Showing 2,441 - 2,460 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 2441

    La crise de l’oléoduc Edjeleh-Gabès : Au cœur des enjeux de souveraineté du Maghreb (1954-1962) by Sarah Adjel-Debbich

    Published 2018-06-01
    “…While the French-Libyan discussions (1954-1956) were retaining the attention of French oil companies, Paris was focusing on securing the evacuation of oil from the Algerian Sahara during the Algerian War (1954-1962). …”
    Get full text
    Article
  2. 2442

    Sensor Relocation Technique Based Lightweight Integrated Protocol for WSN by J. Joy Winston, B. Balan Paramasivan

    Published 2014-06-01
    “…However, this approach fails to focus on connectivity issue due to node migration and secured communication too, which may compromise our collecting data. …”
    Get full text
    Article
  3. 2443

    Innovative Technologies for Improved Water Productivity and Climate Change Mitigation, Adaptation, and Resilience: A Review by E. Oiganji, H. Igbadun, P. S. Amaza, R. Z. Lenka

    Published 2025-02-01
    “… Water scarcity, exacerbated by climate change, poses severe challenges to agriculture, food security, and sustainable development, particularly in vulnerable regions. …”
    Get full text
    Article
  4. 2444

    Deep Learning-Based Intrusion Detection System for Detecting IoT Botnet Attacks: A Review by Tamara Al-Shurbaji, Mohammed Anbar, Selvakumar Manickam, Iznan H Hasbullah, Nadia Alfriehat, Basim Ahmad Alabsi, Ahmad Reda Alzighaibi, Hasan Hashim

    Published 2025-01-01
    “…Ultimately, this survey serves as a guideline for future researchers, contributing to the advancement of botnet detection methods in IoT environments and enhancing security against botnet threats.…”
    Get full text
    Article
  5. 2445

    Edge computing for detection of ship and ship port from remote sensing images using YOLO by Vasavi Sanikommu, Sai Pravallika Marripudi, Harini Reddy Yekkanti, Revanth Divi, R. Chandrakanth, P. Mahindra

    Published 2025-02-01
    “…In marine security and surveillance, accurately identifying ships and ship ports from satellite imagery remains a critical challenge due to the inefficiencies and inaccuracies of conventional approaches. …”
    Get full text
    Article
  6. 2446

    Blockchain adoption factors by Carlos Bernardino, Francisco Cesário, Carlos J. Costa, Manuela Aparicio, João Tiago Aparicio

    Published 2025-01-01
    “…Trust significantly enhances this intention, underscoring the importance of confidence in the technology's reliability and security. Environmental Concerns present a barrier, suggesting sustainability perceptions can deter adoption. …”
    Get full text
    Article
  7. 2447

    Quantum Computing for Advanced Driver Assistance Systems and Autonomous Vehicles: A Review by Avantika Rattan, Abhishek Rudra Pal, Muralimohan Gurusamy

    Published 2025-01-01
    “…The perks of quantum computation (QC) over classical systems are apparent with respect to security, privacy, and an exponentially high computation rate. …”
    Get full text
    Article
  8. 2448

    Aid Effectiveness: From Project Appraisal to Strategic Impact Evaluation by D. A. Degterev

    Published 2020-11-01
    “…The US case shows key principles of ensuring policy coherence at different levels of goal-setting — from the National Security Strategy to planning individual projects and programs. …”
    Get full text
    Article
  9. 2449

    HSK Wallet: A User Friendly Blockchain Application by Hassan Shah Khan, Kashif Iqbal, Munaf Rashid, Aqsa Shahid

    Published 2024-12-01
    “…It focuses on improving the security, transparency, and efficiency of digital asset operations compared to traditional systems and decentralized solutions. …”
    Get full text
    Article
  10. 2450

    A Program for Master of Information Technology by Kabale University

    Published 2022
    “…The core courses in this programmes address challenges related to Enterprise Governance of ICT, Managing ICT Projects, Risk & Change Management, Cyber Security Management, IT project Management among others. …”
    Get full text
    Other
  11. 2451

    Learning deep forest for face anti-spoofing: An alternative to the neural network against adversarial attacks by Rizhao Cai, Liepiao Zhang, Changsheng Chen, Yongjian Hu, Alex Kot

