Advertisement

Topics

PubMed Journals Articles About "Foreground Security" RSS

16:35 EDT 20th August 2018 | BioPortfolio

Foreground Security PubMed articles on BioPortfolio. Our PubMed references draw on over 21 million records from the medical literature. Here you can see the latest Foreground Security articles that have been published worldwide.

More Information about "Foreground Security" on BioPortfolio

We have published hundreds of Foreground Security news stories on BioPortfolio along with dozens of Foreground Security Clinical Trials and PubMed Articles about Foreground Security for you to read. In addition to the medical data, news and clinical trials, BioPortfolio also has a large collection of Foreground Security Companies in our database. You can also find out about relevant Foreground Security Drugs and Medications on this site too.

Showing "Foreground Security" PubMed Articles 1–25 of 475

Utilising a multi-item questionnaire to assess household food security in Australia.

Currently, two food sufficiency questions are utilised as a proxy measure of national food security status in Australia. These questions do not capture all dimensions of food security and have been attributed with underreporting of the problem. The purpose of this study was to investigate food security using the short form of the US Household Food Security Survey Module (HFSSM) within an Australian context; and explore the relationship between food security status and multiple socio-demographic variables.


Attachment security priming: a systematic review.

Attachment security priming has been used to shed light on the cognitive processes related to attachment internal working models as well as the cognitive substrates of people's attachment-related affect and behavior. Security primes activate a sense of attachment security by making mental representations in one's memory more accessible and salient. In the current paper, we report on a qualitative synthesis of 20 studies published in the last two years to determine the effects of security priming. We found t...

Background suppression and its relation to foreground processing of speech versus non-speech streams.

Since sound perception takes place against a background with a certain amount of noise, both speech and non-speech processing involve extraction of target signals and suppression of background noise. Previous works on early processing of speech phonemes largely neglected how background noise is encoded and suppressed. This study aimed to fill in this gap. We adopted an oddball paradigm where speech (vowels) or non-speech stimuli (complex tones) were presented with or without a background of amplitude-modula...


Robust Foreground Estimation via Structured Gaussian Scale Mixture Modeling.

Recovering the background and foreground parts from video frames has important applications in video surveillance. Under the assumption that the background parts are stationary and the foreground are sparse, most of existing methods are based on the framework of robust principal component analysis (RPCA), i.e., modeling the background and foreground parts as a low-rank and sparse matrices, respectively. However, in realistic complex scenarios, the conventional norm sparse regularizer often fails to well cha...

Walking a security tightrope: relationship-induced changes in attachment security.

Little is known about how romantic relationships enhance long-term attachment security. Change is likely to involve revising deep-seated beliefs and expectations regarding one's self as being unworthy and others as untrustworthy (insecure internal working models). When individuals become anxious, partners can provide immediate reassurance, but the path to long-term security may hinge on addressing the individual's insecure self-perceptions; when individuals become avoidant, partners can 'soften' interaction...

Food Security and its Related Factors in the Rural Households of Bam City in Iran: A Logistic Regression Model Approach.

Awareness of the food security status of rural population and its influencing factors is essential for policy makers, public health institutions and the development of rural programs. This descriptive cross-sectional study was conducted in 2017 on 384 rural households in Bam city. The data was collected via the 6-item USDA questionnaire. Logistic regression was used to determine the relationship between social, economic and health factors with food security. The results indicate that 35.67% of households ha...

Information technology as a tool for the Italian Institute of Social Security (INPS) in the management of social security and civil disability: Pro and cons.

We examine, from a medical-legal perspective, the pro and cons of the information technology procedures that the Italian Institute of Social Security (INPS) has implemented to manage the provision of social disability assistance, meaning that separate from the payment of pension contributions, being welfare, anchored to an administrative requirement by way of the compulsory payment of a minimum social security contribution.

Updating energy security and environmental policy: Energy security theories revisited.

The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and...

Displacement of social security and social disprotection in Brazil.

After 30 years in force, CF-88 must be salvaged and commemorated but also evaluated in relation to how much social and political resistance it acquired in the execution of its determinations. These determinations not only conflict with those of the dictatorial period preceding it but were also shown to be minimally attractive to neoliberal forces in Brazil in the late 1980s and early 1990s and are now widely recognized as conservative. One of the main recommendations of CF-88 - the subject of this article -...

Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.

The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the conf...

Synthesizing water quality indicators from standardized geospatial information to remedy water security challenges: A review.

