Advertisement

Topics

PubMed Journals Articles About "Foreground Security" RSS

10:25 EDT 21st October 2018 | BioPortfolio

Foreground Security PubMed articles on BioPortfolio. Our PubMed references draw on over 21 million records from the medical literature. Here you can see the latest Foreground Security articles that have been published worldwide.

More Information about "Foreground Security" on BioPortfolio

We have published hundreds of Foreground Security news stories on BioPortfolio along with dozens of Foreground Security Clinical Trials and PubMed Articles about Foreground Security for you to read. In addition to the medical data, news and clinical trials, BioPortfolio also has a large collection of Foreground Security Companies in our database. You can also find out about relevant Foreground Security Drugs and Medications on this site too.

Showing "Foreground Security" PubMed Articles 1–25 of 471

Utilising a multi-item questionnaire to assess household food security in Australia.

Currently, two food sufficiency questions are utilised as a proxy measure of national food security status in Australia. These questions do not capture all dimensions of food security and have been attributed with underreporting of the problem. The purpose of this study was to investigate food security using the short form of the US Household Food Security Survey Module (HFSSM) within an Australian context; and explore the relationship between food security status and multiple socio-demographic variables.


Attachment security priming: a systematic review.

Attachment security priming has been used to shed light on the cognitive processes related to attachment internal working models as well as the cognitive substrates of people's attachment-related affect and behavior. Security primes activate a sense of attachment security by making mental representations in one's memory more accessible and salient. In the current paper, we report on a qualitative synthesis of 20 studies published in the last two years to determine the effects of security priming. We found t...

Emotional security theory: An application to sibling bereavement.

There is a need for guiding theory to understand the experiences and outcomes of bereaved siblings, particularly from a family systems framework. The present study investigated the relevance of emotional security theory in a sample of 72 young adults who experienced sibling bereavement. We investigated (1) whether perceptions of prolonged parental grief predicted key aspects of emotional security (disengagement, preoccupation, and security), and (2) whether emotional security mediated a relation between per...


Walking a security tightrope: relationship-induced changes in attachment security.

Little is known about how romantic relationships enhance long-term attachment security. Change is likely to involve revising deep-seated beliefs and expectations regarding one's self as being unworthy and others as untrustworthy (insecure internal working models). When individuals become anxious, partners can provide immediate reassurance, but the path to long-term security may hinge on addressing the individual's insecure self-perceptions; when individuals become avoidant, partners can 'soften' interaction...

Robust Foreground Estimation via Structured Gaussian Scale Mixture Modeling.

Recovering the background and foreground parts from video frames has important applications in video surveillance. Under the assumption that the background parts are stationary and the foreground are sparse, most of existing methods are based on the framework of robust principal component analysis (RPCA), i.e., modeling the background and foreground parts as a low-rank and sparse matrices, respectively. However, in realistic complex scenarios, the conventional norm sparse regularizer often fails to well cha...

Food Security and its Related Factors in the Rural Households of Bam City in Iran: A Logistic Regression Model Approach.

Awareness of the food security status of rural population and its influencing factors is essential for policy makers, public health institutions and the development of rural programs. This descriptive cross-sectional study was conducted in 2017 on 384 rural households in Bam city. The data was collected via the 6-item USDA questionnaire. Logistic regression was used to determine the relationship between social, economic and health factors with food security. The results indicate that 35.67% of households ha...

Public social security burden of musculoskeletal diseases in Brasil-Descriptive study.

To present data on the social security burden of diseases of the musculoskeletal system and connective tissue (DSOTC) in Brasil in 2014, and evolution of these social security expenditures between 2009 and 2014.

Updating energy security and environmental policy: Energy security theories revisited.

The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and...

Displacement of social security and social disprotection in Brazil.

After 30 years in force, CF-88 must be salvaged and commemorated but also evaluated in relation to how much social and political resistance it acquired in the execution of its determinations. These determinations not only conflict with those of the dictatorial period preceding it but were also shown to be minimally attractive to neoliberal forces in Brazil in the late 1980s and early 1990s and are now widely recognized as conservative. One of the main recommendations of CF-88 - the subject of this article -...

Synthesizing water quality indicators from standardized geospatial information to remedy water security challenges: A review.

Water is vital not only for food, energy and sanitation but also for ecosystem functioning, human health, socio-economic progress and poverty reduction. Water security exists when all people have physical and economical access to sufficient, safe, and clean water that meets basic needs. However, water security is threatened by growing human population, episodic environmental disasters, indiscriminate land management practices, contaminants, and escalation in geopolitical conflicts.

The Experience of Medical Communication in Adults with Acute Leukemia: Impact of Age and Attachment Security.

Healthcare providers' (HCPs) communication with cancer patients provides both information and support. Younger patient age and greater difficulty accepting support (attachment security) have been linked to poorer communication experiences with HCPs. The present secondary data analysis examined the impact of age group and attachment security on perceived communication problems with HCPs in adults with acute leukemia (AL).

Public Health Communication: A Vital Component of Health Security.

Security and efficiency enhancement of an anonymous three-party password-authenticated key agreement using extended chaotic maps.

