Showing 1,841 - 1,860 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 1841
  2. 1842
  3. 1843
  4. 1844

    Practice of Administrative and Jurisdictional Activity of Community Police Officers – Integral Part of the Principles for the Formation of Local and State Security Policy by M. V. Kalashnyk

    Published 2021-07-01
    “…The author has outlined the perspectives for more effective involvement of local residents into formation of local and state security policy through new mechanisms of cooperation with local communities and civil society institutions developed by the practice of police officers of territorial communities; the author has provided a number of propositions for the development of regulatory legal documents that would regulate the activities of community police officers. …”
    Get full text
    Article
  5. 1845
  6. 1846
  7. 1847

    The interrelationship between food security, climate change, and gender-based violence: A scoping review with system dynamics modeling. by Pooja Agrawal, Lori Ann Post, Janis Glover, Denise Hersey, Piya Oberoi, Brian Biroscak

    Published 2023-01-01
    “…Findings from this review suggest that the development and adaptation of evidence-based, focused interventions and policies to reduce the effects of climate shocks and bolster food security may ultimately decrease GBV prevalence and impact.…”
    Get full text
    Article
  8. 1848

    Evaluation of land ecological security and driving factors in the Lower Yellow River Flood Plain based on quality, structure and function by Ge Zhai, Peng Ren, Ruihai Zhang, Bei Wang, Maoxin Zhang, Tingting He, Jinliang Zhang

    Published 2025-01-01
    “…Abstract Land ecological security (LES) is crucial for human well-being and sustainable development, especially in areas like the Lower Yellow River Flood Plain (LYRFP), which faces flood threats, economic challenges, and ecological fragility. …”
    Get full text
    Article
  9. 1849

    Practical security of twin-field quantum key distribution with optical phase-locked loop under wavelength-switching attack by Qingquan Peng, Jiu-Peng Chen, Tianyi Xing, Dongyang Wang, Yizhi Wang, Yang Liu, Anqi Huang

    Published 2025-01-01
    “…Through this study, we highlight the importance of system calibration in the practical security in TF-class QKD implementation.…”
    Get full text
    Article
  10. 1850

    Covid-19 impact on food security and households poverty of red upland rice farmer in Semanu District, Gunungkidul Regency by Rahayu Lestari, Ayu Larasati Damas, Rozaki Zuhud, Wijaya Oki, Wisnu Rubiyanto Cahyo

    Published 2025-01-01
    “…This study aims to determine the food security and poverty of red upland rice farmer households before and during COVID-19 and the factors that affect household food security. …”
    Get full text
    Article
  11. 1851
  12. 1852
  13. 1853
  14. 1854

    Characteristics of chicken production systems in rural Burkina Faso: A focus on One Health related practices and food security. by Michel Dione, Guy Ilboudo, Abdoul Aziz Ouedraogo, Sidonie Aristide Ima, Brice Ouedraogo, Theodore Knight-Jones, Assèta Kagambèga, Robyn Alders

    Published 2025-01-01
    “…With locally adapted interventions that build one a One Health approach, village chicken keeping has the potential to secure and greatly improve smallholder livelihoods and household food security, while preserving public health in Burkina Faso.…”
    Get full text
    Article
  15. 1855
  16. 1856
  17. 1857

    Observer-Based PID Security Control for Discrete-Time T-S Fuzzy Systems under Distributed Dynamic Event-Triggered Mechanism by Sisi Lin, Mengzhuo Luo, Shouming Zhong, Kaibo Shi, Xingxu Tan

    Published 2022-01-01
    “…This study addresses the observer-based proportional-integral-derivative (PID) security control problem for nonlinear discrete-time fuzzy systems subject to deception attacks. …”
    Get full text
    Article
  18. 1858
  19. 1859
  20. 1860

    SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization by Nitish Das, Aruna Priya Panchanathan

    Published 2021-09-01
    “…A state encoding approach is applied for FSM security and optimization. This article proposes the security‐dominated FSM state assignment technique (SD‐SHO), which obtains a satisfactory level of FSM optimization as well. …”
    Get full text
    Article