نتایج جستجو برای: protected
تعداد نتایج: 55122 فیلتر نتایج به سال:
Study objective: To propose a definition of health equity to guide operationalisation and measurement, and to discuss the practical importance of clarity in defining this concept. Design: Conceptual discussion. Setting, Patients/Participants, and Main results: not applicable. Conclusions: For the purposes of measurement and operationalisation, equity in health is the absence of systematic dispa...
Wireless networks are commonly used by people. Market devices are equipped with the new security standard 802.11i. The standard announced in the middle of 2004 is commonly used to protect WLANs. Currently we can find the information that vulnerabilities were found in that standard. Then a question arises: Are WLANs compromised again? The article describes vulnerabilities which were discovered i...
The objective of this paper is to evaluate the effect of Plant Variety Protection (PVP) on the productive merit ⁄yield increases of US seed varieties. As an example, we use wheat varieties, which are and have been available as both protected and unprotected under PVP from both the public and private sectors. We find evidence that PVP has contributed to the genetic improvement of wheat, using va...
The general consensus is that in order to reproduce the observed solar p-mode oscillation frequencies, turbulence should be included in solar models. However, until now there has not been any well-tested efficient method to incorporate turbulence into solar modeling. We present here two methods to include turbulence in solar modeling within the framework of the mixing length theory, using the t...
Workflow management systems (WFMSs) need to adapt dynamic process modifications. In current WFMSs the scope of dynamic modifications is mainly focused on control flow, while other dynamic aspects are neglected. In this paper an approach to adapt dynamic modification in workflow participant assignment (WPA) is presented. The approach extends the meaning of WPA that is proposed by the Workflow Ma...
To date, sharing patient health information across multiple institutions while maintaining patient privacy remains a dilemma. I introduce a secure health information sharing system, simply referred to as SHARE, for generating multi-center health studies, capable of securely sharing patient information across multiple clinical institutions. SHARE is a web-based computer system that automates mos...
*Bureau of Old-Age and Survivors I n surance, Analysis Division. I N I T S t en th annual report the Social Security Board declared t h a t "the adequacy of an insurance system must be judged by the extent to w h i c h its benefits, i n conjunction w i t h i n dividual resources, provide a reasonable degree of security for the large major i ty of beneficiaries." 1 To apply this cri terion of ad...
We reconstruct the power spectrum of primordial curvature perturbations by applying a well-validated non-parametric technique employing Tikhonov regularisation to the first data release from the Planck satellite. To improve the reconstruction on small spatial scales we include data from the ground-based ACT and SPT experiments, the WiggleZ galaxy redshift survey, the CFHTLenS tomographic weak l...
We present the first lensing mass measurements of Sunyaev-Zel’dovich (SZ) selected clusters. Using optical imaging from the Southern Cosmology Survey (SCS), we present weak lensing masses for three clusters selected by their SZ emission in the South Pole Telescope survey (SPT). We confirm that the SZ selection procedure is successful in detecting mass concentrations. We also study 38 optically-...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید