Showing 4,541 - 4,560 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 4541

    A requirement-driven approach for competency-based collaboration in industrial data science projects by Marius Syberg, Nikolai West, Jörn Schwenken, Rebekka Adams, Jochen Deuse

    Published 2024-01-01
    “…Simultaneously, especially manufacturing companies need to gain and secure knowledge in the field of Industrial Data Science (IDS) and to collaborate with partners to form a competitive value chain. …”
    Get full text
    Article
  2. 4542

    Innovative Technologies for Improved Water Productivity and Climate Change Mitigation, Adaptation, and Resilience: A Review by E. Oiganji, H. Igbadun, P. S. Amaza, R. Z. Lenka

    Published 2025-02-01
    “… Water scarcity, exacerbated by climate change, poses severe challenges to agriculture, food security, and sustainable development, particularly in vulnerable regions. …”
    Get full text
    Article
  3. 4543

    An adaptive neuro-fuzzy inference system for multinomial malware classification by Amos Orenyi Bajeh, Mary Olayinka Olaoye, Fatima Enehezei Usman-Hamza, Ikeola Suhurat Olatinwo, Peter ogirima Sadiku, Abdulkadir Bolakale Sakariyah

    Published 2025-02-01
    “… Malware detection and classification are important requirements for information security because malware poses a great threat to computer users. …”
    Get full text
    Article
  4. 4544

    Deep Learning-Based Intrusion Detection System for Detecting IoT Botnet Attacks: A Review by Tamara Al-Shurbaji, Mohammed Anbar, Selvakumar Manickam, Iznan H Hasbullah, Nadia Alfriehat, Basim Ahmad Alabsi, Ahmad Reda Alzighaibi, Hasan Hashim

    Published 2025-01-01
    “…Ultimately, this survey serves as a guideline for future researchers, contributing to the advancement of botnet detection methods in IoT environments and enhancing security against botnet threats.…”
    Get full text
    Article
  5. 4545

    Edge computing for detection of ship and ship port from remote sensing images using YOLO by Vasavi Sanikommu, Sai Pravallika Marripudi, Harini Reddy Yekkanti, Revanth Divi, R. Chandrakanth, P. Mahindra

    Published 2025-02-01
    “…In marine security and surveillance, accurately identifying ships and ship ports from satellite imagery remains a critical challenge due to the inefficiencies and inaccuracies of conventional approaches. …”
    Get full text
    Article
  6. 4546

    Blockchain adoption factors by Carlos Bernardino, Francisco Cesário, Carlos J. Costa, Manuela Aparicio, João Tiago Aparicio

    Published 2025-01-01
    “…Trust significantly enhances this intention, underscoring the importance of confidence in the technology's reliability and security. Environmental Concerns present a barrier, suggesting sustainability perceptions can deter adoption. …”
    Get full text
    Article
  7. 4547

    Quantum Computing for Advanced Driver Assistance Systems and Autonomous Vehicles: A Review by Avantika Rattan, Abhishek Rudra Pal, Muralimohan Gurusamy

    Published 2025-01-01
    “…The perks of quantum computation (QC) over classical systems are apparent with respect to security, privacy, and an exponentially high computation rate. …”
    Get full text
    Article
  8. 4548

    HSK Wallet: A User Friendly Blockchain Application by Hassan Shah Khan, Kashif Iqbal, Munaf Rashid, Aqsa Shahid

    Published 2024-12-01
    “…It focuses on improving the security, transparency, and efficiency of digital asset operations compared to traditional systems and decentralized solutions. …”
    Get full text
    Article
  9. 4549

    A Program for Master of Information Technology by Kabale University

    Published 2022
    “…The core courses in this programmes address challenges related to Enterprise Governance of ICT, Managing ICT Projects, Risk & Change Management, Cyber Security Management, IT project Management among others. …”
    Get full text
    Other
  10. 4550

    Dynamic monitoring and drivers of ecological environmental quality in the Three-North region, China: Insights based on remote sensing ecological index by Leyi Zhang, Xia Li, Xiuhua Liu, Zhiyang Lian, Guozhuang Zhang, Zuyu Liu, Shuangxian An, Yuexiao Ren, Yile Li, Shangdong Liu

