Showing 4,521 - 4,540 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 4521

    African Orphan Crops under Abiotic Stresses: Challenges and Opportunities by Zerihun Tadele

    Published 2018-01-01
    “…A changing climate, a growing world population, and a reduction in arable land devoted to food production are all problems facing the world food security. The development of crops that can yield under uncertain and extreme climatic and soil growing conditions can play a key role in mitigating these problems. …”
    Get full text
    Article
  2. 4522

    Aid Effectiveness: From Project Appraisal to Strategic Impact Evaluation by D. A. Degterev

    Published 2020-11-01
    “…The US case shows key principles of ensuring policy coherence at different levels of goal-setting — from the National Security Strategy to planning individual projects and programs. …”
    Get full text
    Article
  3. 4523

    Multi-sensor image fusion based on contrast and directional features optimization by Haiyan Jin, Meng Zhang, Zhaolin Xiao, Yaning Li

    Published 2018-12-01
    “…Multi-sensor image fusion is always an important and opening problem, which can enhance visual quality and benefit some social security applications. In this article, we use contrast pyramid to decompose visible and infrared images, respectively, and the directional filter banks are applied to obtain multiple directional sub-band image features. …”
    Get full text
    Article
  4. 4524

    Automatic classification of mobile apps to ensure safe usage for adolescents. by Hanadi Hakami

    Published 2025-01-01
    “…The integration of mobile devices into adolescents' daily lives is significant, making it imperative to prioritize their safety and security. With the imminent arrival of fast internet (6G), offering increased bandwidth and reduced latency compared to its predecessor (5G), real-time streaming of high-quality video and audio to mobile devices will become feasible. …”
    Get full text
    Article
  5. 4525

    Design and Construction of a Fingerprint Based Students’ Attendance and Monitoring System. by Asiimwe Julius

    Published 2023
    “…There is a need to replace these traditional methods of attendance recording with a more secure, cheap and robust system. Fingerprint based automated identification system based are gaining popularity due to their unique nature. …”
    Get full text
    Thesis
  6. 4526

    Patients’ Health Records Management in Ugandan Hospitals: A Case of Kabale Regional Referral Hospital by Daniel, Nabimanya, Sembatya, Richard, Ambrose, Atuhaire, Phelix, Businge Mbabazi

    Published 2021
    “…The study concluded that privacy of patients’ records was vital to the patients and recommended that security measures be implemented.…”
    Get full text
    Article
  7. 4527

    Automated stringed robotechnical complex as a prospective method for monitoring of objects’safety and state border areas by D. V. Нansetski

    Published 2021-04-01
    “…A distinctive feature of the project is the mobility in relocation and the maximum use of artificial intelligence to solve problems of ensuring the security of a protected object or territory.…”
    Get full text
    Article
  8. 4528

    The performance analysis of SEMA system by LI Li-chun, RAN Chong-sen, FAN Shao-jie, WEI Feng

    Published 2003-01-01
    “…The enhanced transmission security arises from the special spectrum spreading and de-spreading processes. …”
    Get full text
    Article
  9. 4529

    Evaluating the use of blockchain technology and identifying critical success factors for the successful implementation of renewable energy projects in sub-Saharan Africa by Love Opeyemi David, Nnamdi Ikechi Nwulu, Clinton Ohis Aigbavboa, Adeyemi Adepoju, Omoseni Oyindamola Adepoju

    Published 2025-12-01
    “…This study advances the application of blockchain technology within renewable energy systems (RES) Projects for energy security. Employing a mixed research method involving Bibliometric analysis for the qualitative and quantitative methodology includes Mean Response Ranking and Structural Equation Modelling, using SPSS and SMATPLS software for analysis. …”
    Get full text
    Article
  10. 4530

    A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding by S. J. Sheela, K. V. Suresh, Deepaknath Tandur

    Published 2017-01-01
    “…Chaotic maps have good potential in security applications due to their inherent characteristics relevant to cryptography. …”
    Get full text
    Article
  11. 4531

    One-Time Broadcast Encryption Schemes in Distributed Sensor Networks by Pawel Szalachowski, Zbigniew Kotulski

    Published 2012-03-01
    “…We mainly focus on data origin authentication and rekeying processes, crucial for security in such a hostile environment. An analysis and evaluations of proposed schemes are also provided.…”
    Get full text
    Article
  12. 4532

    A Biometric Key Establishment Protocol for Body Area Networks by Lin Yao, Bing Liu, Guowei Wu, Kai Yao, Jia Wang

    Published 2011-08-01
    “…The correctness of the proposed key establishment protocol is formally verified based on SVO logic. Security analysis shows that our protocol can guarantee data confidentiality, authenticity and integrity. …”
    Get full text
    Article
  13. 4533

    Breaking Silo Thinking within the South African Water-Energy-Food Nexus via Systems Thinking and Simulation Workshops by Steven Mathetsa, Corne du Plooy, Khabeer Tayob

    Published 2024-06-01
    “… Despite their inextricable interlinkage commonly known as Water-Energy-Food nexus, the current disconnect in policy development and management of the water, energy, and food resources threatens their security of supply. The security of these basic human needs is aggravated by the cross-cutting role of climate change which impacts their availability.  …”
    Get full text
    Article
  14. 4534

    Analisis Kualitas Pelayanan Parkir Tepi Jalan Umum di Kota Pekalongan by Herlambang Dwi Anggara, Kismartini Kismartini, Ida Hayu Dwimawanti

    Published 2022-04-01
    “…In order to approach these problems, the theoretical references from Zeitaml and Ilosa are used, namely tangible, reliability, responsiveness, assurance, empathy, transparency and security. The data were collected through direct observation and interviews with informants and analyzed qualitatively. …”
    Get full text
    Article
  15. 4535
  16. 4536

    Dynamics and Control of Worm Epidemic Based on Mobile Networks by SEIQR-Type Model with Saturated Incidence Rate by Rui Hu, Qingwu Gao, Bairong Wang

    Published 2021-01-01
    “…The mobile networks have increasingly facilitated our daily life but are also breeding grounds for malicious worms, which are considered as the main threat to cyber security. The purpose of this paper is to analyze the dynamics of worm propagation and to control the worm epidemic based on mobile-phone networks. …”
    Get full text
    Article
  17. 4537

    Grid-Based Anomaly Detection of Freight Vehicle Trajectory considering Local Temporal Window by Zixian Zhang, Geqi Qi, Avishai (Avi) Ceder, Wei Guan, Rongge Guo, Zhenlin Wei

    Published 2021-01-01
    “…The security travel of freight vehicles is of high societal concern and is the key issue for urban managers to effectively supervise and assess the possible social security risks. …”
    Get full text
    Article
  18. 4538

    A geotecnologia Smart Geo Layers (SGeoL) e sua aplicação para as políticas públicas: o caso do Painel de Segurança Hídrica (PSH) by Jorge Pereira da Silva, Frederico Araújo da Silva Lopes, Nélio Alessandro Azevedo Cacho, Alison Hedigliranes da Silva, George Ravelly da Silva Ribeiro

    Published 2023-10-01
    “…Through PSH, managers and researchers can have access to a myriad of information relating to water security, which can be filtered, processed, correlated, and viewed in a georeferenced way. …”
    Get full text
    Article
  19. 4539

    The use of technological innovations in military armaments -contemporary trends and future prospects by Zbigniew Małodobry, Karolina Nastaj-Sałek, Katarzyna Cyrkun, Mariusz Kuliński

    Published 2024-12-01
    “…The conclusions suggest that the development of new technologies will require appropriate international regulations, as well as new challenges related to ethics and security. Understanding these processes is crucial to ensuring global security. …”
    Get full text
    Article
  20. 4540

    Access Control Points: Reducing a Possible Blast Impact by Meandering by Martin Larcher, Georgios Valsamos, Vasilis Karlos

    Published 2018-01-01
    “…Such control zones could be located within the building that has to be protected or attached to it. The elevated security needs for these areas call for a design that will consider the risk of internal explosive events. …”
    Get full text
    Article