Showing 1,801 - 1,820 results of 9,720 for search '"Securities ', query time: 0.13s Refine Results
  1. 1801
  2. 1802
  3. 1803
  4. 1804
  5. 1805

    Zakat-based urban farming: A tool for poverty alleviation, community empowerment, financial inclusion, and food security by Kinan Salim, Baharom Abdul Hamid, Ziyaad Mahomed, Wiaam Hassan

    Published 2024-03-01
    “… Purpose – This study introduces a zakat-based model aimed at poverty reduction and enhancing food security in urban settings. Drawing upon the principles of Islamic social finance, the model integrates urban farming with the utilization of zakat, charity, and corporate social responsibility funds, offering sustainable financial avenues for disadvantaged individuals and social enterprises. …”
    Get full text
    Article
  6. 1806

    Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network by Xiujie Zhang, Xingbing Fu, Lu Hong, Yu Liu, Liangliang Wang

    Published 2020-06-01
    “…To address the above security challenge, we put forth the first continual leakage-resilient identity-based online/offline encryption scheme which is suitable for ensuring secure communications in wireless sensor networks. …”
    Get full text
    Article
  7. 1807
  8. 1808
  9. 1809

    Assessment of food provider ecosystem services as food security in modern industrial estate planning at Muaro Jambi Regency by Hindayani Purna, Pratama Armandha Redo

    Published 2024-01-01
    “…This research aims to determine the food carrying capacity and environmental suitability of Kemingking Dalam Village in Muaro Jambi Regency for maintaining food security amidst planned modern industrial developments. …”
    Get full text
    Article
  10. 1810
  11. 1811
  12. 1812
  13. 1813

    A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices by Metin Varan, Akif Akgul, Fatih Kurugollu, Ahmet Sansli, Kim Smith

    Published 2021-01-01
    “…In this study, a two-way secure communication methodology underpinned by a chaos-based encryption algorithm for PMU devices is proposed. …”
    Get full text
    Article
  14. 1814

    “An Endless Cycle of Worry and Hardship”: The Impact of COVID-19 on the Food Security of Somali Migrants and Refugees in Nairobi, Kenya by Zack Ahmed, Jonathan Crush, Bernard Owusu

    Published 2025-01-01
    “…Based on the results of a household survey and in-depth interviews with Somali migrants in Nairobi, Kenya in August 2022, this study documents the pandemic-related experience of these migrants in food access and consumption and assesses the overall impacts of COVID-19 on their food security. This study seeks to contribute to the emerging body of case study evidence that assesses the food security outcomes of the pandemic in vulnerable populations. …”
    Get full text
    Article
  15. 1815
  16. 1816
  17. 1817

    Method on Efficient Operation of Multiple Models for Vision-Based In-Flight Risky Behavior Recognition in UAM Safety and Security by Byeonghun Kim, Byeongjoon Noh, Kyowon Song

    Published 2024-01-01
    “…Recently, with the significant spread of technology in the field of computer vision, research has been conducted to manage passenger safety and security with vision-based approaches. Previous research predominantly focuses on single-task vision models, which limits their ability to comprehensively recognize various situations. …”
    Get full text
    Article
  18. 1818
  19. 1819

    Changing Diets, Varying Food Consumption Patterns, and Food Security among Recent Zimbabwean Migrants in Windhoek, Namibia by Godfrey Tawodzera

    Published 2025-01-01
    Subjects: “…migration, poverty, food security, dietary changes, food consumption patterns…”
    Get full text
    Article
  20. 1820

    Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS) by Pi-Yun Chen, Yu-Cheng Cheng, Zi-Heng Zhong, Feng-Zhou Zhang, Neng-Sheng Pai, Chien-Ming Li, Chia-Hung Lin

    Published 2024-01-01
    “…Then, a machine learning - based model was employed to train the encryptor and decryptor for both biosignals and image infosecurity. After secure - data transmission, a case study is conducted for classifying medical images. …”
    Get full text
    Article