Results 61 to 70 of about 2,411,901 (357)
Security architectures in mobile integrated pay-TV [PDF]
This paper presents the design and describes the advantage of the state-of-the-art Mobile Integrated Conditional Access System (MICAS) concerning interoperability, personalisation, security and operational costs in Pay-TV systems.
Birch, N+4 more
core
Towards Understanding and Demystifying Bitcoin Mixing Services [PDF]
One reason for the popularity of Bitcoin is due to its anonymity. Although several heuristics have been used to break the anonymity, new approaches are proposed to enhance its anonymity at the same time. One of them is the mixing service. Unfortunately, mixing services have been abused to facilitate criminal activities, e.g., money laundering. As such,
arxiv +1 more source
White Christian Nationalism: Adult Education and Threats to Democracy
ABSTRACT Adult education has a historical and ongoing commitment to fostering democratic relationships, demonstrated by the tendency of adult education to be called upon when social change and realignment are most desirable. This article considers the philosophical and pragmatic possibilities for adult education at this moment, when White Christian ...
Ralf St. Clair, Lyn Tett, Rob Black
wiley +1 more source
SAMI: Service-Based Arbitrated Multi-Tier Infrastructure for Mobile Cloud Computing [PDF]
Mobile Cloud Computing (MCC) is the state-ofthe- art mobile computing technology aims to alleviate resource poverty of mobile devices. Recently, several approaches and techniques have been proposed to augment mobile devices by leveraging cloud computing.
Abolfazli, Saeid+3 more
core +2 more sources
Abstract Purpose Breast cancer is a neoplastic disease with high prevalence among women. Radiotherapy is one of the principal treatment modalities for this disease, but it poses significant challenges. This study aimed to compare and evaluate the technical and dosimetric performance of conventional C‐arm linac systems and a new design, Halcyon, in the ...
Mustafa Çağlar+8 more
wiley +1 more source
The Concept of the Process of Qualification to State Security Service
The aim of the study is to present the concept of the process of qualification to service in State Security Service, which was established on February 1, 2018 in lieu of the Government Protection Bureau. All requirements for candidates participating in the recruitment process to State Security Service are set out by relevant laws and ordinances of the ...
openaire +2 more sources
State security service against Cardinal Karol Wojtyla [PDF]
On the example of the history of persecution of Cardinal Karol Wojtyla the auther discusses the forms and methods of the Polish security service’s struggle against the Catholic Church.
Filippov Boris
doaj
Abstract Purpose To investigate the feasibility of adapting a commercial prostate biopsy system for transrectal ultrasound (TRUS)‐guided hybrid gynecological (GYN) high‐dose‐rate (HDR) brachytherapy (BT). Leveraging 3D‐TRUS and MR image fusion, the prototype system aims to improve real‐time needle placement accuracy.
Lindsey H. Bloom+8 more
wiley +1 more source
POLARIZATION SELECTOR ON WAVEGUIDES PARTIALLY FILLED BY DIELECTRIC
In this article, a polarization selector, which based on waveguides partially filled by dielectric has been developed and investigated. An analysis of the designs of polarization selectors on empty waveguides was carried out. The developed design of the
Vitaly Pochernyaev+2 more
doaj +1 more source
Dynamic and Application-Aware Provisioning of Chained Virtual Security Network Functions [PDF]
A promising area of application for Network Function Virtualization is in network security, where chains of Virtual Security Network Functions (VSNFs), i.e., security-specific virtual functions such as firewalls or Intrusion Prevention Systems, can be dynamically created and configured to inspect, filter or monitor the network traffic.
arxiv +1 more source