Advertisement

Topics

PubMed Journals Articles About "Foreground Security" RSS

20:34 EST 22nd January 2019 | BioPortfolio

Foreground Security PubMed articles on BioPortfolio. Our PubMed references draw on over 21 million records from the medical literature. Here you can see the latest Foreground Security articles that have been published worldwide.

More Information about "Foreground Security" on BioPortfolio

We have published hundreds of Foreground Security news stories on BioPortfolio along with dozens of Foreground Security Clinical Trials and PubMed Articles about Foreground Security for you to read. In addition to the medical data, news and clinical trials, BioPortfolio also has a large collection of Foreground Security Companies in our database. You can also find out about relevant Foreground Security Drugs and Medications on this site too.

Showing "Foreground Security" PubMed Articles 1–25 of 454

Examining the hierarchical nature of scene representations in memory.

How are scene representations stored in memory? Researchers have often posited that scene representations have a hierarchical structure with background elements providing a scaffold for more detailed foreground elements. To further investigate scene representation and the role of background and foreground information, we introduced a new stimulus set: chimera scenes, which have the central block of objects belonging to one scene category (foreground), and the surrounding structure belonging to another (back...


Social security of aging: problem statement.

The article raises the question of the need to consider aging in the context of social security. The author the author shows the main stages of the humanitarization of social security, the trend of development of theoretical ideas in the direction of «human security», which develops within the framework of «enhanced security». The main object of social security of the elderly people is the safety of physical and psychological health. The object of security is comprised of three components: safety of med...

Emotional security theory: An application to sibling bereavement.

There is a need for guiding theory to understand the experiences and outcomes of bereaved siblings, particularly from a family systems framework. The present study investigated the relevance of emotional security theory in a sample of 72 young adults who experienced sibling bereavement. We investigated (1) whether perceptions of prolonged parental grief predicted key aspects of emotional security (disengagement, preoccupation, and security), and (2) whether emotional security mediated a relation between per...


Correlation between job security as motivation and career maturity among Japanese nursing students.

For nursing students, career maturity -an individual's readiness to cope with career development tasks and make age-appropriate career decisions- is an essential factor influencing their desire to continue the job after qualifying as a nurse. Although job security as motivation to become a nurse might influence the career maturity of nursing students, it has not been demonstrated. In this study I aimed to elucidate the correlation between job security as motivation and career maturity among Japanese nursing...

Robust Foreground Estimation via Structured Gaussian Scale Mixture Modeling.

Recovering the background and foreground parts from video frames has important applications in video surveillance. Under the assumption that the background parts are stationary and the foreground are sparse, most of existing methods are based on the framework of robust principal component analysis (RPCA), i.e., modeling the background and foreground parts as a low-rank and sparse matrices, respectively. However, in realistic complex scenarios, the conventional norm sparse regularizer often fails to well cha...

Adoptive gay fathers' sensitivity and child attachment and behavior problems.

Fathers' sensitivity and child attachment security and externalizing and internalizing problems were investigated among families headed by two adoptive gay fathers. A sample of 68 fathers and their 34 children aged 1-6 years participated in the study. Fathers completed a sociodemographic questionnaire and the Child Behavior Checklist. Parental sensitivity and child attachment security were assessed by independent coders with Q-sort methodology during parent-child interactions at home. Results indicate that...

Public social security burden of musculoskeletal diseases in Brasil-Descriptive study.

To present data on the social security burden of diseases of the musculoskeletal system and connective tissue (DSOTC) in Brasil in 2014, and evolution of these social security expenditures between 2009 and 2014.

Updating energy security and environmental policy: Energy security theories revisited.

The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and...

Displacement of social security and social disprotection in Brazil.

After 30 years in force, CF-88 must be salvaged and commemorated but also evaluated in relation to how much social and political resistance it acquired in the execution of its determinations. These determinations not only conflict with those of the dictatorial period preceding it but were also shown to be minimally attractive to neoliberal forces in Brazil in the late 1980s and early 1990s and are now widely recognized as conservative. One of the main recommendations of CF-88 - the subject of this article -...

Integrated assessment of coastal ecological security based on land use change and ecosystem services in the Jiaozhou Bay, Shandong Peninsula, China.

Land use-based development activities can change the quality of coastal environment and the supply pattern of ecosystem services, negatively affecting the ecological security of coastal zones. Coastal ecosystem research has generally used terrestrial ecosystem research models which cannot actually reflect the features of the coastal zone─An independent environmental system combining land and sea. A scientific explanation is lacking for the complex relationship among driving factor of land-based activit...

Synthesizing water quality indicators from standardized geospatial information to remedy water security challenges: A review.

Water is vital not only for food, energy and sanitation but also for ecosystem functioning, human health, socio-economic progress and poverty reduction. Water security exists when all people have physical and economical access to sufficient, safe, and clean water that meets basic needs. However, water security is threatened by growing human population, episodic environmental disasters, indiscriminate land management practices, contaminants, and escalation in geopolitical conflicts.

How to Lead During the Next Health Security Crisis The Public Health Crisis Survival Guide: Leadership and Management in Trying Times , by Joshua M. Sharfstein , Reviewed by Jennifer B. Nuzzo.

The Experience of Medical Communication in Adults with Acute Leukemia: Impact of Age and Attachment Security.

Healthcare providers' (HCPs) communication with cancer patients provides both information and support. Younger patient age and greater difficulty accepting support (attachment security) have been linked to poorer communication experiences with HCPs. The present secondary data analysis examined the impact of age group and attachment security on perceived communication problems with HCPs in adults with acute leukemia (AL).

