Showing 6,661 - 6,680 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 6661

    An Enhanced Sine Cosine Algorithm for Feature Selection in Network Intrusion Detection by zahra asgari varzaneh, soodeh hosseini

    Published 2024-12-01
    “…For computer networks to remain secure, intrusion detection is essential. Analyzing network traffic data is part of this activity to spot possible cyber threats. …”
    Get full text
    Article
  2. 6662

    Challenges to patients’ rights during the COVID-19 pandemic: survey of public perceptions in North Macedonia by Katerina Kuzmanova, Aleksandar Dimkovski, Evgenija Mihajloska, Aleksandra Grozdanova, Katerina Anchevska Netkovska

    Published 2024-12-01
    “…Although 72.4% felt adequately informed about their care throughout all phases, just under half (47.6%) were aware of their healthcare and insurance rights and the procedures to secure them. Two-thirds (67.6%) reported that their autonomy was respected despite restrictive measures, and over 70% believed their privacy was maintained. …”
    Get full text
    Article
  3. 6663

    Binary Image Data Hiding Using Matrix Encoding Technique in Sensors by Phan Trung Huy, Cheonshik Kim

    Published 2013-11-01
    “…It is very important to protect the copyright of digital images in wireless transmission, because people often use a smart phone in their daily life. Traditional security schemes are computationally expensive, and they introduce overhead, which shortens the life of the image sensors. …”
    Get full text
    Article
  4. 6664

    The role of agriculture in Nepal's economic development: Challenges, opportunities, and pathways for modernization by Lokendra Nath Yogi, Tara Thalal, Sarada Bhandari

    Published 2025-01-01
    “…These problems prevent agriculture from realizing its full potential to advance economic development, reduce poverty, and provide food security. Modernization requires increasing productivity through mechanization, expanding infrastructure, and improving market accessibility. …”
    Get full text
    Article
  5. 6665

    The KnowWhereGraph ontology by Cogan Shimizu, Shirly Stephen, Adrita Barua, Ling Cai, Antrea Christou, Kitty Currier, Abhilekha Dalal, Colby K. Fisher, Pascal Hitzler, Krzysztof Janowicz, Wenwen Li, Zilong Liu, Mohammad Saeid Mahdavinejad, Gengchen Mai, Dean Rehberger, Mark Schildhauer, Meilin Shi, Sanaz Saki Norouzi, Yuanyuan Tian, Sizhe Wang, Zhangyu Wang, Joseph Zalewski, Lu Zhou, Rui Zhu

    Published 2025-01-01
    “…These have been leveraged through the graph by a variety of applications to address challenges in food security and agricultural supply chains; sustainability related to soil conservation practices and farm labor; and delivery of emergency humanitarian aid following a disaster. …”
    Get full text
    Article
  6. 6666
  7. 6667

    Optimizing Credit Card Fraud Detection: A Genetic Algorithm Approach with Multiple Feature Selection Methods by Sunil Kumar Patel, Devina Panday

    Published 2024-12-01
    “…To protect our financial security, it is crucial to develop robust and accurate fraud detection systems that stay one step ahead of the fraudsters. …”
    Get full text
    Article
  8. 6668

    A fuzzy logic-based risk evaluation and precaution level estimation of explosive, flammable, and toxic chemicals for preventing damages by Abdul Aziz, Md Masum Suzon, Rakib Hasan

    Published 2025-01-01
    “…Using the calculated risk value and the location of the chemical industry as input variables, precaution level can be determined. Security arrangements have been recommended based on the different precaution levels so that industries can take appropriate measures according to the calculated results. …”
    Get full text
    Article
  9. 6669

    Perspectives of Mediation as a Consensual Dispute Resolution Tool under the Convention on the Civil Aspects of International Child Abduction by A. P. Klementiev, A. A. Ilkevich

    Published 2024-01-01
    “…The authors justify the advantages of mediation with a view to secure the best interests of a child. In particular, mediation may facilitate more expedited return of a child when compared to court procedures as well as exert a positive impact on its emotional status. …”
    Get full text
    Article
  10. 6670

    Challenges and opportunities of artificial intelligence in African health space by Muslim A. Alaran, Salim Kamaludeen Lawal, Mustapha Husseini Jiya, Salihu Alhassan Egya, Mohamed Mustaf Ahmed, Abdullateef Abdulsalam, Usman Abubakar Haruna, Muhammad Kabir Musa, Don Eliseo Lucero-Prisno

