Showing 2,001 - 2,020 results of 5,943 for search '"security"', query time: 0.10s Refine Results
  1. 2001

    A Novel Image Encryption Scheme Based on PWLCM and Standard Map by Yucheng Chen, Chunming Tang, Zongxiang Yi

    Published 2020-01-01
    “…Consequently, a good trade-off efficiency and security can be achieved. Furthermore, the numerical simulations and performance analyses illustrate that the proposed encryption scheme can be used in practical application scenarios requiring lightweight security.…”
    Get full text
    Article
  2. 2002

    Hedging for Balancing: Japan’s Foreign Policy in the 2010s–2020s by Kei KOGA

    Published 2024-12-01
    “…Nonetheless, the relative decline in the United States’ global strategic influence has compelled Japan to adopt a “security hedging” approach. Japan seeks to strengthen strategic relations with non-US security partners both within and beyond the Indo-Pacific region, diversifying the risks of diplomatic overdependence on the United States while continuing to fortify military cooperation with it.…”
    Get full text
    Article
  3. 2003

    The Herd Health Handbook for Goat Producers: Biosecurity at the Farm Level by Ray Mobley, Carmen Lyttle-N’guessan

    Published 2009-12-01
    “…FAMU006, a 20-page illustrated fact sheet by Ray Mobely and Carmen Lyttle-N'guessan, describes aspects of an effective bio-security program, bio-security measures, food safety concerns, and how HACCP works. …”
    Get full text
    Article
  4. 2004

    The Herd Health Handbook for Goat Producers: Biosecurity at the Farm Level by Ray Mobley, Carmen Lyttle-N’guessan

    Published 2009-12-01
    “…FAMU006, a 20-page illustrated fact sheet by Ray Mobely and Carmen Lyttle-N'guessan, describes aspects of an effective bio-security program, bio-security measures, food safety concerns, and how HACCP works. …”
    Get full text
    Article
  5. 2005
  6. 2006
  7. 2007
  8. 2008

    Studi Empiris terhadap Kinerja & Keamanan Wifi (Studi Kasus di Kota Depok) by Ahmad Fajri

    Published 2019-12-01
    “…In this study, we conducted an audit of the security of wifi networks in Depok City by conducting field studies on the performance and security of wifi networks using wardriving techniques.This study covers about 536 wifi networks on Margonda Street Depok. …”
    Get full text
    Article
  9. 2009

    Pengamanan Citra Berwarna Menggunakan Kriptografi Visual Skema Meaningful Shares dan Steganografi LSB by Fariz Abid Darmawan, Ari Kusyanti, Rakhmadhanny Primananda

    Published 2022-12-01
    “…So that it raises the suspicion of an attacker who threatens the security of the information in it. To add security, we need Steganography LSB, we can insert the image shares again into the new cover so that the quality and security will increase. …”
    Get full text
    Article
  10. 2010
  11. 2011
  12. 2012

    Enhancing misogyny detection in bilingual texts using explainable AI and multilingual fine-tuned transformers by Ehtesham Hashmi, Sule Yildirim Yayilgan, Muhammad Mudassar Yamin, Mohib Ullah

    Published 2024-11-01
    “…Abstract Gendered disinformation undermines women’s rights, democratic principles, and national security by worsening societal divisions through authoritarian regimes’ intentional weaponization of social media. …”
    Get full text
    Article
  13. 2013

    Measurement tools and indicators for assessing nurturing care for early childhood development: A scoping review. by Joshua Jeong, Lilia Bliznashka, Eileen Sullivan, Elizabeth Hentschel, Youngkwang Jeon, Kathleen L Strong, Bernadette Daelmans

    Published 2022-01-01
    “…Nurturing care encompasses five components that are crucial for supporting early childhood development: good health, adequate nutrition, opportunities for early learning, responsive caregiving, and safety and security. While there has been increasing attention in global public health towards designing and delivering programs, services, and policies to promote nurturing care, measurement has focused more on the components of health and nutrition, with less attention to early learning, responsive caregiving, and safety and security. …”
    Get full text
    Article
  14. 2014
  15. 2015

    Intrusion detection in metaverse environment internet of things systems by metaheuristics tuned two level framework by Milos Antonijevic, Miodrag Zivkovic, Milica Djuric Jovicic, Bosko Nikolic, Jasmina Perisic, Marina Milovanovic, Luka Jovanovic, Mahmoud Abdel-Salam, Nebojsa Bacanin

    Published 2025-01-01
    “…Nevertheless, because IoT devices are often built with minimal hardware and are connected to the Internet, they are highly susceptible to different types of cyberattacks, presenting a significant security problem for maintaining a secure infrastructure. …”
    Get full text
    Article
  16. 2016
  17. 2017

    Detection the topics of Facebook posts using text mining with Latent Dirichlet Allocation (LDA) algorithm by Shahlaa Mashhadani

    Published 2025-01-01
    “…The significance of the research lies in its ability to discover themes within each post, which is crucial for analyzing user behavior and addressing security concerns. The use of relevant Facebook data enhances the real-world relevance of the results, facilitating targeted analysis based on the language patterns used by users in these posts and thus contributing to the success of security objectives. …”
    Get full text
    Article
  18. 2018
  19. 2019
  20. 2020

    The use of agencies by the Ministry of Internal Affairs of the Ukrainian SSR to control academic historical science in Soviet Ukraine (1953) by O. N. Yarmysh, V. A. Grechenko

    Published 2022-06-01
    “…Through the agent, who worked in this structure, state security officials tried to influence the personnel of the Institute and the main areas of its scientific activity. …”
    Get full text
    Article