Showing 2,141 - 2,160 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 2141

    Image Encryption Using a Lightweight Stream Encryption Algorithm by Saeed Bahrami, Majid Naderi

    Published 2012-01-01
    “…Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks. …”
    Get full text
    Article
  2. 2142

    An Artificial Bee Colony Algorithm for Uncertain Portfolio Selection by Wei Chen

    Published 2014-01-01
    “…In this paper, under the assumption that security returns are given by experts’ evaluations rather than historical data, we discuss the portfolio adjusting problem which takes transaction costs and diversification degree of portfolio into consideration. …”
    Get full text
    Article
  3. 2143

    Dynamic and semantic-aware access-control model for privacy preservation in multiple data center environments by Aiguo Chen, Guoming Lu, Hanwen Xing, Yuan Xie, Shunwei Yuan

    Published 2020-05-01
    “…The experimental results demonstrate that this dynamic and semantic-aware access-control model is highly dynamic and flexible and can improve the security of the application system.…”
    Get full text
    Article
  4. 2144

    MODERN APPROACHES TO THE ORGANIZATION OF FINANCIAL SUPPLY OF THE ARMED FORCES OF THE KYRGYZ REPUBLIC by R. Sh. Bekishov

    Published 2021-02-01
    “…The paper considers military reform as a necessary component of political and socio-economic reforms, one of the determining conditions for their success, an effective factor in ensuring the defense and security of Kyrgyzstan, its active and constructive role in the modern world. …”
    Get full text
    Article
  5. 2145

    Machine learning-based authentication of banknotes: a comprehensive analysis by Nadia Ghasem Abadi

    Published 2024-03-01
    “…Key features, including texture, color distribution, and security attributes, are extracted to train the model, enabling a thorough analysis of banknote authenticity. …”
    Get full text
    Article
  6. 2146

    Éducation à la défense et enseignement de l’histoire des guerres by Sylvain Doussot

    Published 2018-06-01
    “…This paper aims to deal with the relation between values and knowledge in history teaching (especially of wars) and defense and security education. This defense education is questioned through the two traditional (and potentially contradictory) aims of history teaching: building a common culture and teaching critical historical thinking. …”
    Get full text
    Article
  7. 2147

    A Novel Chaotic Map and an Improved Chaos-Based Image Encryption Scheme by Xianhan Zhang, Yang Cao

    Published 2014-01-01
    “…The simulation results and security analysis indicate that such method not only can meet the requirement of imagine encryption, but also can result in a preferable effectiveness and security, which is usable for general applications.…”
    Get full text
    Article
  8. 2148

    ALTERNATIVE SETTLEMENT SYSTEM IN THE FUEL AND ENERGY COMPLEX: CLASSIFICATION AND MAIN FEATURES by O. Baikova, D. Kulakov

    Published 2016-07-01
    “…Marks need of increase of economic security and marked out threats to the Russian economy from «petrodollars». …”
    Get full text
    Article
  9. 2149

    An Energy-Efficient Cyclic Diversionary Routing Strategy against Global Eavesdroppers in Wireless Sensor Networks by Ju Ren, Yaoxue Zhang, Kang Liu

    Published 2013-04-01
    “…While many protocols for sensor network security provide confidentiality for message content, contextual information usually remains exposed, which can be critical to the mission of the sensor network. …”
    Get full text
    Article
  10. 2150

    An Image Sharing Encryption Management System For Kabale University. by Bemera, Rauben

    Published 2024
    “…Information security has been the most common word uttered by any man any device or any peripheral for the past two centuries. …”
    Get full text
    Thesis
  11. 2151
  12. 2152
  13. 2153

    Diagnosis of Protected Agriculture in Imbabura—Ecuador, Period 2016–2023 by Luis Marcelo Albuja-Illescas, Andrés Manolo Carrión-Burgos, Rafael Jiménez-Lao, María Teresa Lao

    Published 2025-01-01
    “…Among these, producer organization could be a viable strategy to address food security challenges in the context of climate change.…”
    Get full text
    Article
  14. 2154

    Legal Aspects of Telepathology by Christian Dierks

    Published 2000-01-01
    “…Data protection and data security are other crucial topics that require attention. …”
    Get full text
    Article
  15. 2155
  16. 2156
  17. 2157
  18. 2158

    The End of Akıncı Corps in The Ottoman Empire by Mustafa Alkan

    Published 2013-12-01
    “…It has been known that the Akıncıs were in the Ottoman Empire an extention of the corps which provided the border security of the Turkish states. They were named in the Seljuki period as “margraves”. …”
    Get full text
    Article
  19. 2159

    High-Risk AI Systems—Lie Detection Application by Konstantinos Kalodanis, Panagiotis Rizomiliotis, Georgios Feretzakis, Charalampos Papapavlou, Dimosthenis Anagnostopoulos

    Published 2025-01-01
    “…Integrating artificial intelligence into border control systems may help to strengthen security and make operations more efficient. For example, the emerging application of artificial intelligence for lie detection when inspecting passengers presents significant opportunities for future implementation. …”
    Get full text
    Article
  20. 2160

    U.S.-UK Voting Cohesion in the United Nations General Assembly: Important Votes (2001–2019) by A. O. Mamedova

    Published 2022-05-01
    “…Since most UNGA resolutions are not binding, countries have more room for maneuver compared to voting in the UN Security Council. Washington pays close attention to other countries’ voting behavior in the UNGA, especially when it comes to Israel-related issues. …”
    Get full text
    Article