    Published 2024-10-01
    “…Face anti-spoofing (FAS) is significant for the security of face recognition systems. neural networks (NNs), including convolutional neural network (CNN) and vision transformer (ViT), have been dominating the field of the FAS. …”
    Get full text
    Article
  12. 2452
  13. 2453
  14. 2454

    Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks by Sharaf Aldeen Abdulkadhum Abbas, Abdullahi Abdu Ibrahim

    Published 2024-06-01
    “…On the other hand, if we consider the conventional security approaches, these security devices mostly use traditional security protocols such as password encryption and user authentication respectively. …”
    Get full text
    Article
  15. 2455

    An Overview on The Pandemic Coronavirus Disease 2019 (COVID-19) Outbreak by Mariwan Abdulla Hama Salih

    Published 2020-05-01
    “…The other objective of this review was to encourage publics to treat the virus in safe way based on the discovery by researchers toward secure life of million peoples that could be infected by the 2019 new coronavirus. …”
    Get full text
    Article
  16. 2456

    Complementary Feeding Practices and Household Food Insecurity Status of Children Aged 6–23 Months in Shashemene City West Arsi Zone, Oromia, Ethiopia by Junayde Abdurahmen Ahmed, Kebede Kumsa Sadeta, Kelil Hussen Lembo

    Published 2022-01-01
    “…Household socioeconomic status (wealth index, food security status, household income) and child age were found to be among the factors statistically significantly associated with complementary feeding practices indicators.…”
    Get full text
    Article
  17. 2457

    A Framework for Fourth Industrial Revolution Adoption by Small-Scale Rural Farmers in Sub-Saharan Africa: A Systematic Literature Review by Willard Munyoka, Nkhangweni Lawrence Mashau, Modimowabarwa Kanyane

    Published 2025-01-01
    “…This is a major global threat to agriculture and food security, especially for rural farmers. Small-scale rural-based farmers contribute immensely to local communities’ socio-economic well-being and food security. …”
    Get full text
    Article
  18. 2458

    Special Features of the Crime’s Subject Under the Article 330 of the Criminal Code of Ukraine by V. Yu. Boichuk

    Published 2019-03-01
    “…As a result, the author has come to the conclusion that a special subject of the crime under the Art. 330 of the Criminal Code of Ukraine may be officers of the departments of the National Police of Ukraine, the State Investigation Bureau, the Security Service of Ukraine, the Foreign Intelligence Service of Ukraine, the State Border Guard Service of Ukraine, the Office of State Security, the State Fiscal Service of Ukraine, the State Penal Service of Ukraine, the Ministry of Defense of Ukraine, the President of Ukraine, officials of the President’s Administration of Ukraine, Verkhovna Rada of Ukraine, Cabinet of Ministers of Ukraine, National Security and Defense Council of Ukraine, Supreme High Command General Headquarters of Ukraine, the Ministry of Defense of Ukraine, the General Staff of Armed Forces of Ukraine, the unions, military units and units of the Armed Forces of Ukraine, the State Special Transport Service, the State Service for Special Communications and Information Protection of Ukraine, the National Guard of Ukraine, the Council of Ministers of the Autonomous Republic of Crimea, regional, district, city and district in the cities, state administrations and local self-government agencies, as well as officials of enterprises, institutions and organizations that carry out state defense orders, conduct research and perform development in the defense area, etc.…”
    Get full text
    Article
  19. 2459

    Activities of the Minister of Internal Affairs of the Ukrainian SSR Pavlo Yakovlevych Meshyk (1953) by V. A. Grechenko

    Published 2024-03-01
    “…At the same time, a policy was implemented to rid the state security agencies of their dependence on the influence of the Communist Party. …”
    Get full text
    Article
  20. 2460

    Acceptability of donor funding for clinical trials in the UK: a qualitative empirical ethics study using focus groups to elicit the views of research patient public involvement gro... by Simon Bowman, Heather Draper, Alexander Masters, Dominic Nutt, Kirstie Shearman

    Published 2022-06-01
    “…Existing governance processes will do some of this work, but additional REC guidance, particularly in relation to donors securing a place on the trial, may be necessary to help RECs navigate ethical concerns consistently.…”
    Get full text
    Article