Search
Now showing items 211-220 of 222
Profile-based security assurances for service software
(
Springer Verlag
, 2011 , Conference Paper)
In service software, it is highly desirable to have a service composition mechanism that supports automatic reasoning about the security assurances of services. Service consumers such as human, machine, even application ...
Cloud computing without seeing
(
Association for Computing Machinery
, 2011 , Conference Paper)
In the emerging cloud computing model, security is of paramount concern. This paper discusses the need for practical techniques that enable private outsourcing on the cloud by allowing the service provider to work on ...
A modal logic for information system security
(
Australian Computer Society, Inc.
, 2011 , Article)
As a security mechanism, authorization or access control ensures that all accesses to the system resources occur exclusively according to the access polices and rules specified by the systemsecurity agent. Authorization ...
Characterization of bioactive compounds and ameliorative effects of Ceratonia siliqua leaf extract against CCl4 induced hepatic oxidative damage and renal failure in rats
(
Elsevier Ltd
, 2011 , Article)
Ceratonia siliqua is a typical Mediterranean plant, mainly used in food and Tunisian traditional folk medicine. Among the tested extracts, the ethyl acetate fraction (EACs) exhibited the highest total phenolic and flavonoids ...
Antioxidant constituents from Lawsonia inermis leaves: Isolation, structure elucidation and antioxidative capacity
(
Elsevier Ltd
, 2011 , Article)
The antioxidant potential of different fractions of Lawsonia inermis (Lythraceae) was investigated. The n-butanolic fraction showed the highest yield of extraction; it also exhibited a strong antioxidant activity in the ...
Time-frequency based signal restoration for laser-ultrasound signals with applications in nondestructive testing
(
IEEE
, 2011 , Conference Paper)
In this paper, an inspection system has been presented that uses Laser-Ultrasound (LU) technique for Nondestructive testing (NDT) of metallic structures with specific interest in Oil & Gas sector. While the developed ...
Cranial reconstruction after decompressive craniectomy: Prediction of complications using fuzzy logic
(
IEEE
, 2011 , Article)
Introduction: Cranial reconstruction after decompressive craniectomy (DC) has been shown to be associated with a relatively high complication rate (16.4%-34%) compared with standard neurosurgical procedures (2%-5%). Most ...
Fuzzy prediction of complications in craniopathy
(
IEEE
, 2011 , Conference Paper)
Decompressive craniectomy is a neurosurgical procedure in which part of the skull is removed to allow a swelling brain room to expand. It is a life-saving procedure used in the treatment of medically refractory intracranial ...
Fun to learn: Project-based learning in robotics for computer engineers
(
Association for Computing Machinery
, 2011 , Article)
This article shares my experiences with the project-based methodology of teaching the same material that a standard text in robotics would teach and will comparatively elaborate the improvement observed in the group of ...
Fuzzy detection of critical cardiac abnormalities using ECG data: A ubiquitous approach
(
IEEE
, 2011 , Conference Paper)
Electrocardiogram (ECG) based health diagnosis of cardiac diseases has been a saturated area of research and almost any known heart-condition can be detected and diagnosed by doctors in the hospital setting. However, these ...