Showing 4,141 - 4,160 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 4141
  2. 4142
  3. 4143

    SUSTAINABLE GROUNDWATER MANAGEMENT THROUGH GROUNDWATER IRRIGATION ADVISORY APPLICATION (GIAA) by Muhammad Mohsin Waqas

    Published 2024-06-01
    “…Despite these challenges, groundwater remains indispensable for global food security, supporting approximately 60% of irrigated agriculture worldwide. …”
    Get full text
    Article
  4. 4144

    Research on new energy power plant network traffic anomaly detection method based on EMD by Danni Liu, Shengda Wang, YutongLi, Ji Du, Jia Li

    Published 2025-01-01
    “…Abstract Overview As Photovoltaic (PV) systems connect into the grid and depend on digital technology, risks develop from obsolete components, insufficient security measures, and insecure access points. Objectives Improve the safety and dependability of the main data communication network by conducting research on Proactive Coordinated Fault-Tolerant Federation (PCFT) security structure, building an early warning simulation to handle power data interactions network abnormalities, studying algorithms and technologies for abnormal traffic control, and effectively managing abnormal network traffic like DDoS, network scanning, along with surge traffic; Improve the capability of the SLA hierarchical service, enhance the service quality of the core services executed through the backbone network, as well as strengthen the security capability of the access system for the new energy power plant’s communication network by combing and analyzing the traffic of the main network of the current information communication network. …”
    Get full text
    Article
  5. 4145

    Are free school meals failing families? Exploring the relationship between child food insecurity, child mental health and free school meal status during COVID-19: national cross-se... by Maria Bryant, Tiffany C Yang, Madeleine Power, Bridget Lockyer, Rachael H Moss, Wendy Burton, Bob Doherty

    Published 2022-06-01
    “…This study examined levels of food security and FSM status to support decision-making regarding increasing the current eligibility criteria.Design Two cross-sectional national surveys administered in August–September 2020 and January–February 2021 were used to examine the impact of COVID-19 on the food experiences of children and young people.Setting UK.Participants 2166 children (aged 7–17 years) and parents/guardians.Main outcome measures Participant characteristics were described by food security and FSM status; estimated marginal means were calculated to obtain the probability of poor mental health, expressed as children reporting feeling stressed or worried in the past month, by food security status and FSM status.Results We observed food insecurity among both children who did and did not receive of FSM: 23% of children not receiving FSM were food insecure. …”
    Get full text
    Article
  6. 4146

    Pediatric Emergency Department-based Food Insecurity Screening During the COVID-19 Pandemic by Stephanie Ruest, Lana Nguyen, Celeste Corcoran, Susan Duffy

    Published 2024-11-01
    “…Six validated US Department of Agriculture household food security questions and sociodemographic questions were included. …”
    Get full text
    Article
  7. 4147
  8. 4148

    Implementasi Algoritme Spongent sebagai Algoritme Hashing untuk Integritas pada Modul Komunikasi Lora by Ari Kusyanti, I Putu Agrahita Wiguna, Fariz Andri Bakhtiar

    Published 2023-12-01
    “…Data security can be done with hashing algorithms such as SPONGENT algorithm. …”
    Get full text
    Article
  9. 4149
  10. 4150

    Food insecurity and ultra-processed food consumption in the Health and Retirement Study: Cross-sectional analysis by Abeer A. Aljahdali

    Published 2025-02-01
    “…Mean UPFs% (95% confidence intervals) were 49.1 (47.8, 50.3), 48.5 (46.6, 50.4), and 52.3 (50.4, 54.3) among adults with food security, low food security, and very low food security, respectively (P-trend = 0.0156). …”
    Get full text
    Article
  11. 4151

    Deep learning-based encryption scheme for medical images using DCGAN and virtual planet domain by Manish Kumar, Aneesh Sreevallabh Chivukula, Gunjan Barua