Recently, Lu et al. claimed that Xie et al.'s three-party password-authenticated key agreement protocol (3PAKA) using chaotic maps has three security vulnerabilities; in particular, it cannot resist offline password guessing attack, Bergamo et al.'s attack and impersonation attack, and then they proposed an improved protocol. However, we demonstrate that Lu et al.'s attacks on Xie et al.'s scheme are unworkable, and their improved protocol is insecure against stolen-verifier attack and off-line password gue...

Perceived attachment security to parents and peer victimization: Does adolescent's aggressive behaviour make a difference?

Peer victimization is one of the most prominent problems during adolescence. Research has distinguished aggressive and non-aggressive victims; however, there are still significant drawbacks in understanding the social and family functioning of these different groups of victimized adolescents. This study aimed to compare social behavior and perceived attachment security to parents of Portuguese adolescents, classified as aggressive victims, non-aggressive victims and non-victims. The sample consisted of 222 ...

Automated image segmentation-assisted flattening of atomic force microscopy images.

Atomic force microscopy (AFM) images normally exhibit various artifacts. As a result, image flattening is required prior to image analysis. To obtain optimized flattening results, foreground features are generally manually excluded using rectangular masks in image flattening, which is time consuming and inaccurate. In this study, a two-step scheme was proposed to achieve optimized image flattening in an automated manner. In the first step, the convex and concave features in the foreground were automatically...

Impact of Hajj on Global Health Security.

With the human society transfers from scattered pieces to a society as a whole and the advent of the aviation era, the occurrence of infectious diseases and their diffusion have led to international health security issues. As the world's largest and irrevocable annual transnational religious movement, the Hajj and its connection with health security concerns have caught attention since the ancient times, because a huge population from all over the world gathers in the holy city of Mecca, which has tropical ...

Research on Experimental Model of Security Assessment of DEHP Migration from PVC-Tubes Medical Devices.

As we all know, DEHP is seriously harmful to human health and consequently has been acquired critical attention. DEHP is able to migrate from PVC medical devices for the non-chemically bound to PVC, thus contact with user and patient. The DEHP migration is influenced by various parameters. In order to assess the security of PVC-tubes medical devices scientifically of DEHP migration, we develop an experimental model by analyzing the parameters comprehensively and systematically, taking into account the clini...

Nuclear and Radiological Source Security Culture Assessment of Radioactive Material Users at a University.

Securing radioactive sources has become increasingly important given the rising threat of radiological terrorism. While radiation safety has long been established in most applicable industries, the importance of nuclear and radiological source security has lagged behind in nonnuclear material specific industries, such as academic institutions and medical facilities. To evaluate the attitudes and behaviors regarding nuclear security culture, an assessment of nuclear and radiological material practices was de...

A Lightweight Protocol for Secure Video Streaming.

The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy...

Systematic review of the effects of agricultural interventions on food security in northern Ghana.

Food insecurity and poverty rates in Ghana are highest in the districts from latitude 8° N upwards. These have motivated several interventions aimed at addressing the food insecurity via promoting agricultural growth. An assessment of the overall impact of these interventions on food security is necessary to guide policy design and future interventions.

Multiple non-climatic drivers of food insecurity reinforce climate change maladaptation trajectories among Peruvian Indigenous Shawi in the Amazon.

Climate change is affecting food systems globally, with implications for food security, nutrition, and the health of human populations. There are limited data characterizing the current and future consequences of climate change on local food security for populations already experiencing poor nutritional indicators. Indigenous Amazonian populations have a high reported prevalence of nutritional deficiencies. This paper characterizes the food system of the Shawi of the Peruvian Amazon, climatic and non-climat...

A Background Modeling and Foreground Detection Algorithm Using Scaling Coefficients Defined with a Color Model Called Lightness-Red-Green-Blue.

This paper presents an algorithm for background modeling and foreground detection that uses scaling coefficients, which are defined with a new color model called LRGB (Lightness-Red-Green-Blue). They are employed to compare two images by finding pixels with scaled lightness. Three backgrounds are used: verified background with pixels that are considered as background, testing background with pixels that are tested several times to check if they belong to the background, and final background that is a combin...

Building walls or opening borders? Global immigration policy attitudes across economic, cultural and human security contexts.

Using data from the World Values Survey for 51 countries, we conduct a multi-level analysis with mixed effects multinomial logistic regression models to explore the effects of economic context, cultural context, and national security events on immigration policy attitudes. Analyses of attitudes towards immigration to date have been limited in key respects: the scope has been mostly restricted to Western Europe and the Americas; limited attention has been paid to institutional and sociopolitical features of ...

Analyzing Cyber-Physical Threats on Robotic Platforms.

Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequence...

Finger-to-Heart(F2H): Authentication for Wireless Implantable Medical Devices.

Any proposal to provide security for Implantable Medical Devices (IMDs), such as cardiac pacemakers and defibrillators, has to achieve a trade-off between security and accessibility for doctors to gain access to an IMD, especially in an emergency scenario. In this paper, we propose a Finger-to-Heart (F2H) IMD authentication scheme to address this trade-off between security and accessibility. This scheme utilizes a patient's fingerprint to perform authentication for gaining access to the IMD. Doctors can gai...


Advertisement
Quick Search
Advertisement
Advertisement