Showing 1,881 - 1,900 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 1881
  2. 1882

    A Secure Application for Information Sharing i n Organizations: A Case Study of Kabale District Local Government by Ivan, Niyonzima, Godfrey, Omoda Onyait

    Published 2019
    Subjects: “…A secure Application; Information Sharing; organizations; Crypto-graphical Methods…”
    Get full text
    Article
  3. 1883
  4. 1884
  5. 1885

    Study on enhancing integrity for BLP model by LIU Yan-ming, DONG Qing-kuan, LI Xiao-ping

    Published 2010-01-01
    Subjects: “…information security…”
    Get full text
    Article
  6. 1886
  7. 1887
  8. 1888
  9. 1889
  10. 1890
  11. 1891

    Deciphering the potential of plant metabolites as insecticides against melon fly (Zeugodacus cucurbitae): Exposing control alternatives to assure food security by Zinat Jahan Chowdhury, Anik Banik, Tanjin Barketullah Robin, Mohammed Rashed Chowdhury

    Published 2025-01-01
    “…In the absence of effective biological or chemical controls, the melon fly poses a significant threat to food security, particularly impacting cucurbit crops in tropical and subtropical regions. …”
    Get full text
    Article
  12. 1892

    Does welfare technology contribute to security, activity, participation and independence within municipal elder care? A qualitative study protocol by Ingrid Hellström, Johannes Österholm, Åsa Larsson Ranada, Katarina Baudin, Vedrana B Baric

    Published 2025-02-01
    “…However, the perspectives of older persons, significant others, staff and decision-makers’ on the aspects of security, activity, independence and participation that WT aims to influence needs further investigation. …”
    Get full text
    Article
  13. 1893
  14. 1894
  15. 1895
  16. 1896

    Enhancing security and efficiency in Mobile Ad Hoc Networks using a hybrid deep learning model for flooding attack detection by Pramodh Krishna D., E. Sandhya, Khaja Shareef Sk, Srihari Varma Mantena, Venkata Subbaiah Desanamukula, Ch Koteswararao, Srinivasa Rao Vemula, Maruthi Vemula

    Published 2025-01-01
    “…The comprehensive evaluation using MATLAB R2023a validates the proposed approach as an effective and energy-efficient solution for enhancing MANET security.…”
    Get full text
    Article
  17. 1897

    Global challenges facing plant pathology: multidisciplinary approaches to meet the food security and environmental challenges in the mid-twenty-first century by Michael Jeger, Robert Beresford, Clive Bock, Nathan Brown, Adrian Fox, Adrian Newton, Antonio Vicent, Xiangming Xu, Jonathan Yuen

    Published 2021-05-01
    “…This review discussed recent developments in plant pathology research and identifies some key issues that, we anticipate, must be faced to meet the food security and environmental challenges that will arise over coming decades. …”
    Get full text
    Article
  18. 1898
  19. 1899

    Technologies of psychological rehabilitation of a personality after traumatic events (on the example of the rehabilitation programme for psychologists of the security and defence sector of Ukraine) by N. E. Miloradova, V. V. Dotsenko

    Published 2024-12-01
    “…Today, psychologists in the security and defence sector of Ukraine work in extremely difficult conditions, providing psychological support to the military, who face various stressful situations. …”
    Get full text
    Article
  20. 1900

    Keamanan Data Menggunakan Secure Hashing Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) pada Digital Signature by Juniar Hutagalung, Puji Sari Ramadhan, Sarah Juliana Sihombing

    Published 2023-12-01
    “… Penelitian ini mempelajari bagaimana kriptografi menggunakan Secure Hash Algorthm 256 (SHA-256) dan Rivest Shamir Adleman (RSA) untuk menjaga keaslian Surat Keterangan Lulus (SKL) dengan menggunakan kode Quick Response (QR) berbasis web. …”
    Get full text
    Article