Search results for "access"

showing 10 items of 1232 documents

Zmiana roli biblioteki w strukturze uczelni na przykładzie nowych obszarów działalności Biblioteki Uniwersytetu Opolskiego

2022

The entry into force of Act 2.0 did not change one fact – the library still remains an important part of the university’s micro and macro academic world, although it was formally noticed by the legislator to a small extent. However, the dynamically changing academic reality forced the necessity of rapid adaptation of libraries to new roles and functions, which were assigned to them for various reasons. The article compares the functions of the scientific library resulting from the current legislation with the present-day activities of the academic library. On the example of the activities of the Library of the University of Opole, the implemented organizational changes in its operation resu…

biblioteki szkół wyższychopen access to publicationsuniversity librariesUstawa 2.0Act 2.0struktura i organizacja szkół wyższychotwarty dostęp do publikacjistructure and organization of universities
researchProduct

I Segni Raccontano: La lingua Italiana dei Segni tra esperienze, strumenti e metodologie

2009

La LIS (Lingua dei Segni Italiana) è una delle tante lingue dei segni diffuse nel mondo su cui esiste ormai una considerevole letteratura, ma che stenta a trovare riconoscimenti e spazi, non solo giuridici, ma nello stesso immaginario collettivo. Questo sia in virtù dell'inferiorità di status che il gesto ha assunto rispetto alla parola nel sistema concettuale occidentale, sia perché non viene "trattata" da lingua ma come oggetto rispetto al quale assumere posizioni pro o contro. Dopo I segni parlano (Angeli, 2008), incentrato su questioni di interesse linguistico, un ulteriore volume dal titolo emblematico, I segni raccontano, dimostra come la LIS non sia solo la lingua "delle persone sord…

bilinguismo educazione comunità dei sordi accessibilità interpretariato assistenti alla comunicazione identitàSettore M-PED/03 - Didattica E Pedagogia Speciale
researchProduct

Evaluation of the Bioaccessibility of Antioxidant Bioactive Compounds and Minerals of Four Genotypes of

2019

Microgreens constitute an emerging class of fresh, healthy foods due to their nutritional composition. In this study the content of minerals and antioxidant bioactive compounds, and for the first time bioaccessibility, were evaluated in broccoli (Brassica oleracea L. var. italica Plenck), green curly kale (Brassica oleracea var. sabellica L.), red mustard (Brassica juncea (L.) Czern.) and radish (Raphanus sativus L.) hydroponic microgreens. Macro- (K, Ca, Mg) and oligo-elements (Fe, Zn), ascorbic acid, total soluble polyphenols, total carotenoids, total anthocyanins, total isothiocyanates and total antioxidant capacity (Trolox Equivalent Antioxidant Capacity and Oxygen Radical Absorbance Ca…

bioactive compoundsantioxidantsmicrogreensBrassicaceaefood and beveragesmineralsArticlebioaccessibilityFoods (Basel, Switzerland)
researchProduct

Composition and biological activities of the essential oil from a Sicilian accession of Prangos ferulacea (L.) Lindl

2019

Prangos ferulacea (L.) Lindl. (Fam. Apiaceae), is an orophilous species of eastern Mediterranean and western Asia which possesses several biological properties, which are worthy of exploitation in different fields. With the aim to provide new insights into the phytochemistry and pharmacology of this species, a local accession growing in Sicily (South Italy) was investigated as well. Notably, the P. ferulacea essential oil chemical composition and the antioxidant, anti-acetylcholinesterase (AChE) and cytotoxic activities have been studied. This analysis allowed to identify a new chemotype and to report good biological results for this oil. © 2019 Informa UK Limited, trading as Taylor & F…

biological activitiePrangos ferulaceaPlant ScienceBiology01 natural sciencesBiochemistryAccessionessential oilAnalytical Chemistrylaw.inventionlawBiological propertyBotanyEssential oilPrangos ferulaceaApiaceae010405 organic chemistryOrganic ChemistryWestern asiabiology.organism_classificationlanguage.human_language0104 chemical sciences010404 medicinal & biomolecular chemistrylanguageComposition (visual arts)SicilianApiaceae
researchProduct

The role of mycotoxins in neurodegenerative diseases: current state of the art and future perspectives of research