Water is vital not only for food, energy and sanitation but also for ecosystem functioning, human health, socio-economic progress and poverty reduction. Water security exists when all people have physical and economical access to sufficient, safe, and clean water that meets basic needs. However, water security is threatened by growing human population, episodic environmental disasters, indiscriminate land management practices, contaminants, and escalation in geopolitical conflicts.

What is the Best Surgeon's Knot ? Evaluation of the Security of the Different Laparoscopic Knot Combinations.

To investigate the security of various knot combinations in laparoscopic surgery.

Public Health Communication: A Vital Component of Health Security.

Automated image segmentation-assisted flattening of atomic force microscopy images.

Atomic force microscopy (AFM) images normally exhibit various artifacts. As a result, image flattening is required prior to image analysis. To obtain optimized flattening results, foreground features are generally manually excluded using rectangular masks in image flattening, which is time consuming and inaccurate. In this study, a two-step scheme was proposed to achieve optimized image flattening in an automated manner. In the first step, the convex and concave features in the foreground were automatically...

The impact of ART initiation on household food security over time.

While evidence suggests that adequate nutrition contributes to the efficacy of ART, the potential causal impact of ART initiation on household food security has not been thoroughly examined. In this study, we present some of the first causal evidence of the impact of ART initiation on household food security. We employ a quasi-experimental design, regression discontinuity, over 5540 individuals from an ongoing population cohort study in KwaZulu-Natal, South Africa, by utilizing the CD4 count-based ART eligi...

Perceived attachment security to parents and peer victimization: Does adolescent's aggressive behaviour make a difference?

Peer victimization is one of the most prominent problems during adolescence. Research has distinguished aggressive and non-aggressive victims; however, there are still significant drawbacks in understanding the social and family functioning of these different groups of victimized adolescents. This study aimed to compare social behavior and perceived attachment security to parents of Portuguese adolescents, classified as aggressive victims, non-aggressive victims and non-victims. The sample consisted of 222 ...

Impact of Hajj on Global Health Security.

With the human society transfers from scattered pieces to a society as a whole and the advent of the aviation era, the occurrence of infectious diseases and their diffusion have led to international health security issues. As the world's largest and irrevocable annual transnational religious movement, the Hajj and its connection with health security concerns have caught attention since the ancient times, because a huge population from all over the world gathers in the holy city of Mecca, which has tropical ...

A Pilot Examination of the Methods Used to Counteract Insider Threat Security Risks Associated with the Use of Radioactive Materials in the Research and Clinical Setting.

While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their ...

Research on Experimental Model of Security Assessment of DEHP Migration from PVC-Tubes Medical Devices.

As we all know, DEHP is seriously harmful to human health and consequently has been acquired critical attention. DEHP is able to migrate from PVC medical devices for the non-chemically bound to PVC, thus contact with user and patient. The DEHP migration is influenced by various parameters. In order to assess the security of PVC-tubes medical devices scientifically of DEHP migration, we develop an experimental model by analyzing the parameters comprehensively and systematically, taking into account the clini...

The potential impact of multidimesional geriatric assessment in the social security system.

To evaluate the efficacy of multidimensional geriatric assessment (MGA/CGA) in patients over 65 years old in predicting the release of the accompaniment allowance (AA) indemnity by a Local Medico-Legal Committee (MLC-NHS) and by the National Institute of Social Security Committee (MLC-INPS).

Assessing national nutrition security: The UK reliance on imports to meet population energy and nutrient recommendations.

Nutrition security describes the adequacy of the food supply to meet not only energy but also macronutrient and micronutrient requirements for the population. The aim of this study was to develop a method to assess trends in national nutrition security and the contribution of imports to nutrition security, using the UK as a case study. Food supply data from FAO food balance sheets and national food composition tables were used to estimate the nutrient content of domestically produced food, imported food and...

An improved anonymous authentication scheme for roaming in ubiquitous networks.

With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low co...

A Background Modeling and Foreground Detection Algorithm Using Scaling Coefficients Defined with a Color Model Called Lightness-Red-Green-Blue.

This paper presents an algorithm for background modeling and foreground detection that uses scaling coefficients, which are defined with a new color model called LRGB (Lightness-Red-Green-Blue). They are employed to compare two images by finding pixels with scaled lightness. Three backgrounds are used: verified background with pixels that are considered as background, testing background with pixels that are tested several times to check if they belong to the background, and final background that is a combin...

Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks.

Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security ...

A Lightweight Protocol for Secure Video Streaming.

The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy...


Advertisement
Quick Search
Advertisement
Advertisement