Showing 2,561 - 2,580 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 2561

    Challenges in Microgrids with Medium Voltage Circuit by Hércules A. Oliveira, Luiza H. S. Santos, Luiz A. de S. Ribeiro, José G. de Matos, Lucas de P. A. Pinheiro

    Published 2025-01-01
    “…Effective coordination between protection devices and management systems ensures a rapid and selective response to faults, thereby enhancing microgrid security and facilitating efficient problem detection and resolution. …”
    Get full text
    Article
  2. 2562

    How Developments in Genebanks Could Shape Utilization Strategies for Domestic Animals by Qianzi Ren, Ying Gong, Peng Su, Gang Liu, Yabin Pu, Fuqing Yu, Yuehui Ma, Zhenqing Wang, Yefang Li, Lin Jiang

    Published 2025-01-01
    “…Global geographical, climatic, and ecological diversity has given rise to a wealth of domestic animals, which are essential for food security and agricultural sustainability. Since the 1960s, these critical genetic resources have declined significantly due to overdevelopment, ecological degradation, and climate change, posing a serious threat to global food security. …”
    Get full text
    Article
  3. 2563

    The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database by Jeongseok Choi, Jaekwon Kim, Dong Kyun Lee, Kwang Soo Jang, Dai-Jin Kim, In Young Choi

    Published 2016-03-01
    “…The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.…”
    Get full text
    Article
  4. 2564

    Motorcycle Engine Start System Using Fingerprint and Voice Command by Wabdillah, Akbar Iskandar, Syahriandi

    Published 2023-06-01
    “…Making the starter engine system on this motorbike is to make it easier for users to turn on the motorbike without using a key so that they only use voice commands through an application found on an Android smartphone. In the security section, fingerprints are used as a substitute for manual ignition on motorbikes. …”
    Get full text
    Article
  5. 2565

    Protecting Medical Images Using a Zero-Watermarking Approach Based on Fractional Racah Moments by Karim El-Khanchouli, Hanaa Mansouri, Nawal El Ghouate, Hicham Karmouni, Nour-Eddine Joudar, Mhamed Sayyouri, S. S. Askar, Mohamed Abouhawwash

    Published 2025-01-01
    “…This article introduces a new family of orthogonal moments, the fractional Racah moments (FrROMs), developed to meet the demands of copyright protection for medical images, a field requiring robust and secure methods that preserve the integrity of the original image. …”
    Get full text
    Article
  6. 2566

    Enhancing the Process of AES: A Lightweight Cryptography Algorithm AES for Ad-hoc Environments by Alharith A. Abdullah, Çağatay Aydin, Oğuz Ata, Mustafa Alhandhal

    Published 2022-12-01
    “…This algorithm will be modified to improve the security as well as reduce the amount of time and energy consumed in comparison with the original algorithm. …”
    Get full text
    Article
  7. 2567

    In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes by Amal Hkiri, Mouna Karmani, Fawaz Hasan Alasmary, Omar Ben Bahri, Ahmed Mohammed Murayr, Mohsen Machhout

    Published 2025-02-01
    “…In the rapidly evolving landscape of the Internet of Things (IoT) and Wireless Sensor Networks (WSN), the need for secure and efficient data transmission is paramount. …”
    Get full text
    Article
  8. 2568

    StegoEDCA: An Efficient Covert Channel for Smart Grids Based on IEEE 802.11e Standard by Marek Natkaniec, Paweł Kępowicz

    Published 2025-01-01
    “…These covert channels provide an innovative solution for securely transmitting large volumes of data within the smart grid.…”
    Get full text
    Article
  9. 2569

    Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game by Ashraf Al Sharah, Taiwo Oyedare, Sachin Shetty

    Published 2016-01-01
    “…Security in mobile ad hoc networks (MANETs) is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. …”
    Get full text
    Article
  10. 2570

    Global agricultural trade architecture: contemporary triggers by E. N. Smirnov, E. A. Karelina, M. G. Pletnev

    Published 2024-12-01
    “…It has also been found that world agricultural commodity prices will stabilize in the medium term, which is an important factor in the food security of developing countries.…”
    Get full text
    Article
  11. 2571

    Authenticity at Risk: Key Factors in the Generation and Detection of Audio Deepfakes by Alba Martínez-Serrano, Claudia Montero-Ramírez, Carmen Peláez-Moreno

    Published 2025-01-01
    “…Detecting audio deepfakes is crucial to ensure authenticity and security, especially in contexts where audio veracity can have critical implications, such as in the legal, security or human rights domains. …”
    Get full text
    Article
  12. 2572

    Fuzzy logic based social trust computation scheme in Flying Ad-hoc network by Joydeep Kundu, Sahabul Alam, Arindam Dey

    Published 2025-03-01
    “…The Flying Ad Hoc Networks (FANETs) are becoming more popular in civic security, military, and multipurpose applications. …”
    Get full text
    Article
  13. 2573

    An Anonymous User Authentication with Key Agreement Scheme without Pairings for Multiserver Architecture Using SCPKs by Peng Jiang, Qiaoyan Wen, Wenmin Li, Zhengping Jin, Hua Zhang

    Published 2013-01-01
    “…However, these schemes suffered from certain security problems or their cost consumption exceeded users’ own constrained ability. …”
    Get full text
    Article
  14. 2574

    Technologie energetycznego wykorzystania odpadów by Krzysztof Biernat, Paulina Luiza Dziołak, Izabela Samson-Bręk

    Published 2011-06-01
    “…These benefits concern both environmental reasons, as well as freedom from conventional energy sources and increasing energy security. The article discusses the biogas technology and plasma technology as the most promising waste to energy technologies.…”
    Get full text
    Article
  15. 2575

    Measures against the financing of “lone wolves” and small terrorist cells in Europe by Svetoslav YORDANOV

    Published 2025-01-01
    “…The paper focuses on the emergence of new risks and threats to the European security system, such as the activity of “lone wolves” and small terrorist cells. …”
    Get full text
    Article
  16. 2576
  17. 2577

    Analisis Kualitas Performa Aplikasi Digital Banking X Menggunakan Framework ISO 25010 by Medina Nurul Zahra, Kraugusteeliana Kraugusteeliana

    Published 2023-07-01
    “…The conclusion is that the critical characteristic is security, which can refer to the evaluation quality of performance X application. …”
    Get full text
    Article
  18. 2578
  19. 2579

    Desain Layanan E-Surat untuk Desa Waru Barat, Pamekasan, Madura menggunakan QR-Code by Wahyudi Agustiono, Intan Rofika Putri, Devie Rosa Anamisa

    Published 2021-11-01
    “…The functionality testing showed the application successfully generated e-certificate along with the unique QR Code to secure and maintain the validity of the document. …”
    Get full text
    Article
  20. 2580