Showing 1,741 - 1,760 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 1741

    Climate change–Drylands–Food Security Nexus in Africa: From the Perspective of Technical Advances, Challenges, and Opportunities. by Hirwa, Hubert, Fadong, Li, Qiao, Yunfeng, Measho, Simon, Muhirwa, Fabien, Tian, Chao, Leng, Peifang

    Published 2024
    “…Climate change impacts on drylands pose more vexing risks to socio-ecological systems, resulting in food security issues, biodiversity loss, and livelihood shifts in Africa. …”
    Get full text
    Article
  2. 1742
  3. 1743
  4. 1744
  5. 1745

    A semi-synchronous federated learning framework with chaos-based encryption for enhanced security in medical image sharing by Animesh Roy, Deva Raj Mahanta, Lipi B. Mahanta

    Published 2025-03-01
    “…Protecting sensitive health information and promoting clinical research depend on medical data security. This paper suggests an innovative framework that integrates healthcare engineering, chaotic encryption, and artificial intelligence (AI) to address the privacy issue of medical data. …”
    Get full text
    Article
  6. 1746
  7. 1747
  8. 1748
  9. 1749

    Systematic Review of Usability Factors, Models, and Frameworks with Blockchain Integration for Secure Mobile Health (mHealth) Applications by Irum Feroz, Nadeem Ahmad

    Published 2024-12-01
    “…Blockchain integration emerged as a promising approach to improve data security, interoperability, and user trust, particularly for older adults who engage with complex, multimodal health data. …”
    Get full text
    Article
  10. 1750
  11. 1751
  12. 1752
  13. 1753

    Systems resource allocation algorithm for RIS-assisted D2D secure communication based on parallel CNN by Zhengyu ZHU, Gengwang HOU, Chongwen HUANG, Gangcan SUN, Wanming HAO, Jing LIANG

    Published 2022-03-01
    “…To meet the requirements of intelligent signal processing and physical layer security, aiming at the shortage of spectrum resources, a resource allocation algorithm for reconfigurable intelligent surface (RIS)-assisted the device to device (D2D) communication was proposed.D2D users communicated by multiplexing the spectrum resources of cellular users.Considering the constraints of D2D transmission rate, base station transmission power and RIS transmission phase shift, the problem of maximizing user security rate was formulated.To solve the nonlinear programming problem, a parallel convolutional neural network (CNN) algorithm was proposed to obtain the optimal resource allocation scheme.Simulation results show that the parallel CNN algorithm can effectively improve the secrecy rate and it is significantly better than other benchmark algorithms.…”
    Get full text
    Article
  14. 1754

    Harnessing the potential of shared data in a secure, inclusive, and resilient manner via multi-key homomorphic encryption by David Ha Eun Kang, Duhyeong Kim, Yongsoo Song, Dongwon Lee, Hyesun Kwak, Brian W. Anthony

    Published 2024-06-01
    “…Using the AI4I public predictive maintenance dataset, we demonstrate the MK-HELR algorithm, setting the stage for further research in secure, dynamic, and collaborative multi-party learning scenarios.…”
    Get full text
    Article
  15. 1755
  16. 1756

    Optimal Information Hiding: Advanced Bitstream-Based Watermarking for Secure and Efficient Integration of Image Data in Digital Videos by null Ramyashree, Venugopala P. S., Raghavendra S., null Sarojadevi

    Published 2024-01-01
    “…The outcomes underscore its practical viability for copyright protection, contributing to a more secure digital media landscape.…”
    Get full text
    Article
  17. 1757
  18. 1758

    EMPOWERMENT STRATEGY THROUGH THE ROLE OF THE TERRITORIAL TASK FORCE IN HANDLING SOCIAL AND SECURITY CONFLICT IN PUNCAK JAYA DISTRICT by Agustina Setiawan, Mamat Sonjaya, Dicky Febriansyah Rokhmat

    Published 2024-12-01
    “…This research aims to analyze the strategy for empowering the Papua defense region through the role of the Territorial Task Force in handling social and security conflicts in Puncak Jaya Regency. This research uses Strategy theory according to Thomas Schelling, namely management instruments for survival and winning competition. …”
    Get full text
    Article
  19. 1759

    EFFECT OF TRAINING ON CAREER PERFORMANCE OF NIGERIA SECURITY AND CIVIL DEFENSE CORPS (NSCDC) PERSONNEL IN KADUNA STATE COMMAND by LEKSHUM SUNDAY AMOS

    Published 2022-12-01
    “…It recommended among others that the NSCDC as a security organization should organize training on regular basis to improve the career performance of personnel of their organization in view of the current security challenges facing the country. …”
    Get full text
    Article
  20. 1760