Results 31 to 40 of about 62,486 (134)
Data Sharing and Information Security Under the Software‐Defined Network
To sum up, the big data sharing platform based on SDN can quickly and effectively respond to the data requests of end users, and the information security protection system can detect the platform in real time to prevent it from being intruded and damaged, which largely protects the information security of the platform." cd_value_code="text Abstract ...
Jianqiao Sheng +5 more
wiley +1 more source
ABSTRACT Family financial assistance with home ownership has attracted significant scholarly attention in recent years. However, the role of culture and ethnicity, transnational ties, and migration in this practice remains significantly under‐addressed.
Julia Cook
wiley +1 more source
Applying Lessons from Cyber Attacks on Ukrainian Infrastructures to Secure Gateways onto the Industrial Internet of Things [PDF]
Previous generations of safety-related industrial control systems were ‘air gapped’. In other words, process control components including Programmable Logic Controllers (PLCs) and smart sensor/actuators were disconnected and isolated from local or wide
Evangelopoulou, Maria +2 more
core
ABSTRACT Coffee producers deal with uncertainty due to high volatility in coffee prices. To navigate these challenges, producers must balance the tradeoff between higher yield and better quality utilising heterogeneous technologies, such as intensive production methods and environmental management practices.
Orlando Rodríguez +2 more
wiley +1 more source
TechNews digests: Jan - Mar 2010 [PDF]
TechNews is a technology, news and analysis service aimed at anyone in the education sector keen to stay informed about technology developments, trends and issues. TechNews focuses on emerging technologies and other technology news.
core
Abstract Research Summary This qualitative study examines how frontline police officers in British Columbia experienced and adapted to Canada's first formal drug decriminalization policy 1 year after implementation. Drawing on 30 semi‐structured interviews and using thematic analysis with a policy alienation and street‐level bureaucracy lens, we ...
Sarah Ferencz +2 more
wiley +1 more source
Abstract The need for comprehensive equine welfare assessments has become particularly evident amid ongoing debates about the social licence to operate in equestrian sports. During exercise, multiple physiological systems, principally the cardiovascular, respiratory, muscular, thermoregulatory, endocrine, and locomotory systems, undergo complex ...
Rhana Mackie Aarts +3 more
wiley +1 more source
ABSTRACT The American Lobster (Homarus americanus) is the target of an extensive fishery in the Northwest Atlantic, yet there is no systematic method for evaluating relative performance of baits for the fishery. We used Baited Remote Underwater Video (BRUV) to assess lobster attraction to commercial baits versus natural prey.
L. Grace Walls +5 more
wiley +1 more source
Secure Electronic Cards in Public Services [PDF]
The paper presents the electronic wallet solution implemented within a GSM SIM technology for accessing public services. The solution is implemented in the medical field to provide information on the patient's medical history and payment for private ...
Catalin BOJA +3 more
core
Digital Identity Wallets: A Guide to the EU’s New Identity Model
ABSTRACT By 2026, the European Union will introduce digital identity wallets to its citizens, residents, and organisations. These wallets will have far‐reaching implications for how public and private sector organisations interact with their users—some evident, others less.
Andre Kudra +5 more
wiley +1 more source