2021

Abstract Mycotoxins are fungal metabolites that can cause various diseases in humans and animals. The adverse health effects of mycotoxins such as liver failure, immune deficiency, and cancer are well-described. However, growing evidence suggests an additional link between these fungal metabolites and neurodegenerative diseases. Despite the wealth of these initial reports, reliable conclusions are still constrained by limited access to human patients and availability of suitable cell or animal model systems. This review summarizes knowledge on mycotoxins associated with neurodegenerative diseases and the assumed underlying pathophysiological mechanisms. The limitations of the common in vivo…

business.industryClinical BiochemistryFungiLiver failureNeurotoxicityfood and beveragesNeurodegenerative DiseasesMycotoxinsBioinformaticsmedicine.diseaseBiochemistryLimited accesschemistry.chemical_compoundAnimal modelchemistryAdverse health effectAnimalsHumansMedicinebusinessMycotoxinMolecular BiologyBiological Chemistry
researchProduct

Trusted Computing and DRM

2015

Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of attacks or very complex such as machine learning and detecting anomalies in the usage pattern of the remote user). Another branch of attacks requires protection by the system owner against internal users. …

business.industryComputer scienceCloud computingTrusted ComputingAttack surfaceConditional accessComputer securitycomputer.software_genreDigital mediaDisk encryptionDirect Anonymous AttestationTrusted Platform Modulebusinesscomputer
researchProduct

Review of web-based information security threats in smart grid

2017

The penetration of digital devices in Smart Grid has created a big security issue. OWASP is an online community of security professionals that identifies the most critical web application security risk in IT domain. Smart Grid also uses client-server based web-applications to collect and disseminate information. Therefore, Smart Grid network is analogous to IT network and similar kind of risk exists in the Smart Grid. This paper review the security risk in Smart Grid domain with reference to OWASP study. The Smart Grid security is more biased towards vulnerabilities associated with a machine to machine communication. Methodology to minimise the risk of attack is also discussed in this resea…

business.industryComputer scienceCross-site scriptingAccess controlInformation securityComputer securitycomputer.software_genreWeb application securityMachine to machineSmart gridWeb applicationbusinesscomputerDissemination2017 7th International Conference on Power Systems (ICPS)
researchProduct

Application Layer FEC for Mobile TV Delivery in IP Datacast Over DVB-H Systems

2009

In this paper we investigate the potential gain that can be obtained in DVB-H using application layer forward error correction (AL-FEC) to perform a multi-burst protection of the transmission for improving the reception of streaming services for mobile terminals. Compared to the conventional approach with link layer multi protocol encapsulation FEC (MPE-FEC), this technique allows to increase the robustness of the DVB-H transmission not only as a function of the capacity devoted for error repair (FEC overhead), but also as a function of the number of bursts jointly encoded. The main drawback of this approach is an increase of the network latency, that can be translated into a larger service…

business.industryComputer scienceDVB-HMobile televisionReal-time computingData_CODINGANDINFORMATIONTHEORYApplication layerlaw.inventionlawInternet ProtocolDigital Video BroadcastingMedia TechnologyLink layerForward error correctionElectrical and Electronic EngineeringbusinessAccess timeComputer networkIEEE Transactions on Broadcasting
researchProduct

Joint routing and per-flow fairness in wireless multihop networks

2008

In wireless multihop networks communication between two end-nodes is carried out by hopping over multiple short wireless links. Traditional CSMA/CA based media access control does not work satisfactory in a multihop scenario, since an intended target of a communication may be subject to mutual interference imposed by concurrent transmissions from nodes which cannot directly sense each other, causing unfair throughput allocation. Although TDMA seems to be a more promising solution, careful transmission scheduling is needed in order to achieve error-free communication and fairness. In our previous work, a TDMA scheduling algorithm has been proposed that schedules the transmissions in a fair m…

business.industryComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTime division multiple accessData_CODINGANDINFORMATIONTHEORYLoad balancing (computing)Network topologyScheduling (computing)WLANroutingMedia access controlWirelessMaximum throughput schedulingbusinessWireless sensor networkComputer network
researchProduct

Towards Risk-aware Access Control Framework for Healthcare Information Sharing

2018

business.industryComputer scienceInformation sharingInternet privacyHealth care0202 electrical engineering electronic engineering information engineering020206 networking & telecommunications020201 artificial intelligence & image processingAccess control02 engineering and technologybusinessProceedings of the 4th International Conference on Information Systems Security and Privacy
researchProduct