Showing 261 - 280 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 261

    Indoor Vertical Farming Systems for Food Security and Resource Sustainability by Jiangxiao Qiu, Haimanote K. Bayabil, Yuncong Li

    Published 2020-04-01
    “…Learn about the limitations and challenges of the industry as well as the potential benefits both for food security and resource sustainability. https://edis.ifas.ufl.edu/fr429 …”
    Get full text
    Article
  2. 262

    Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme by Huixian Li, Liaojun Pang

    Published 2016-05-01
    “…The scheme proved in this model can only be called selectively secure one. However, from a security perspective, the adaptively secure CP-ABPRE scheme is more desirable. …”
    Get full text
    Article
  3. 263
  4. 264
  5. 265
  6. 266
  7. 267

    ‘Bottom-up securitization’: A visual turn in security studies by M. A. Kucherov, M. V. Kharkevich

    Published 2024-03-01
    Subjects: “…international security…”
    Get full text
    Article
  8. 268

    A Secure Object Detection Technique for Intelligent Transportation Systems by Jueal Mia, M. Hadi Amini

    Published 2024-01-01
    “…Furthermore, this hybrid algorithm provides robust security against data poisoning-based model replacement and inference attacks throughout the training phase. …”
    Get full text
    Article
  9. 269

    Application of edge computing technology in smart grid data security by Zhuo Cheng, Jiangxin Li, Jianjun Zhang, Chen Wang, Hui Wang, Juyin Wu

    Published 2025-02-01
    “…Absrtact: In order to solve the problem that the two-way flow of power and information between user nodes and service nodes in the smart grid poses a huge threat to the privacy and security of user data, and at the same time, the limitation of the power bureau's computing resources also brings users response delay, service quality degradation and other problems, the author proposes the application of edge computing technology in smart grid data security. …”
    Get full text
    Article
  10. 270

    Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks by Imanishimwe Jean de Dieu, Nyirabahizi Assouma, Maniraguha Muhamad, Wang Jin, Sungyoung Lee

    Published 2012-04-01
    “…To prolong the network lifetime, sensor nodes need a secure load-balancing route. In this paper, we investigate the facts of ensuring secure sensed data in a balanced energy network backbone, and propose energy-efficient secure path algorithm (ESPA) for WSNs. …”
    Get full text
    Article
  11. 271

    Blockchain-Based Secure Traceable Scheme for Food Supply Chain by S. Thangamayan, Kalyani Pradhan, Ganesh Babu Loganathan, S. Sitender, S. Sivamani, Mulugeta Tesema

    Published 2023-01-01
    “…The typical food traceability system’s data layer is made up of relational databases managed by core businesses, which cannot ensure data security. It is inefficient and requires a lot of upkeep. …”
    Get full text
    Article
  12. 272
  13. 273

    Climate change and agricultural productivity: Economic implications for food security by Riza Murabildayeva, Laila Bimendiyeva, Saltanat Kondybayeva, Zhanna Yermekova

    Published 2024-12-01
    “…Consequently, it is crucial to assess how the negative effects of climate change can be mitigated to ensure food security. This study evaluated the relationship between agriculture, food security, and CO2 emissions. …”
    Get full text
    Article
  14. 274
  15. 275
  16. 276

    Women’s Role in Violence and UN Women, Peace, and Security Agenda by Çağlayan Başer

    Published 2024-02-01
    Subjects: “…the women peace and security agenda…”
    Get full text
    Article
  17. 277
  18. 278

    State Participation in Energy Security Provision of the People’s Republic of China by I. F. Rakhimyanova

    Published 2015-08-01
    “…The article outlines the contours of energy security of China, the role of major players, including public authorities, government energy corporations, private businesses and the population. …”
    Get full text
    Article
  19. 279

    A statistical approach to the water scarcity implications on food security by J. AlBtoosh, A. Abu-Awwad, N. Obeidat

    Published 2024-11-01
    “…BACKGROUND AND OBJECTIVES: Jordan faces significant food security challenges due to population growth, climate change, and urbanization, straining limited water resources. …”
    Get full text
    Article
  20. 280

    FSAS: An IoT-Based Security System for Crop Field Storage by Chandra Prakash, Anurag Barthwal, Shwetank Avikal, Gyanendra Kumar Singh

    Published 2023-01-01
    “…In this study, we present a remote security management framework for monitoring the crop field storage house, known as the farm security alert system (FSAS). …”
    Get full text
    Article