Security and efficiency enhancement of an anonymous three-party password-authenticated key agreement using extended chaotic maps.

Recently, Lu et al. claimed that Xie et al.'s three-party password-authenticated key agreement protocol (3PAKA) using chaotic maps has three security vulnerabilities; in particular, it cannot resist offline password guessing attack, Bergamo et al.'s attack and impersonation attack, and then they proposed an improved protocol. However, we demonstrate that Lu et al.'s attacks on Xie et al.'s scheme are unworkable, and their improved protocol is insecure against stolen-verifier attack and off-line password gue...

Evaluation of Job-Related Anxiety Symptoms Among Brazilian Social Security Medical Experts.

The function of a medical expert within the scope of the Brazilian social security system consists of medically evaluating the examinee to draw a conclusive opinion on the person's working ability capacity and to characterize the disability for social security and assistance purposes. Forensic decisions inevitably converge on two opposite outcomes: concession or refusal. Rejection is against the interests of the candidates, who can direct their disappointment and dissatisfaction at the professional, exposin...

Impact of Hajj on Global Health Security.

With the human society transfers from scattered pieces to a society as a whole and the advent of the aviation era, the occurrence of infectious diseases and their diffusion have led to international health security issues. As the world's largest and irrevocable annual transnational religious movement, the Hajj and its connection with health security concerns have caught attention since the ancient times, because a huge population from all over the world gathers in the holy city of Mecca, which has tropical ...

Living Well in Times of Threat: The Importance of Adjustment Processes to Explain Functional Adaptation to Uncertain Security in Expatriates Deployed in the Sudan.

The present study investigated expatriate humanitarian aid workers' perceptions and responses to uncertain security while deployed in the Sudan. Interviews conducted in Khartoum (n = 7) and Darfur (n = 17) focused on risk perception, concern for personal security, and strategies used to function well in an insecure environment. Despite a high perceived general risk, as well as broad knowledge and experience with security incidents, participants often expressed low concern. General adjustment processes were ...

Critical elements for local Indigenous water security in Canada: a narrative review.

Indigenous communities in Canada are over-represented with respect to poor water quality and water advisories. To date, approaches to solve this water crisis have been founded in the Western Science (WS) context with little to no consultation or dialogue with those communities most impacted, and without regard for culture. A literature review was undertaken to: (i) document Indigenous Knowledge (IK), and perspectives regarding water and (ii) to identify current local water security tools utilized by Indigen...

Nuclear and Radiological Source Security Culture Assessment of Radioactive Material Users at a University.

Securing radioactive sources has become increasingly important given the rising threat of radiological terrorism. While radiation safety has long been established in most applicable industries, the importance of nuclear and radiological source security has lagged behind in nonnuclear material specific industries, such as academic institutions and medical facilities. To evaluate the attitudes and behaviors regarding nuclear security culture, an assessment of nuclear and radiological material practices was de...

Peer support and food security in deaf college students.

The purpose of the study was to investigate whether peer support and demographic characteristics predicted food security among deaf college students.

Systematic review of the effects of agricultural interventions on food security in northern Ghana.

Food insecurity and poverty rates in Ghana are highest in the districts from latitude 8° N upwards. These have motivated several interventions aimed at addressing the food insecurity via promoting agricultural growth. An assessment of the overall impact of these interventions on food security is necessary to guide policy design and future interventions.

Multiple non-climatic drivers of food insecurity reinforce climate change maladaptation trajectories among Peruvian Indigenous Shawi in the Amazon.

Climate change is affecting food systems globally, with implications for food security, nutrition, and the health of human populations. There are limited data characterizing the current and future consequences of climate change on local food security for populations already experiencing poor nutritional indicators. Indigenous Amazonian populations have a high reported prevalence of nutritional deficiencies. This paper characterizes the food system of the Shawi of the Peruvian Amazon, climatic and non-climat...

Building walls or opening borders? Global immigration policy attitudes across economic, cultural and human security contexts.

Using data from the World Values Survey for 51 countries, we conduct a multi-level analysis with mixed effects multinomial logistic regression models to explore the effects of economic context, cultural context, and national security events on immigration policy attitudes. Analyses of attitudes towards immigration to date have been limited in key respects: the scope has been mostly restricted to Western Europe and the Americas; limited attention has been paid to institutional and sociopolitical features of ...

A Background Modeling and Foreground Detection Algorithm Using Scaling Coefficients Defined with a Color Model Called Lightness-Red-Green-Blue.

This paper presents an algorithm for background modeling and foreground detection that uses scaling coefficients, which are defined with a new color model called LRGB (Lightness-Red-Green-Blue). They are employed to compare two images by finding pixels with scaled lightness. Three backgrounds are used: verified background with pixels that are considered as background, testing background with pixels that are tested several times to check if they belong to the background, and final background that is a combin...

Finger-to-Heart(F2H): Authentication for Wireless Implantable Medical Devices.

Any proposal to provide security for Implantable Medical Devices (IMDs), such as cardiac pacemakers and defibrillators, has to achieve a trade-off between security and accessibility for doctors to gain access to an IMD, especially in an emergency scenario. In this paper, we propose a Finger-to-Heart (F2H) IMD authentication scheme to address this trade-off between security and accessibility. This scheme utilizes a patient's fingerprint to perform authentication for gaining access to the IMD. Doctors can gai...


Advertisement
Quick Search
Advertisement
Advertisement