Browsing University of Hertfordshire by Title
Now showing items 19632-19651 of 24087
-
Section Editorial - Cosmeceuticals
(2014-04-14) -
Section editorial - Regulatory and toxicology
(2014-04-14) -
Secular Changes in Clinical Features at Presentation of Rheumatoid Arthritis : Increase in Comorbidity But Improved Inflammatory States
(2017-01-31)Objective: To examine secular trends in demographics, clinical manifestations, and comorbidity on first presentation of rheumatoid arthritis (RA) prior to disease-modifying antirheumatic drug treatment. Methods: A total ... -
Secular changes in the progression of clinical markers and patient-reported outcomes in early rheumatoid arthritis
(2020-01-03)OBJECTIVES: To examine secular trends in the progression of clinical and patient-reported outcomes in early RA. METHODS: A total of 2701 patients recruited to the Early Rheumatoid Arthritis Study or Early Rheumatoid Arthritis ... -
Secular trends in under-reporting in young people
(2005)National survey data show that reported energy intake has decreased in recent decades despite a rise in the prevalence of obesity. This disparity may be due to a secular increase in under-reporting or a quantitatively ... -
Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System †
(2022-10-28)Smart health presents an ever-expanding attack surface due to the continuous adoption of a broad variety of Internet of Medical Things (IoMT) devices and applications. IoMT is a common approach to smart city solutions that ... -
Secure Energy-Efficient Multi-RIS-aided SWIPT Networks
(Institute of Electrical and Electronics Engineers (IEEE), 2023-11-30)This paper considers a SWIPT network in which an access point (AP) serves multiple information decoding receivers(IDRs) and energy harvesting receivers (EHRs) assisted by several dynamically controlled reconfigurable ... -
The SECURE project – Stem canker of oilseed rape: : molecular methods and mathematical modelling to deploy durable resistance
(2007-03-26)Modelling done during the SECURE project has demonstrated the dynamic nature of the interaction between phoma stem canker (Leptosphaeria maculans), the oilseed rape host (Brassica napus) and the environment. Experiments ... -
Secure Sessions from Weak Secrets
(2005)Sometimes two parties who already share a weak secret k such as a password wish to share also a strong secret s such as a session key without revealing information about k to an active attacker. We assume that both parties ... -
Securing graduate commitment: an exploration of the comparative expectations of placement students, graduate recruits and Human Resource Managers within the Hospitality, Leisure and Tourism industries
(2001)This research begins the process of mapping out human resource (HR) strategies appropriate to the needs of actual and potential graduate employees. The perceptions and attitudes of placement students, recent graduates ... -
Securing the Edges of IoT Networks: a Scalable SIP DDoS Defense Framework with VNF, SDN, and Blockchain
(2021-02-19)An unintended consequence of the global deployment of IoT devices is that they provide a fertile breeding ground for IoT botnets. An adversary can take advantage of an IoT botnet to launch DDoS attacks against telecommunication ... -
Security and Usability of Authentication by Challenge Questions in Online Examination
(2017-05-12)Online examinations are an integral component of many online learning environments and a high-stake process for students, teachers and educational institutions. They are the target of many security threats, including ... -
Security protocol deployment risk : (transcript of discussion)
(2011)The level of confidence you need in the secrecy of the key you are using to upload your initials to the high score on Tour of Duty is probably different to the confidence you need to do a multi-million pound transaction. ... -
Security Protocols XIX : 19th International Workshop
(Springer Nature, 2011) -
Security Protocols XVI : 16th International Workshop
(Springer Nature, 2011) -
Security system case study
(University of Hertfordshire, 1992)This paper is an early draft of the specification of a security system. We begin by giving a full description in English of the client company and their requirements for card issuing system and a door control system. The ... -
SED fitting of nearby galaxies in the Herschel Reference Survey
(Societe Francaise d'Astronomie et d'Astrophysique, 2010-12-01)We compute UV to radio continuum spectral energy distributions of 51 nearby galaxies recently observed with SPIRE onboard Herschel and present infrared colours (in the 25-500 μm spectral range). SPIRE data of normal galaxies ... -
Sedative load of medications prescribed for older people with dementia in care homes
(2011)ABSTRACT: BACKGROUND: The objective of this study was to determine the sedative load and use of sedative and psychotropic medications among older people with dementia living in (residential) care homes. METHODS: Medication ... -
Sediment-moss interactions on a temperate glacier: Falljökull, Iceland
(2008)We present the results of preliminary investigations of globular moss growth on the surface of Falljökull, a temperate outlet glacier of the Vatnajökull ice cap, southern Iceland. Supraglacial debris has provided a basis ... -
Sedimentary and tectonic architecture of a large push moraine : a case study from Hagafellsjökull-Eystri, Iceland
(2004)Using a combination of geological and geophysical techniques (Ground Penetrating Radar), we explore the tectonic architecture of a push moraine formed just after the 1890 Neoglacial ice maximum of Hagafellsjökull-Eystri, ...