 2011 in Siem reap town, Cambodia. Land use and land cover maps were generated from Landsat TM imageries from different years in order to extract the information ...
Ourng, Chanvoleak+1 more
core
Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection [PDF]
Nowadays, the Security Information and Event Management (SIEM) systems take on great relevance in handling security issues for critical infrastructures as Internet Service Providers. Basically, a SIEM has two main functions: i) the collection and the aggregation of log data and security information from disparate network devices (routers, firewalls ...
arxiv
Abstract figure legend Placental mitochondrial adaptation to gestational hypoxia. Hypoxic pregnancy in sheep increases placental insulin like growth factor 2 (IGF2) signalling (1), which is associated with a shift in capacity away from β‐oxidation (2) and complex I‐mediated respiration (3), while maintaining total oxidative phosphorylation capacity (4).
Wen Tong+18 more
wiley +1 more source
ABSTRACT Internet of Medical Things (IoMT) paradigm refers to the process of collection, transmission and analysis of healthcare data using communication and information systems over the internet. IoMT consist of medical devices that can link to the internet or other networks, including wearables, sensors, monitoring tools and other medical appliances.
Mert Melih Ozcelik+2 more
wiley +1 more source
Advancing security information and event management frameworks in managed enterprises using geolocation [PDF]
Includes bibliographical referencesSecurity Information and Event Management (SIEM) technology supports security threat detection and response through real-time and historical analysis of security events from a range of data sources.
Khan, Herah Anwar
core
Markov Chain Monte Carlo on Finite State Spaces [PDF]
We elaborate the idea behind Markov chain Monte Carlo (MCMC) methods in a mathematically coherent, yet simple and understandable way. To this end, we proof a pivotal convergence theorem for finite Markov chains and a minimal version of the Perron-Frobenius theorem.
arxiv
Military Supply Chain Logistics and Dynamic Capabilities: A Literature Review and Synthesis
ABSTRACT Military supply chain logistics (MSCL) managers have pioneered innovation and thought in supply chain management (SCM). Given the ongoing conflicts and escalating international tensions of our world today, understanding the unique attributes and capabilities that shape MSCL management is imperative for navigating the broader international ...
David Loska+4 more
wiley +1 more source
Principles of data collection for building a secure enterprise infrastructure based on SIEM systems
Objective. The purpose of the article is to present the main capabilities and advantages of implementing and using SIEM systems.Method. System analysis method was used.Result.
A. D. Popov, A. N. Nikitenko
doaj +1 more source
Combination of Bio‐ and Organometallic Catalysis for the Synthesis of Dioxolanes in Organic Solvents
In this process the cyclic acetals 4,5‐dipropyl‐1,3‐dioxolane and 4,5‐dibutyl‐1,3‐dioxolane are synthesized by one enzymatic and two organometallic steps in a single organic solvent. Starting from aldehydes, the obtained 2‐hydroxy ketones are further hydrogenated and converted into dioxolanes using H₂ and CO₂, with formic acid or polyoxymethylene as ...
Maria Nicolas+8 more
wiley +1 more source
Critical Infrastructure Protection: having SIEM technology cope with network heterogeneity [PDF]
Coordinated and targeted cyber-attacks to Critical Infrastructures (CIs) are becoming more and more frequent and sophisticated. This is due to: i) the recent technology shift towards Commercial Off-The-Shelf (COTS) products, and ii) new economical and socio-political motivations.
arxiv