    Published 2025-03-01
    “…Additionally, these have provided scientific references for determining whether to expand the implementation of ecological restoration measures in arid regions to enhance the ecological environment and establish a robust ecological security barrier.…”
    Get full text
    Article
  11. 4551

    THE MAIN ASPECTS OF FINANCIAL PLANNING AND FUNDING OF THE ARMED FORCES by Z. Uvarova

    Published 2016-04-01
    “…Thе article describes the system and structure of financial security of the Armed Forces of the Russian Federation, new approaches to financial planning, reflects the aggravation of problems of financial planning, dedicated work of Department of financial support and the common settlement centre of the Ministry of Defence of the Russian Federation.…”
    Get full text
    Article
  12. 4552

    Optimizing demand response and load balancing in smart EV charging networks using AI integrated blockchain framework by Arvind R. Singh, R. Seshu Kumar, K. Reddy Madhavi, Faisal Alsaif, Mohit Bajaj, Ievgen Zaitsev

    Published 2024-12-01
    “…Blockchain integration further strengthens security and privacy, delivering a 97.71% improvement in data protection via its decentralized framework. …”
    Get full text
    Article
  13. 4553

    Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks by Chung-Wei Kuo, Wei Wei, Chun-Chang Lin, Yu-Yi Hong, Jia-Ruei Liu, Kuo-Yu Tsai

    Published 2025-01-01
    “…The lightweight D-H key exchange ensures that even resource-constrained IoT devices can securely perform key exchanges without significant computational overhead. …”
    Get full text
    Article
  14. 4554

    Building a Digital Health Research Platform to Enable Recruitment, Enrollment, Data Collection, and Follow-Up for a Highly Diverse Longitudinal US Cohort of 1 Million People in the... by Dave Klein, Aisha Montgomery, Mark Begale, Scott Sutherland, Sherilyn Sawyer, Jacob L McCauley, Letheshia Husbands, Deepti Joshi, Alan Ashbeck, Marcy Palmer, Praduman Jain

    Published 2025-01-01
    “…Participants were recruited by in-person, print, and online digital campaigns. Participants securely accessed the DHRP via web and mobile apps, either independently or with research staff support. …”
    Get full text
    Article
  15. 4555
  16. 4556

    « Paroles de flics ». Communications policières et actualité politique au Maroc (2005-2023) by Mériam Cheikh

    Published 2023-12-01
    “…In line with the political readjustment period, communication will become less and less aimed at the general public and more and more focused on members of the security forces.…”
    Get full text
    Article
  17. 4557

    Ecological problem identification based on spatial and temporal dynamics of ecosystem quality: A case study by Rui Zhang, Huamin Liu, Zhichao Xu, Xinchuan Zhao, Lu Wen, Yi Zhuo, Lixin Wang

    Published 2025-01-01
    “…Bayannur, located in the Hetao Plain and the Urat Grassland, is China’s important ecological security barrier. It plays a significant role in the country’s sustainable socio-economic development, ecological protection, and high-quality growth. …”
    Get full text
    Article
  18. 4558

    Impact of the upgraded version of German“industrial 4 platform”on China's manufacturing industry by Siwei YANG

    Published 2016-01-01
    “…Firstly,the organizational structure and positioning of German“Industrial 4 Platform”were introduced,and then the core research was focused on,such as research and innovation,reference system and standardization,network system security.Finally,we should draw on the advanced experience of German manufacturing field,and promote the development of intelligent manufacturing in China.…”
    Get full text
    Article
  19. 4559

    An Agent-Based Auction Protocol on Mobile Devices by Yu-Fang Chung, Tzer-Long Chen, Tzer-Shyong Chen, Dai-Lun Chiang, Yu-Ting Chen

    Published 2014-01-01
    “…This paper proposes an English auction protocol to preserve a secure, fair, and effective online auction environment, where the operations are integrated with mobile agent technology for bidders participating in online auctions. …”
    Get full text
    Article
  20. 4560

    D’une industrie… l’autre ? by Sandrine Musso, Vinh-Kim Nguyen

    Published 2013-06-01
    “…Starting from a contextualization of Cindy Patton’s text, the authors invite consideration of the timeliness of these questions in light of contemporary issues related to the production of identities and communities that helps us see of the establishment of the « targets » of the prevention and treatment of HIV, as well as the effects of the depoliticization secured by the medicalization of the fight against the epidemic.…”
    Get full text
    Article