Showing 2,661 - 2,680 results of 5,943 for search '"securities"', query time: 0.11s Refine Results
  1. 2661

    Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review by Shubhkirti Sharma, Vijay Kumar, Kamlesh Dutta

    Published 2024-01-01
    “…The paper presents a systematic review of intrusion detection in Internet of Things (IoT) networks using multi-objective optimization algorithms (MOA), to identify attempts at exploiting security vulnerabilities and reducing the chances of security attacks. …”
    Get full text
    Article
  2. 2662

    Ungoverned Spaces and Menace of Herder-Farmer Conflictin Ondo State, South West Nigeria by Adebajo Adeola Aderayo, Orebanjo Abiodun Olusola

    Published 2023-03-01
    “…Drones can be deployed to monitor the operation of herders in the forests. Amotekun security outfit should be trained and adequately equipped with weapons for maximum delivery.…”
    Get full text
    Article
  3. 2663
  4. 2664

    Integrity of Best-Answer Assignments in Large Enrollment Classes; the role of Compulsory Attribution by Kurt Schmitz, Veda Storey

    Published 2024-12-01
    “…A unique feature that makes this method well-suited to large enrollment classes is the ability to secure and, when necessary, to delete stolen work, thereby precluding misappropriation. …”
    Get full text
    Article
  5. 2665
  6. 2666

    Breeding Maize (Zea mays L.) for Aluminum Tolerance through Heterosis and Combining Ability by Fekadu Asfawu, Gomathi Nayagam, Edossa Fikiru, Girum Azmach

    Published 2024-01-01
    “…Soil acidity, a major threat to food security in developing countries, can cause a staggering 71% decline in maize (Zea mays L.) production. …”
    Get full text
    Article
  7. 2667

    An Analysis of the Legal Standard in the Fight Against Torture and Treatment of Prisoners under International Law: What Prospect for Application under Cameroonian Law? by N. V. Minang, N. C. Nguindip

    Published 2020-02-01
    “…Cameroon in its compliance with the international standard set, has contributed enormously by enacting credible laws which varies from its constitution, criminal codes, and other relevant provision all in the aim of safeguarding and ensuring that this right should be treated with lots of human protection and security. Even though with efforts laid in place by the country through its various legal and institutional dispositions, prohibition and protection has continued to be considered as a nightmare, as we continue in experiencing violations of this fundamental right by those who were vested with the powers and competent in ensuring and securing this sacred right. …”
    Get full text
    Article
  8. 2668
  9. 2669

    Data Verification of Logical Pk-Anonymization with Big Data Application and Key Generation in Cloud Computing by Sindhe Phani Kumar, R. Anandan

    Published 2022-01-01
    “…Anonymization of data is done at the point of collection in order to safeguard the data. More secure than K-Anonymization, Pk-Anonymization is the area’s first randomization method. …”
    Get full text
    Article
  10. 2670

    Federated Learning-Based Load Forecasting for Energy Aggregation Service Providers by HUANG Yichuan, SONG Yuhui, JING Zhaoxia

    Published 2025-01-01
    “…However,the required forecasting data are typically scattered among different energy suppliers,and owing to data security and privacy concerns,these suppliers are often unwilling to share their data. …”
    Get full text
    Article
  11. 2671

    Transboundary Water Resources Conflict Analysis Using Graph Model for Conflict Resolution: A Case Study—Harirud River by Abdulsalam Amini, Hamidreza Jafari, Bahram Malekmohammadi, Touraj Nasrabadi

    Published 2021-01-01
    “…One of the most important environmental issues today is the water crisis and the ensuing security challenges. Of these, transboundary waters pose the most significant security challenges. …”
    Get full text
    Article
  12. 2672

    ECONOMIC CRIME UNDER MARTIAL LAW IN UKRAINE by Maksym Korniienko, Hanna Foros, Serhii Baranov

    Published 2024-12-01
    “…Consequently, the prevailing national security and defence strategy falls short in ensuring the alignment of the Ukrainian security sector with the scientific and practical imperatives. …”
    Get full text
    Article
  13. 2673

    Analyzing Psychological Operations: A Case Study of Indo-Pak Hostility (2010-2024) by Jannat Naseeb

    Published 2025-01-01
    “…Overall, this research offers valuable insights into the efficacy of PSYOP in influencing audiences and contributes to the broader understanding of persuasion theory in the context of modern information warfare and national security. …”
    Get full text
    Article
  14. 2674

    Mitigating Sinkhole Attacks in MANET Routing Protocols using Federated Learning HDBNCNN Algorithm by Sherril Sophie Maria Vincent

    Published 2025-02-01
    “…In this study, Federated Learning is utilized to improve the security and privacy through empowering nodes to train the model deprived of distribution complex data. …”
    Get full text
    Article
  15. 2675

    The contribution of Electronic Records Management towards Organisational Performance: A case study of Stanbic Bank-Kabale Branch. by Kembabazi, Betty

    Published 2023
    “…Lastly, the researcher recommended the construction of ERMS facilities, improve ERMS security, encourage corroborations, have government support, and provide maximum training as better solutions for the topic under study.…”
    Get full text
    Thesis
  16. 2676

    Identification of maize kernel varieties based on interpretable ensemble algorithms by Chunguang Bi, Chunguang Bi, Xinhua Bi, Jinjing Liu, Hao Xie, Shuo Zhang, He Chen, Mohan Wang, Lei Shi, Lei Shi, Shaozhong Song

    Published 2025-02-01
    “…The findings have significant practical value in agricultural production, improving quality management efficiency and contributing to food security assurance.…”
    Get full text
    Article
  17. 2677

    Progress towards Sustainable Utilisation and Management of Food Wastes in the Global Economy by Purabi R. Ghosh, Derek Fawcett, Shashi B. Sharma, Gerrard Eddy Jai Poinern

    Published 2016-01-01
    “…Food waste is considered not only a sustainability problem related to food security, but also an economic problem since it directly impacts the profitability of the whole food supply chain. …”
    Get full text
    Article
  18. 2678

    The status and challenges of irrigation infrastructure performance in supporting the agricultural sector: A case study of Kediri Regency, Indonesia by Budi Santoso Eko, Siti Humaira An Nisaa, Fitri Larasati Aida

    Published 2025-01-01
    “…The increase in population in rural and urban areas has an impact on food availability and security. Agriculture, as a major contributor to food security, faces increasing challenges, such as the decline in the area planted for agricultural commodities, the availability of labor, and the water provision for crops. …”
    Get full text
    Article
  19. 2679

    Research on Grid Scroll Chaotic Extended Sequence Algorithm and Its Circuit Implementation for F-OFDM System by Yingjie Ma, Ya Li, Geng Zhao, Ping Zeng, Yatao Yang

    Published 2019-01-01
    “…The proposed grid multiscroll chaotic maps are used as random phase sequence vectors instead of the traditional pseudo random sequence, which provide a large number of random sequences with good correlation characteristics, random characteristics, and high security. The proposed random phase sequence vectors can meet the needs of 5G mass connections. …”
    Get full text
    Article
  20. 2680

    Intrusion Detection for Wireless Sensor Network Using Particle Swarm Optimization Based Explainable Ensemble Machine Learning Approach by Shaikh Afnan Birahim, Avijit Paul, Fahmida Rahman, Yamina Islam, Tonmoy Roy, Mohammad Asif Hasan, Fariha Haque, Muhammad E. H. Chowdhury

    Published 2025-01-01
    “…Wireless Sensor Networks (WSN) play a pivotal role in various domains, including monitoring, security, and data transmission. However, their susceptibility to intrusions poses a significant challenge. …”
    Get full text
    Article