Showing 7,721 - 7,740 results of 9,720 for search '"Securities ', query time: 0.11s Refine Results
  1. 7721

    “FREQUENT FARMERS AND FULANI-HERDSMEN CLASH IN EDO NORTH SENATORIAL DISTRICT” by SUNDAY OMOAFENA IMANAH, JACOB O. OSUINDE

    Published 2024-07-01
    “…This research contribution to knowledge is on the importance of the activities of local vigilante, youth groups and community rulers in security management The Government should encourage them to build more on peace, growth and development in Edo North Senatorial District of Edo Stat for safety purpose. …”
    Get full text
    Article
  2. 7722

    Exploring the vulnerability in the inference phase of advanced persistent threats by Qi Wu, Qiang Li, Dong Guo, Xiangyu Meng

    Published 2022-03-01
    “…The Internet of Things device such as sensors is weaker than host in security. In the field of advanced persistent threat detection, most works used machine learning methods whether host-based detection or network-based detection. …”
    Get full text
    Article
  3. 7723
  4. 7724

    Public and Service Activity of the Ministry of Internal Affairs of Ukraine: Current Issues by O. V. Dzhafarova, O. O. Mozhovyi

    Published 2020-06-01
    “…It has been emphasized that the content of public and service activity of the Ministry of Internal Affairs of Ukraine is: a) a separate function of the service state, the content of which is to change the ideology, forms and methods in the work of law enforcement agencies; b) one of the externally-oriented functions of a specially created state institution along with such functions as regulatory, supervisory and law enforcement, c) the basis for the authorized entity to implement the tasks and functions of the state to ensure human rights and freedoms, as well as the interests of society and the state, keeping public order and security, combating crime, d) high-quality and affordable provision of administrative services to specific individuals in the form of licensing, registration and other similar actions in the law enforcement sphere.…”
    Get full text
    Article
  5. 7725

    Authenticated encryption mode with blocks skipping by A. V. Sokolov, D. A. Isakov

    Published 2021-10-01
    “…Block symmetric ciphers are one of the most important components of modern information security systems. At the same time, in addition to the structure of the applied block symmetric cipher, the cryptographic strength and performance of the information protection system is largely determined by the applied encryption mode. …”
    Get full text
    Article
  6. 7726

    Local Perception on Effect of Land Degradation in the Blue Nile River Headwaters by Alelgn Ewuntu Temesgen

    Published 2022-10-01
    “…These resulted in the decline in households’ food security and net income over the last 10 years. The finding showed that farmers used traditional ditche, hillside terrace, soil bund, stone bund, check dam, and waterway to reduce land degradation.  …”
    Get full text
    Article
  7. 7727

    Fatigue crack paths under the influence of changes in stiffness by G. Kullmer, B. Schramm, H. A. Richard

    Published 2016-02-01
    “…Regions with differing stiffness also arise from ribs, grooves or boreholes. Since secure findings on the propagation behaviour of fatigue cracks are essential for the evaluation of the safety of components and structures, the growth of cracks near changes in stiffness has to be considered, too. …”
    Get full text
    Article
  8. 7728

    Analysis of the spatial distribution of Police Stations on services to vulnerable urban areas (Case Study: Urmia City) by Ahmad Aftab, Ali Akbar Taghilo, Akbar Houshmand

    Published 2024-09-01
    “…The continuous and active presence of disciplinary centers has an important role in ensuring security and peace in cities.Therefore the fair and efficient distribution of law enforcement centers in urban areas is an important factor in meeting this basic need.Therefore, the present study aims to investigate the service of police stations on vulnerable areas of Urmia.The descriptive-analytical research method used in this study is applied.The results of the study show that the vulnerability zoning of the city of Urmia is in four categories from very high to very low. …”
    Get full text
    Article
  9. 7729

    “They Threw Her in with the Prostitutes!”: Negotiating Respectability between the Space of Prison and the Place of Woman in Egypt (1943–1959) by Hannah Elsisi

    Published 2020-03-01
    “…The memoirs of political prisoners generally articulate the struggle of dissident individuals and political groups to attain a set of basic and often recurrent goals: freedom of expression and affiliation, social and economic security, humane treatment and the right to have a say in the management of state and society.1 This applies to both men's and women’s memoirs. …”
    Get full text
    Article
  10. 7730

    Susceptibility Evaluation of Fall Armyworm (Spodoptera frugiperda) Infesting Maize in Kenya against a Range of Insecticides by Savinda Njeri Gichere, Kakai Shem Khakame, Okoth Patrick

