Showing 2,721 - 2,740 results of 5,943 for search '"securities"', query time: 0.11s Refine Results
  1. 2721

    Convergence of Blockchain, IoT, and AI for Enhanced Traceability Systems: A Comprehensive Review by Yahaya Saidu, Shuhaida Mohamed Shuhidan, Dahiru Adamu Aliyu, Izzatdin Abdul Aziz, Shamsuddeen Adamu

    Published 2025-01-01
    “…Key trends include AI-driven analytics, real-time IoT data collection, and the need for secure, tamper-proof data by BC. However, interoperability, scalability, and standardization challenges hinder adoption. …”
    Get full text
    Article
  2. 2722

    AFD and chaotic map‐based integrated approach for ECG compression, steganography and encryption in E‐healthcare paradigm by Neetika Soni, Indu Saini, Butta Singh

    Published 2021-07-01
    “…Later, chaotic map‐based steganography and encryption are proposed on the AFD coefficients to secure the confidential information and the signal itself. …”
    Get full text
    Article
  3. 2723
  4. 2724

    An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data by Arjun Kumar Bose Arnob, M. F. Mridha, Mejdl Safran, Md Amiruzzaman, Md. Rajibul Islam

    Published 2025-02-01
    “…Abstract One of the widening perils in network security is the Distributed Denial of Service (DDoS) attacks on the Internet of Things (IoT) ecosystem. …”
    Get full text
    Article
  5. 2725

    Anomaly detection of adversarial cyber attacks on electric vehicle charging stations by Sagar Babu Mitikiri, Vedantham Lakshmi Srinivas, Mayukha Pal

    Published 2025-03-01
    “…Intruders pose potential risks to the security, reliability, and functionality of the EVCI, by spoofing the data through these charging ports leading to anomalies in the data. …”
    Get full text
    Article
  6. 2726

    Analysis and prediction of urban agglomeration ecological footprint based on improved three-dimensional ecological footprint and shared socioeconomic pathways by Ruirui Jiang, Liangjun Fei, Shouxuan Kang

    Published 2025-01-01
    “…This study analyzes the spatial–temporal dynamics of ecological security, sustainability, and driving factors in Shaanxi’s Guanzhong urban agglomeration. …”
    Get full text
    Article
  7. 2727

    Explaining the chronopolitical pattern of relations between Iran and Iraq by masoud malekian dolat abadi, gholamhosein heidari, farhad hamzeh

    Published 2025-06-01
    “…For instance, Iraq is actively engaged in the "FAW Corridor" initiative, whereas Iran seeks to expand economic cooperation and secure a place in the burgeoning alliances of the East. …”
    Get full text
    Article
  8. 2728

    High trophic similarity between non-native common carp and gibel carp in Turkish freshwaters: Implications for management by Sadi Aksu, Özgür Emiroğlu, Paride Balzani, J. Robert Britton, Esengül Köse, Irmak Kurtul, Sercan Başkurt, Oğuzcan Mol, Emre Çınar, Phillip J. Haubrock, Pinar Oztopcu-Vatan, Ali Serhan Tarkan

    Published 2025-01-01
    “…In Turkey, stocking of common carp Cyprinus carpio is practised to provide food security for people and job security for artisanal fishers, resulting in a country-wide distribution. …”
    Get full text
    Article
  9. 2729

    IoT-Based Real-Time Crop Drying and Storage Monitoring System by Ishimwe Viviane, Emmanuel Masabo, Habiyaremye Joseph, Mitsindo Rene, Elias Bizuru

    Published 2023-01-01
    “…This mostly affects the quality of maize and flour being produced which will finally affect food security. In this research, temperature, humidity, and light sensors are deployed in the grain storage containers for environmental parameter detection purposes to achieve the primary goal of providing practical, secure, and easily accessible storage in inclement weather. …”
    Get full text
    Article
  10. 2730

    Identifying the Dimensions and Components of the Executive Requirements of Islamic Microfinance by Akram Taftiyan, Farideh Noor Mohammadi

    Published 2023-12-01
    “…The findings of the research show that the aspects related to ownership and control, the characteristics of loan contracts and security are considered to be the most important aspects affecting the executive requirements of Islamic microfinance, respectively. …”
    Get full text
    Article
  11. 2731