    Published 2025-01-01
    “…Ethical guidelines are needed to ensure AI decisions align with medical standards and patient autonomy. Strict privacy and security controls are crucial to protecting sensitive health data. …”
    Get full text
    Article
  11. 6671

    Identifying barriers in the field of electronic payments based on blockchain technology: A multi-criteria decision-making approach by Amir Mohammad Yektaei Rudsari, Naser Safaei, Majid Mirzaei Ghazani

    Published 2024-08-01
    “…Some of these obstacles include technical, technological, organizational, financial and security problems. To identify and prioritize these obstacles and solve them, multi-criteria decision-making methods can be useful.In this research, in order to identify and rank the factors of obstacles related to electronic payments based on blockchain technology, the Delphi method has been used. …”
    Get full text
    Article
  12. 6672

    Digital Sociability: Implications of the COVID-19 Pandemic among Young Adults by Gledson Martins de Jesus, Eduardo Name Risk

    Published 2025-01-01
    “…The results suggest that young people live ambiguously with the sense of security provided by social networks while feeling anxious about the judgment of others regarding their posts.…”
    Get full text
    Article
  13. 6673

    Extremism and Non-Development: Utilizing Sustainable Development as an Approach to Combat Extremism by Roya Jafari, Mehdi Zakerian Amiri

    Published 2024-03-01
    “…Today extremism and any type of violent activities based on extremist idea have been become to one of the most controversial Threats to international peace and security. Combating this phenomenon is not properly successful by responsive measure, so its recommended by International intuitions that anti-extremist measures need to utilize a comprehensive policy that encompass all dimension and related matters in addition to suppressive measures, the policy has to consider preventive one. …”
    Get full text
    Article
  14. 6674

    The potential of the municipality of Trstenik for the development of the wine tourism by Stojković Jelena, Milićević Snežana

    Published 2024-01-01
    “…The results of the research are significant as they can assist tourism organization as well as municipal officials to make up a strategy for the development of wine tourism which would secure a significant position on the Serbian wine tourism map for the Trstenik wine district.…”
    Get full text
    Article
  15. 6675
  16. 6676

    The usability and technology acceptance of immersive virtual reality simulation for critical infrastructure workers by Andrzej Grabowski

    Published 2024-09-01
    “…Training is crucial for ensuring the safety, security, and efficiency of critical infrastructure systems and their employees. …”
    Get full text
    Article
  17. 6677

    Time-and-ID-Based Proxy Reencryption Scheme by Kambombo Mtonga, Anand Paul, Seungmin Rho

    Published 2014-01-01
    “…We prove that our scheme is semantically secure in the standard model.…”
    Get full text
    Article
  18. 6678

    THE EFFECT OF PRECIPITATION VARIABILITY AND CHANGE ON THE INCREASING DROUGHT RISK IN SOME CLIMATIC REGIONS IN SYRIA DURING THE PERIOD 1958-2018 by M. E. Skaff, L. E. Abboud, E. E. Mahfoud, R. A. Saker

    Published 2024-12-01
    “…Descriptive statistical analysis with T-test was also used to compare the values of the drought index between the periods 1958-1988 and 1988-2018.Results showed increasing annual drought severity related to decreasing tendency in drought index values especially in spring and winter in all regions, and increment in extreme drought frequency versus diminishing frequency of extreme moisture.These changes to drier conditions in all studied regions will negatively affect water resources availability, agricultural production, and ecosystems stability and productivity, which threaten water and food security, and will Pose grand challenges to manage environmental resources in the future.…”
    Get full text
    Article
  19. 6679

    Energy Efficient Partial Permutation Encryption on Network Coded MANETs by Ali Khan, Qifu Tyler Sun, Zahid Mahmood, Ata Ullah Ghafoor

    Published 2017-01-01
    “…Mobile Ad Hoc Networks (MANETs) are composed of a large number of devices that act as dynamic nodes with limited processing capabilities that can share data among each other. Energy efficient security is the major issue in MANETs where data encryption and decryption operations should be optimized to consume less energy. …”
    Get full text
    Article
  20. 6680