    Published 2025-01-01
    “…Abstract The motivation for this article stems from the fact that medical image security is crucial for maintaining patient confidentiality and protecting against unauthorized access or manipulation. …”
    Get full text
    Article
  12. 4152

    Strategic Planning of Public Spaces in Order to Promote and Benefit from Social Interactions, Case Study: District 10 of Tehran Municipality by samaneh jalilisadrabad, somayeh jalilisadrabad

    Published 2025-03-01
    “…Furthermore, issues such as physical deterioration, disrupted urban landscapes, a high tenant rate, low social security, and a transient population have further diminished the quality of existing public spaces and the level of social interaction in this particular district. …”
    Get full text
    Article
  13. 4153
  14. 4154

    Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling by Lei Wang, Wenjun Song, Jiali Di, Xuncai Zhang, Chengye Zou

    Published 2025-01-01
    “…With the increasing importance of securing images during network transmission, this paper introduces a novel image encryption algorithm that integrates a 3D chaotic system with V-shaped scrambling techniques. …”
    Get full text
    Article
  15. 4155

    Cybersecurity in microgrids: A review on advanced techniques and practical implementation of resilient energy systems by Ijaz Ahmed, Ali M. El-Rifaie, Fazia Akhtar, Hasnain Ahmad, Zuhair Alaas, M.M.R. Ahmed

    Published 2025-03-01
    “…This study offers an in-depth examination of cyber security within the energy sector, exploring the historical backdrop of cyber-attacks and classifying different forms of MG breaches, encompassing both cyber and physical security strategies. …”
    Get full text
    Article
  16. 4156
  17. 4157

    A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things by Chen Dong, Jinghui Chen, Wenzhong Guo, Jian Zou

    Published 2019-12-01
    “…With the development of the Internet of Things, smart devices are widely used. Hardware security is one key issue in the security of the Internet of Things. …”
    Get full text
    Article
  18. 4158

    Chaotic sequence based polar code encrypted scheme in negative secrecy capacity case by Xiaohui ZHANG, Shunliang ZHANG, Bowen LI

    Published 2020-10-01
    “…A chaos based encrypted polar coding scheme,which could be applied to the negative secrecy capacity case,was proposed.Chaotic sequences were employed to encrypt the information bits and fill the frozen bits.And multi-block polar coding structure was also employed in the proposed scheme.The proposed scheme was featured as lower complexity and higher secrecy transmission rate.Corresponding mathematical analysis had been performed in terms of the error probability,security and transmission rate.The result reveals that the proposed scheme can achieve reliability,security in negative secrecy capacity case.What’s more,it has relatively low complexity and high secrecy transmission rate compared with the existing schemes.…”
    Get full text
    Article
  19. 4159

    The New Trend in the EU’s Migration Policy: Is Externalization Any Better? by Vasil Pavlov, Raquel Cardoso

    Published 2024-12-01
    “… The highly dynamic security environment, characterized by numerous disturbances such as armed conflicts, civil wars, and political and social instability in various parts of the world, has led millions of people to flee their countries of origin – as of 2023, this number is 117,3 million. …”
    Get full text
    Article
  20. 4160

    Improved identity based multi-receiver anonymous signcryption scheme by Bo ZHANG, Tao SUN, Dai-rong YU

    Published 2015-09-01
    “…Recently,Pang,et al proposed a novel identity based multi-receiver anonymous signcryption scheme (IBMRASC),which put into consideration both the sender's anonymity and the receiver's anonymity simultaneously.However,the analysis with respect to this scheme indicated that,under existing security models the adversary can distin-guish the ciphertexts associated with different plaintexts.Therefore,Pang's approach did not satisfy the requirement of indistinguishability against chosen ciphertext attacks (CCA).An improved scheme which is selective identity secure in the random oracle model was proposed.Under the CDH and Gap-BDH hard problem assumption,the improved scheme is both existentially unforgetable against chosen message attack and indistinguishable against adaptive CCA.…”
    Get full text
    Article