Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6181
Main street retail districts or shopping centers? comparing the preferences of low-income consumers
Published 2012-01-01“…While shopping malls received better evaluation on environment, infrastructure, variety of stores and security, the street districts were judged to be better regarding access and value. …”
Get full text
Article -
6182
An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks
Published 2015-09-01“…Furthermore, our scheme provides enough scalability and security. The quantitative analyses show that our scheme is efficient in terms of storage and computational overheads.…”
Get full text
Article -
6183
Multi-authority attribute-based identification scheme
Published 2021-03-01“…Based on the problem that the existing attribute-based identification scheme is all based on one single authority, which has a key escrow problem, that is, the key generation center knows all users’ private keys, an multi-authority attribute-based identification scheme was proposed.Distributed key generation technology was integrated to realize the (t,n) threshold generation mechanism of the user’s private key, which could resist collusion attacks from at most t-1 authorities.Utilizing bilinear mapping, a specific multi-authority attribute-based identification scheme was constructed.The security, computation cost and communication cost of the proposed scheme was analyzed, and it was compared with the same type of schemes.Finally, taking multi-factor identification as an example, the feasibility of the proposed scheme in the application scenario of electronic credentials was analyzed.The result shows that the proposed scheme has better comprehensive performance.…”
Get full text
Article -
6184
Electronic Records Management Practices and Academic Performance of Higher Institutions of Learning: A Case Study of Kabale University.
Published 2024“…The findings revealed a reliance on mass storage devices for data accumulation and a strong emphasis on security and privacy measures by the university. However, inefficiencies were noted due to limited system integration. …”
Get full text
Thesis -
6185
Optimasi Keamanan Web Server Terhadap Serangan Brute-Force Menggunakan Penetration Testing
Published 2023-02-01“…Penetration testing is defined as an official attempt to exploit the system with the aim of finding weaknesses in the web server and improving system security. This penetration test is carried out on a web server which is an Academic Information System at a university. …”
Get full text
Article -
6186
Sentralisasi Pengawasan Informasi Jaringan Menggunakan Blockchain Ethereum
Published 2020-12-01“…The existing researches are unable to provide a secure, centralized monitoring system that satisfies three security aspects, namely: availability, integrity, and confidentiality. …”
Get full text
Article -
6187
-
6188
-
6189
Evaluation of Ecosystem Services and Tradeoff and Synergy in the Alpine and Canyon Region of Southwest China Based on Multi-source Geographic Data
Published 2024-12-01“…[Objective] The alpine and canyon region of Southwest China is a crucial ecological security barrier within the national “Three Zones and Four Belts” strategy, and it plays an essential role in ensuring national ecological security and promoting regional high-quality development. …”
Get full text
Article -
6190
Closed-loop systems for plants expressing animal proteins: a modernized framework to safeguard the future of agricultural innovation
Published 2025-01-01“…By implementing these rigorous systems, the PMF industry can realize its potential to contribute significantly to sustainable agriculture and food security.…”
Get full text
Article -
6191
Long-term volume stability of steel slag sand mortar and concrete
Published 2025-07-01Get full text
Article -
6192
DIGITAL TOOLS FOR MATCHING QUALIFICATIONS TO THE LEVELS OF THE NATIONAL QUALIFICATIONS FRAMEWORK
Published 2024-04-01“…For the most general case of four NQF descriptors, Microsoft Excel macro is developed to secure achieving any level of accuracy. Corresponding API is developed by PHP programming language. …”
Get full text
Article -
6193
Availibilty Pada Aplikasi mobile Banking: Case Study Bank XYZ
Published 2024-02-01“…Unavailability selama periode penelitian terjadi karena aktivitas product development, aktivitas terkait security, production issue, hardware issue dan 3rd party maintenance. …”
Get full text
Article -
6194
Theoretical Aspects of Professional Competence of Police Officers from the Tactical and Operative Response Unit
Published 2021-07-01“…That’s why on purpose of providing civil security and law-and-order guard of the public events in 2017 the new unit of patrol police of tactical-operational respond TOR was organized. …”
Get full text
Article -
6195
Evaluation of vegetable pigeonpea [Cajanus cajan (L.) Millsp] genotypes for yield stability
Published 2021-10-01“…Abstract Background Vegetable pigeonpea is an important food security crop in the marginal dry areas of the Eastern region of Kenya. …”
Get full text
Article -
6196
Comparative study of flexural behaviour of carbon fiber reinforced polymer (CFRP) bars and strands
Published 2025-01-01Get full text
Article -
6197
Pengamanan Citra Digital Menggunakan Kriptografi DnaDan Modified LSB
Published 2024-12-01“…The results indicate that the combination of DNA Cryptography, ACM, LM, and MLSB provides high security and is difficult to breach. …”
Get full text
Article -
6198
Records Keeping and Financial Performance in Local Government: A Case Study of Rubanda District Local Government.
Published 2024“…Other challenges stated were lack of records retention and disposition schedule/ policy. improper security for records, lack of filing manual/finding aids and inadequate storage equipment and solutions to the challenges faced in record keeping at RDLG were, provision of retention and disposition schedule, Lack of Records management policy, Improving security for records, Employing professionally trained record Managers, provision of Filing Manual/Finding Aids and Involvement of manual operations, Training record users on modern record management practices and Installing back up facilities for ICT. …”
Get full text
Thesis -
6199
Records Keeping and Financial Performance in Local Government: A Case Study of Rubanda District Local Government.
Published 2024“…Other challenges stated were lack of records retention and disposition schedule/ policy. improper security for records. lack of filing manual/finding aids and inadequate storage equipment and solutions to the challenges faced in record-keeping at RDLG were the provision of retention and disposition schedule, Lack of Records management policy, Improving security for records, Employing professionally trained record Managers, provision of Filing Manual/Finding Aids and Involvement of manual operations, Training record users on modern record management practices and Installing back up facilities for ICT. …”
Get full text
Thesis -
6200
Factors Associated with Stunting in Children Under Five Years of Age: A Case of Buhara Sub County, Kabale District.
Published 2023“…The household financial security was seen to have influenced household food security, diversification, and supplementation. …”
Get full text
Thesis