Results 81 to 90 of about 53,786 (213)

Exploring Agrivoltaics: A Pathway to Climate‐Resilient and Productive Land Use in Northern Bangladesh

open access: yesPlant-Environment Interactions, Volume 7, Issue 3, June 2026.
ABSTRACT The growing demand for food, energy, and water in resource‐constrained regions intensifies land‐use conflicts, where solar photovoltaic (PV) expansion often competes with agriculture. Agrivoltaics, the co‐location of crop cultivation beneath PV systems, offers a potential dual‐use solution to enhance land efficiency. This study presents one of
Shahana Afrose Chowdhury   +4 more
wiley   +1 more source

Detecting Flood-based Attacks against SIP Proxy Servers and Clients using Engineered Feature Sets

open access: yesInternational Journal of Information and Communication Technology Research, 2016
Session Initiation Protocol (SIP) is the main signaling protocol of the next generation networks. The security issues of SIP-based entities (i.e. proxy servers and clients) have a direct impact on the perceived quality of experience of end users in ...
Hassan Asgharian   +2 more
doaj  

Food and energy security sustainable intensification special issue editorial

open access: yesFood and Energy Security, 2019
In November 2017 the Association of Applied Biologists and the Sustainable Intensification Research Platform (SIP) held a conference on Sustainable Intensification (SI) at Rothamsted Research.
Robert Carlton
doaj   +1 more source

Eliminating Uncorrected Refractive Error by 2030: A Sequential Framework for Evidence‐Based Action in LMICs

open access: yesPublic Health Challenges, Volume 5, Issue 2, June 2026.
ABSTRACT Uncorrected refractive error (URE) is a leading global cause of vision impairment (VI) and remains a critical, yet under‐addressed challenge, disproportionately affecting low‐ and middle‐income countries (LMICs). In response to the substantial unmet need for refractive care, the 74th World Health Assembly (WHA) established the first global ...
Indra Prasad Sharma   +3 more
wiley   +1 more source

Desktop application for crypto-protected voice communication

open access: yesVojnotehnički Glasnik
Introduction/purpose: All data exchanged over the Internet as well as other computer networks should be considered exposed to various types of security threats.
Stefan M. Ivanović   +4 more
doaj   +1 more source

Assessing Value and Questioning Self‐Worth in Educational Migration: Indonesian University Students in Singapore

open access: yesAnthropology &Education Quarterly, Volume 57, Issue 2, June 2026.
ABSTRACT This article examines the education trajectories of Indonesian students attending university in Singapore. These students and their parents consider a project of educational migration to Singapore as a proven pathway toward their varied aspirations.
Erica M. Larson
wiley   +1 more source

An Efficient Mutual Authentication and Fractional Lyrebird Optimization With Deep Learning–Based SIP-Based DRDoS Attack Detection

open access: yesInternational Journal of Distributed Sensor Networks
Over the past decades, Session Initiation Protocol (SIP) has been commonly utilized in signaling protocol to control and signal multimedia communication sessions for providing various services to users.
V. Sreenivasulu, C. V. Ravikumar
doaj   +1 more source

Bruteforce Attacks Blocking Solution on Embedded SIP Communication Server

open access: yesCommunications, 2013
This article deals with embedded SIP communication server with an easy integration into the computer network based on open source solutions and its effective defense against the most frequent attack in the present - Denial of Service.
Filip Rezac   +5 more
doaj   +1 more source

Oral Health Interventions to Improve Access in Rural Areas of High‐Income Countries: A Mixed Methods Systematic Review

open access: yesCommunity Dentistry and Oral Epidemiology, Volume 54, Issue 3, Page 273-284, June 2026.
ABSTRACT Objectives The aim of this mixed methods systematic review was to identify oral health interventions in rural areas of high‐income countries and synthesise the evidence on how access is addressed. Methods Searches were conducted in Cochrane, CINAHL, Dentistry and Oral Sciences Source, PsycINFO and PubMed, with the last search in January ...
Amanda Kenny   +6 more
wiley   +1 more source

Automatic Classification of Attacks on IP Telephony

open access: yesAdvances in Electrical and Electronic Engineering, 2013
This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network.
Jakub Safarik   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy