Showing 3,521 - 3,540 results of 5,943 for search '"securities"', query time: 0.05s Refine Results
  1. 3521

    Behaviour change communication influences on food consumption behaviours and the demand for diverse nutritious foods in the Makoni District, Zimbabwe. by Delilah Takawira, Mthokozisi Kwazi Zuma, Xikombiso Gertrude Mbhenyane

    Published 2024-01-01
    “…Participants indicated that the Livelihoods and Food Security Programme intervention successfully increased their nutrition knowledge, enhanced their ability to diversify crop production, and improved their access to varied foods, including some new crops. …”
    Get full text
    Article
  2. 3522

    An Efficient and Lightweight Source Privacy Protecting Scheme for Sensor Networks Using Group Knowledge by Zhiqiang Ruan, Wei Liang, Decai Sun, Haibo Luo, Fanyong Cheng

    Published 2013-04-01
    “…Providing source privacy is a critical security service for sensor networks. However, privacy preserving in sensor networks is a challenging task, particularly due to the limited resources of sensor nodes and the threat of node capture attack. …”
    Get full text
    Article
  3. 3523

    Dynamics of variability in agronomic characters of millet cv. ‘Gorlinka’ under the climate conditions of the southern part of the East European Plain by T. V. Kulemina

    Published 2024-01-01
    “…The effect of high temperature and drought is expected to lead to undesirable consequences for the economy, a decrease in yields, and a threat to food security. This aspect requires an assessment of the ongoing climate changes and identification of the causes that induce the response of plants to them.Materials and methods. …”
    Get full text
    Article
  4. 3524

    RAMS Analysis of Train Air Braking System Based on GO-Bayes Method and Big Data Platform by Guoqiang Cai, Yaofei Wang, Qiong Song, Chen Yang

    Published 2018-01-01
    “…The RAMS (reliability, availability, maintainability, and security) of the air braking system is an important indicator to measure the safety performance of the system; it can reduce the life cycle cost (LCC) of the rail transit system. …”
    Get full text
    Article
  5. 3525

    Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application by Sadam Hussain, Muhammad Asif, Tariq Shah, Abid Mahboob, Sayed M. Eldin

    Published 2023-01-01
    “…The proposed method is simple and speedy in terms of computations, meanwhile it affirms higher security and sensitivity. In contrast to GF, PA-loop are non-isomorphic and have several Cayley table representations. …”
    Get full text
    Article
  6. 3526

    Developments in Border and Migration Management in the South East European Region by POLGÁR István

    Published 2024-12-01
    “…This extra pressure led to difficulties in terms of effectively manage the borders and address arising border security issues. The study aims to realize an inventory of the measures, proposals and activities which had an impact on transnational institution building which focuses on migration and border management. …”
    Get full text
    Article
  7. 3527

    Public Value of Using Light Rail Transit Transportation at Palembang by Rattu Nadra Syakila, Sri Suwitri, Tri Yuniningsih

    Published 2024-11-01
    “…Additionally, the LRT meets public expectations by offering a suitable route network, planning fleet capacity effectively, establishing consistent departure times, and ensuring high security across its operations. In conclusion, the Palembang LRT system enhances travel comfort with regular scheduling and adequate facilities, highlighting its potential as a key component of Palembang's sustainable urban transportation infrastructure with continued development.…”
    Get full text
    Article
  8. 3528

    DETECTING WEB-BASED BOTNETS USING A WEB PROXY AND A CONVOLUTIONAL NEURAL NETWORK by Trần Đắc Tốt, Phạm Tuấn Khiêm, Phạm Nguyễn Huy Phương

    Published 2020-09-01
    “…Botnets are increasingly becoming the most dangerous threats in the field of network security, and many different approaches to detecting attacks from botnets have been studied. …”
    Get full text
    Article
  9. 3529

    Federated Learning for Decentralized DDoS Attack Detection in IoT Networks by Yaser Alhasawi, Salem Alghamdi

    Published 2024-01-01
    “…Evaluated using the comprehensive CICIDS2017 dataset and compared with conventional centralized detection methods, FL-DAD achieves superior performance, illustrating the potential of federated learning to enhance intrusion detection systems in large-scale IoT networks by balancing data security with analytical effectiveness.…”
    Get full text
    Article
  10. 3530

    Face Recognition using Deep Learning and TensorFlow framework by Makrem Beldi

    Published 2023-12-01
    “… Detecting human faces and recognizing faces and facial expressions have always been an area of interest for different applications such as games, utilities and even security. With the advancement of machine learning, the techniques of detection and recognition have become more accurate and precise than ever before. …”
    Get full text
    Article
  11. 3531

    Adoption Spells of Improved Potato Varieties by Smallholder Farmers in Eastern Ethiopia: The Duration Approach by Sisay Lemessa, Molla Alemayehu, Megersa Daksa, Nigussie Dechassa

    Published 2019-06-01
    “…Potato is mainly tagged as a food security crop in Ethiopia. However, its productivity remains low due to low adoption of improved technologies by smallholder farmers. …”
    Get full text
    Article
  12. 3532

    Dynamic Stochastic Optimization of Emergent Blood Collection and Distribution from Supply Chain Perspective by Xiangyu Jin, Huajun Tang, Yuxin Huang

    Published 2021-01-01
    “…In response to emergencies, it is critical to investigate how to deliver emergency supplies efficiently and securely to disaster-affected areas and people. There is no doubt that blood is deemed one of the vital relief supplies, and ensuring smooth blood delivery may substantially alleviate subsequent impacts caused by the disaster. …”
    Get full text
    Article
  13. 3533

    ECONOMIC ANALYSIS OF SOIL-BASED AND SOILLESS FARMING SYSTEMS: A CASE STUDY FROM DA LAT CITY by Đặng Đức Huy, Phạm Thị Thuyền, Đàm Thị Hải Âu, Trần Thanh Giang, Nguyễn Thị Trà My

    Published 2020-12-01
    “…Nowadays, to secure production in the case of restricted natural resources requires innovative farming approaches to achieve a balance between agriculture and environmental protection. …”
    Get full text
    Article
  14. 3534

    100 essential questions for the future of agriculture by Yuming Hu, Taolan Zhao, Yafang Guo, Meng Wang, Kerstin Brachhold, Chengcai Chu, Andrew Hanson, Sachin Kumar, Rongcheng Lin, Wenjin Long, Ming Luo, Jian Feng Ma, Yansong Miao, Shaoping Nie, Yu Sheng, Weiming Shi, James Whelan, Qingyu Wu, Ziping Wu, Wei Xie, Yinong Yang, Chao Zhao, Lei Lei, Yong‐Guan Zhu, Qifa Zhang

    Published 2023-03-01
    “…We focus on 10 primary themes: transforming agri‐food systems, enhancing resilience of agriculture to climate change, mitigating climate change through agriculture, exploring resources and technologies for breeding, advancing cultivation methods, sustaining healthy agroecosystems, enabling smart and controlled‐environment agriculture for food security, promoting health and nutrition‐driven agriculture, exploring economic opportunities and addressing social challenges, and integrating one health and modern agriculture. …”
    Get full text
    Article
  15. 3535

    PREVENTING VIOLENCE CRIMES (KIDNAPPING, ARMED ROBBERY, BRIGANDAGE OR COMMUNITY MASSACRE) WITH DRONES: AN EFFECTIVE ALTERNATIVE TO VEHICULAR PATROLS IN NIGERIA by BABALOLA SUNDAY EMMANUEL

    Published 2024-06-01
    “…Recommendations proffered include the need for strategic deployment of drones in all security formation in the country, adequate budgetary provision .training of manpower, comprehensive monitoring and adequate assessment and action on information and intelligence received from drones. …”
    Get full text
    Article
  16. 3536

    Artificial Intelligence in Energy Economics Research: A Bibliometric Review by Zhilun Jiao, Chenrui Zhang, Wenwen Li

    Published 2025-01-01
    “…Potential future research directions include energy supply-chain resilience and security, social acceptance and public participation, economic inequality and the technology gap, automated methods for energy policy assessment, the circular economy, and the digital economy. …”
    Get full text
    Article
  17. 3537

    A Novel Memductor-Based Chaotic System and Its Applications in Circuit Design and Experimental Validation by Li Xiong, Yanjun Lu, Yongfang Zhang, Xinguo Zhang

    Published 2019-01-01
    “…Further to these, a memductor-based chaotic circuit is designed, realized, and applied to construct a new memductor-based secure communication circuit by employing the basic electronic components and memristor. …”
    Get full text
    Article
  18. 3538

    Artificial intelligence-based video monitoring of movement disorders in the elderly: a review on current and future landscapes by Kye Won Park, Maryam S Mirian, Martin J McKeown

    Published 2024-03-01
    “…This progression must incorporate data security, ethical considerations and adherence to regulatory standards.…”
    Get full text
    Article
  19. 3539

    Role of electric transport in urban transportation system by T. N. Sakulyeva, V. V. Sotnikova

    Published 2022-07-01
    “…Urban transport should solve the following tasks: equal access to the population to vehicles, the possibility of planning the time of traveling inside the city, ensuring environmental safety from the use of vehicles, creating the conditions for the availability of transport services at their cost, security and comfort, as well as ensure transport services for the business subjects at minimal economic costs. …”
    Get full text
    Article
  20. 3540

    Protecting civilians in a data-driven and digitalized battlespace: toward a baseline humanitarian technology infrastructure by Ann Fitz-Gerald, Jenna Hennebry

    Published 2025-01-01
    “…However, the lack of international consensus on the use of data, the public and private nature of the actors involved in conflict, the transnational aspects of the widened battlefield, and the heightened security risks in the conflict space pose enormous challenges for the protection of civilians agenda. …”
    Get full text
    Article