Results 81 to 90 of about 53,786 (213)
ABSTRACT The growing demand for food, energy, and water in resource‐constrained regions intensifies land‐use conflicts, where solar photovoltaic (PV) expansion often competes with agriculture. Agrivoltaics, the co‐location of crop cultivation beneath PV systems, offers a potential dual‐use solution to enhance land efficiency. This study presents one of
Shahana Afrose Chowdhury +4 more
wiley +1 more source
Detecting Flood-based Attacks against SIP Proxy Servers and Clients using Engineered Feature Sets
Session Initiation Protocol (SIP) is the main signaling protocol of the next generation networks. The security issues of SIP-based entities (i.e. proxy servers and clients) have a direct impact on the perceived quality of experience of end users in ...
Hassan Asgharian +2 more
doaj
Food and energy security sustainable intensification special issue editorial
In November 2017 the Association of Applied Biologists and the Sustainable Intensification Research Platform (SIP) held a conference on Sustainable Intensification (SI) at Rothamsted Research.
Robert Carlton
doaj +1 more source
ABSTRACT Uncorrected refractive error (URE) is a leading global cause of vision impairment (VI) and remains a critical, yet under‐addressed challenge, disproportionately affecting low‐ and middle‐income countries (LMICs). In response to the substantial unmet need for refractive care, the 74th World Health Assembly (WHA) established the first global ...
Indra Prasad Sharma +3 more
wiley +1 more source
Desktop application for crypto-protected voice communication
Introduction/purpose: All data exchanged over the Internet as well as other computer networks should be considered exposed to various types of security threats.
Stefan M. Ivanović +4 more
doaj +1 more source
ABSTRACT This article examines the education trajectories of Indonesian students attending university in Singapore. These students and their parents consider a project of educational migration to Singapore as a proven pathway toward their varied aspirations.
Erica M. Larson
wiley +1 more source
Over the past decades, Session Initiation Protocol (SIP) has been commonly utilized in signaling protocol to control and signal multimedia communication sessions for providing various services to users.
V. Sreenivasulu, C. V. Ravikumar
doaj +1 more source
Bruteforce Attacks Blocking Solution on Embedded SIP Communication Server
This article deals with embedded SIP communication server with an easy integration into the computer network based on open source solutions and its effective defense against the most frequent attack in the present - Denial of Service.
Filip Rezac +5 more
doaj +1 more source
ABSTRACT Objectives The aim of this mixed methods systematic review was to identify oral health interventions in rural areas of high‐income countries and synthesise the evidence on how access is addressed. Methods Searches were conducted in Cochrane, CINAHL, Dentistry and Oral Sciences Source, PsycINFO and PubMed, with the last search in January ...
Amanda Kenny +6 more
wiley +1 more source
Automatic Classification of Attacks on IP Telephony
This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network.
Jakub Safarik +4 more
doaj +1 more source