    Published 2022-01-01
    “…The fall armyworm infestation has greatly threatened food security in Kenya. Consequently, this has heightened the need to evaluate the susceptibility of the fall armyworm to commonly used insecticides in Kenya. …”
    Get full text
    Article
  11. 7731

    The Role of Slum Tourism in Sustainable Urban Development of Slum Areas in Iraq by Al-Taee Omaima, Jaleel Ameera

    Published 2024-12-01
    “…Iraq suffers from spread of slums around cities with a clear shortage of tourist facilities; difficult access; loss of security and safety; weak marketing and promotion; and the need for organization and integrated management. …”
    Get full text
    Article
  12. 7732
  13. 7733

    KNOWLEDGE AND READINESS OF ADOLESCENTS AS PROSPECTIVE BRIDES AND GROOMS IN STUNTING PREVENTION EFFORTS by Suryani Hartati, Amellia Mardhika, Ajeng Dwi Retnani

    Published 2024-10-01
    “…The target of the Sustainable Development Goals (SDGs) in 2030 includes the second goal, eliminating hunger and all forms of malnutrition and achieving food security, reducing stunting rates by 40% by 2025. The purpose of this study is to analyze the level of knowledge and readiness of adolescents to become prospective brides in an efforts to prevent stunting. …”
    Get full text
    Article
  14. 7734

    APPROACHES TO THE SETTLEMENT OF THE NUCLEAR CRISIS ON THE KOREAN PENINSULA: AN ECONOMIC ASPECT by L. V. Zakharova

    Published 2018-11-01
    “…A nuclear crisis on the Korean peninsula was primarily caused by security reasons. However, from the very beginning an economic component has been inextricable part of any settlement plan. …”
    Get full text
    Article
  15. 7735

    University Social Responsibility during The Covid-19 Pandemic: Lessons from the Indonesian Context by yeni rosilawati, Zain Rafique, Atik Septi Winarsih

    Published 2022-06-01
    “…During the Covid-19 pandemic, social responsibility has become a key subject since it refers to the contribution of non-state actors in resolving the pandemic impact, becoming a non-traditional security issue. One non-state actor playing a significant role in society is educational institutions through university social responsibility (USR) programs. …”
    Get full text
    Article
  16. 7736
  17. 7737

    CONTRACTUALISTIC MEASUREMENTS OF THE GENDER: POSSIBILITIES AND BORDERS by D. V. Usov

    Published 2019-06-01
    “…Significance of the gender community for the sociocultural and existential identity of the individual enables (through organic, life-world belonging to a certain tradition and culture) his/her security and the ability to adequately orient in difficult life situations. …”
    Get full text
    Article
  18. 7738
  19. 7739

    Research on multi-stream variable resolution compression and transmission technology based on scene elements in Internet of things environment by Shangwu XIAO, Ruimin HU, Yu CHEN, Jing XIAO

    Published 2018-12-01
    “…In response to the demand of wide coverage and massive access,low bandwidth and low power consumption is an important research direction to solve this problem.In smart cities,security monitoring and other application areas,video surveillance based on the region of interest of the face are particularly important.It is a feasible direction to realize the extraction of scene elements,transmission of key information with very low bandwidth and the application of video technology in the Internet of things environment through the strategy of multi-stream differential coding.By designing a face-oriented variable resolution hybrid coding algorithm,the bandwidth could be saved and the power consumption could be reduced greatly,the access requirements of narrowband Internet of things could be met.Through the face detection algorithm based on the deep learning Caffe framework,the face region of interest was acquired in key frames,and the face image was encoded with high resolution.By designing the code rate adaptive allocation algorithm,the bandwidth was utilized rationally,and the encoded face information and the full background content were distinguished.The encoded mixed code stream information was transmitted through the narrowband; the key frame-based face enhancement decoding algorithm was adopted at the receiving end to obtain a partial HD high-definition monitoring picture.Experiments show that when the video encoded by the proposed method is transmitted in a narrow band whose transmission rate is 120~160 kbit/s,the face image can maintain the same definition as the original HD monitoring acquisition end,which has strong practicability.…”
    Get full text
    Article
  20. 7740

    Application of real options valuation in nuclear energy systems by Abdollah Arasteh

    Published 2024-09-01
    “…Nuclear power has been re-evaluated as a viable alternative to fossil fuels due to growing energy costs, climate change, and concerns about supply security. The present implementation of economies of scale has led to the development of a Light Water Reactor (LWR) design that lacks the ability to assess the strategic advantage and economic potential of contemporary nuclear systems. …”
    Get full text
    Article