    Detecting Obfuscated Malware Infections on Windows Using Ensemble Learning Techniques by Yadigar Imamverdiyev, Elshan Baghirov, John Chukwu Ikechukwu

    Published 2025-01-01
    “…In the internet and smart devices era, malware detection has become crucial for system security. Obfuscated malware poses significant risks to various platforms, including computers, mobile devices, and IoT devices, by evading advanced security solutions. …”
    Get full text
    Article
  12. 2732

    ASEAN Regional Integration: The Philippines' domestic constraints to Physical connectivity by Tobit Abao, Hazel Jovita

    Published 2023-03-01
    “…Specifically, the Philippines faces severe domestic problems such as reduced spending on infrastructural development, coupled with critical institutional challenges and issues on stability and security. This paper argues the primacy of good governance as the precondition for a well-connected and sustainable infrastructure. …”
    Get full text
    Article
  13. 2733

    MonoMax Suture: A New Long-Term Absorbable Monofilament Suture Made from Poly-4-Hydroxybutyrate by Erich K. Odermatt, Lutz Funk, Rainer Bargon, David P. Martin, Said Rizk, Simon F. Williams

    Published 2012-01-01
    “…Its tensile modulus of 0.48 GPa is approximately one-third of the value of the PDS II fiber providing an exceptionally flexible and pliable fiber with excellent knot strength and security. These features are further enhanced by the fiber's elasticity, which also improves knot security and may help prevent wound dehiscence. …”
    Get full text
    Article
  14. 2734

    A study of Belarusian women’s perceptions of safety and its relationships with victimization and social gender by I. V. Golyakova, V. А. Karpiyevich

    Published 2024-10-01
    “…It has been shown that for women security is associated with such concepts as peace in their country, reliability, health, and control of the situation. …”
    Get full text
    Article
  15. 2735

    A Scalable Framework for Sensor Data Ingestion and Real-Time Processing in Cloud Manufacturing by Massimo Pacella, Antonio Papa, Gabriele Papadia, Emiliano Fedeli

    Published 2025-01-01
    “…However, existing frameworks face challenges related to scalability, resource orchestration, and data security, particularly in rapidly evolving decentralized manufacturing settings. …”
    Get full text
    Article
  16. 2736

    Enhancing Safety in Nigeria's Oil and Gas Sector: A Fault Tree Analysis Approach by Mgbowaji Zacchaeus, John Nwenearizi Ugbebor, Ikechukwu Ozoemenam Agbagwa, Ochuko Felix Orikpete

    Published 2023-12-01
    “…By dissecting incidents ranging from structural failures to security threats, the research illuminates the multifaceted risks entrenched within the sector's activities. …”
    Get full text
    Article
  17. 2737

    A New Sensors-Based Covert Channel on Android by Ahmed Al-Haiqi, Mahamod Ismail, Rosdiadee Nordin

    Published 2014-01-01
    “…New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze its security model, in particular the two key principles: process-isolation and the permissions system. …”
    Get full text
    Article
  18. 2738

    Electronic petitions in France on the material of Change.org, a non-governmental e-petition platform by K. V. Bannikov, N. K. Radina, O. A. Smirnova, D. V. Shavarova

    Published 2022-09-01
    “…Residents of France most often relate to social problems (social security, health care and education) in electronic petitions. …”
    Get full text
    Article
  19. 2739

    Geomodeling soil quality using remote sensing and land use metrics in Abeokuta, Nigeria by Tobore Anthony, Anoke Emmanuel

    Published 2025-01-01
    “…The findings suggest valuable ways for SQ improvement and could contribute to efforts on achieving food security, well-being and meet sustainable development goal 2.…”
    Get full text
    Article
  20. 2740

    Comparing Types of Statistical Data Between Turkey (the Case Study of Istanbul) and Selected Countries for Creating Fire Strategies by Erhan Bakırcı, Buket Karatop, Sümeyye Bayındır

    Published 2019-07-01
    “…Therefore, it can be said that fire statistics are kept and used to determine the strategies of fire statistics, especially in the countries that have high standards of social security and are technologically advanced. The strength of this chain of secure relations is possible with the establishment of learning systems. …”
    Get full text
    Article