Showing 1,901 - 1,920 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 1901
  2. 1902
  3. 1903

    AN ECONOMIC EVALUATION OF THE PERFORMANCE EFFICIENCY OF CONSERVATION AGRICULTURE AND FOOD SECURITY PROJECTS USING LOGISTIC REGRESSION IN IRAQ FOR THE 2022-2023 SEASON by N. S. Noori, B. H. Hameed, M. Kh. Mohammed

    Published 2024-12-01
    “…This research involved an economic evaluation of the performance efficiency of conservation agriculture and food security projects using logistic regression in Iraq for the 2022-2023 agricultural season. …”
    Get full text
    Article
  4. 1904
  5. 1905

    Evaluation of Network Security Service Provider Using 2-Tuple Linguistic Complex q-Rung Orthopair Fuzzy COPRAS Method by Sumera Naz, Muhammad Akram, Mohammed M. Ali Al-Shamiri, Muhammad Ramzan Saeed

    Published 2022-01-01
    “…However, many enterprises lack the necessary resources to secure information security, and selecting the best network security service provider has become a real issue for many enterprises. …”
    Get full text
    Article
  6. 1906
  7. 1907

    A Collaborative Data Network for the Asia Oceania Region Enabled by Emerging Technologies to Foster Innovation in a Secure and Open Environment by Alison Specht, Kim Bryceson, Shoufeng Cao, Margaret O’Brien, S. M. Guru, Pedro Pizzigatti Correa, Michelle Waycott

    Published 2025-01-01
    “…To ensure ownership is always clear, and subsequent use of data is tracked, we harness blockchain technology alongside smart contracts and decentralised identifiers to allow secure discovery and sharing. The use of blockchain will ensure the information about each dataset (metadata, provenance, and access rights) is immutably connected to each dataset. …”
    Get full text
    Article
  8. 1908
  9. 1909
  10. 1910
  11. 1911
  12. 1912

    Secure Communication Scheme Based on a New 5D Multistable Four-Wing Memristive Hyperchaotic System with Disturbance Inputs by Fei Yu, Zinan Zhang, Li Liu, Hui Shen, Yuanyuan Huang, Changqiong Shi, Shuo Cai, Yun Song, Sichun Du, Quan Xu

    Published 2020-01-01
    “…In addition, the circuit implementation scheme is also proposed. Then, a secure communication scheme based on the proposed 5D multistable FWMHS with disturbance inputs is designed. …”
    Get full text
    Article
  13. 1913

    A Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services by charu awasthi, Satya Prakash, Prashant Kumar Mishra

    Published 2024-12-01
    “…With such a wide range of characteristics, new security and privacy concerns arise. Due to the safe transmission, arrival, and access, as well as the availability of medical devices, security creates new issues in the area of healthcare. …”
    Get full text
    Article
  14. 1914
  15. 1915

    Enhancing aviation control security through ADS-B injection detection using ensemble meta-learning models with Explainable AI by Vajratiya Vajrobol, Geetika Jain Saxena, Sanjeev Singh, Amit Pundir, Brij B. Gupta, Akshat Gaurav, Kwok Tai Chui

    Published 2025-01-01
    “…The increasing use of Automatic Dependent Surveillance-Broadcast (ADS-B) technology in flight control systems has created many serious concerns.These weaknesses threaten the security and safety of our aviation industry. Therefore, to enhance aviation control security and better deal with these problems, this research focuses on developing a strong ADS-B injection detection system. …”
    Get full text
    Article
  16. 1916

    Research on optimization of emergency supplies customs clearance strategy from the perspective of public health security based on Chinese trade data by Xia Zheng, Quan Cao, Xin Zhou

    Published 2025-01-01
    “…BackgroundThis study is significant for improving the accuracy of Customs’ cross-border supervision of emergency supplies and ensuring the timely clearance of these essential goods.MethodsTo ensure both the convenience and security of Customs oversight regarding emergency supplies, this study first systematically collects and organizes representative data on the import and export trade of these supplies. …”
    Get full text
    Article
  17. 1917

    “Sustainable security” through river enlargements: A political ecology of nature-based solutions and flood control in the Rhone Valley, Switzerland by Alexis Metzger, René Véron

    Published 2023-10-01
    “…The largest ongoing river training project in Switzerland, the so-called Third Correction of the Rhone in the Valais, builds on nature-based solutions (river enlargements and renaturation) while official documents and discourses also refer to an ill-defined notion of “sustainable security” and the goal of controlling floods. Drawing on qualitative data from stakeholder interviews and analysis of official documents, this paper examines the concept of sustainable security, as it is applied to the river project in terms of a balance between security and environmental concerns, the relationship between the three pillars of sustainability, and the opportunities of the population to debate the spatial development of the Rhone Valley. …”
    Get full text
    Article
  18. 1918
  19. 1919

    A secure and energy-efficient routing using coupled ensemble selection approach and optimal type-2 fuzzy logic in WSN by S. Ambareesh, Pundalik Chavan, S. Supreeth, Rajesh Nandalike, P. Dayananda, S. Rohith

    Published 2025-01-01
    “…This research contributes significantly to the WSN field by providing a comprehensive routing solution that integrates energy conservation, security, and QoS, ultimately extending the lifespan of WSNs and boosting confidence in critical applications, paving the way for implementation scenarios that require secure, low-power, and real-time data transmission.…”
    Get full text
    Article
  20. 1920

    An Intelligent Big Data Security Framework Based on AEFS-KENN Algorithms for the Detection of Cyber-Attacks from Smart Grid Systems by Sankaramoorthy Muthubalaji, Naresh Kumar Muniyaraj, Sarvade Pedda Venkata Subba Rao, Kavitha Thandapani, Pasupuleti Rama Mohan, Thangam Somasundaram, Yousef Farhaoui

    Published 2024-06-01
    “…Here, an AdaBelief Exponential Feature Selection (AEFS) technique is used to efficiently handle the input huge datasets from the smart grid for boosting security. Then, a Kernel based Extreme Neural Network (KENN) technique is used to anticipate security vulnerabilities more effectively. …”
    Get full text
    Article