Showing 2,221 - 2,240 results of 5,943 for search '"security"', query time: 0.09s Refine Results
  1. 2221

    Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism by Qin Qin, Yong-qiang He, Li-ming Nie

    Published 2015-01-01
    “…In this scheme, based on the opportunistic covering rules, the network coverage algorithm of high reliability and real-time security was achieved by using the opportunity of sensor nodes and the Internet mobile node. …”
    Get full text
    Article
  2. 2222

    GENETİK OLARAK DEĞİŞTİRİLMİŞ ORGANİZMALARIN TARIMSAL ÜRETİMDE KULLANIMI, YÖNETİMİ VE AVRUPA BİRLİĞİNE UYUMLAŞTIRILMASI* ** by Oğuz Özdemir

    Published 2004-01-01
    “…ABSTRACTDevelopments ar isen in the period that has passed since the usage of GMO’s in agricultural production make it compulsory, the effective management o f these products in bio-security system.We deal in this article first, with ecological and socio-economical effects of GMO’s in the light ofresults from experimental works and predictions, second with the harmonisation of turkish regulations airmed to manage the merotioned risks within bio- security management to EU.GİRİŞSon yıllarda genetik ve moleküler biyolojide meydana gelen gelişmeler, organizmaların genetik yapılarının mühendislik uygulamalarıyla işlenebilmesi ve biçimlenebilmesini olanaklı hale getirmektedir. …”
    Get full text
    Article
  3. 2223

    Attacks on One Designated Verifier Proxy Signature Scheme by Baoyuan Kang

    Published 2012-01-01
    “…So, their scheme is not secure.…”
    Get full text
    Article
  4. 2224
  5. 2225

    Image Blocking Encryption Algorithm Based on Laser Chaos Synchronization by Shu-Ying Wang, Jian-Feng Zhao, Xian-Feng Li, Li-Tao Zhang

    Published 2016-01-01
    “…In view of the digital image transmission security, based on laser chaos synchronization and Arnold cat map, a novel image encryption scheme is proposed. …”
    Get full text
    Article
  6. 2226

    Regulation and Compliance in Telemedicine: Viewpoint by Julia Ivanova, Mollie R Cummins, Triton Ong, Hiral Soni, Janelle Barrera, Hattie Wilczewski, Brandon Welch, Brian Bunnell

    Published 2025-01-01
    “…We conclude that simplified policies are needed to keep telemedicine accessible to providers and patients and that current privacy and security measures need refinement to protect patients appropriately.…”
    Get full text
    Article
  7. 2227

    A SURVEY OF NETWORK SERVICE LOG PROCESSING PLATFORMS AND TECHNIQUES FOR THE DETECTION OF INFORMATION INSECURITY RISKS by Phạm Duy Lộc, Hoàng Xuân Dậu

    Published 2018-07-01
    “…In the layers of information security measures, the monitoring and detection measures of anomalous activities and information insecurity risks are considered the second defense layer behind firewalls and access controls. …”
    Get full text
    Article
  8. 2228

    GLOBAL DILEMMA OF NUCLEAR PROLIFERATION: THE CASE OF IRAN by FRANCIS OSAYI OSADEBAMWEN

    Published 2023-12-01
    “… The need for the international community to get her engagement right is crucial for the sustenance of Peace and security. The quest for self-preservation through the acquisition of nuclear weapons is often seen by other states as threat to their own existence. …”
    Get full text
    Article
  9. 2229
  10. 2230

    Analysis and Design of Identity Authentication for IoT Devices in the Blockchain Using Hashing and Digital Signature Algorithms by Lei Wang, Ying Yuan, Yan Ding

    Published 2023-01-01
    “…This paper proposes a blockchain-based identity authentication (BA) scheme for IoT devices to solve the authentication security problem of IoT devices. The BA scheme uses hashing and digital signature algorithms to achieve integrity and nonrepudiation of authentication messages. …”
    Get full text
    Article
  11. 2231

    Developments in welfare of parent stock and commercial broilers by Tim Burnside, Anne-Marie Neeteson

    Published 2025-02-01
    “…Poultry meat is an important animal source food, and instrumental for global food security. The contribution that poultry breeding makes to meet current and future needs can be described in terms of a Code of Good Practice for Sustainable Breeding (Code-EFABAR®), and as Five Commitments to 1) Health, Food Safety and Food Security; 2) Diversity; 3) Balanced Breeding; 4) Management and Stockmanship; and 5) Transparency, Communication and Engagement. …”
    Get full text
    Article
  12. 2232

    Questão fundiária: posse tradicional versus propriedade da terra entre Brasil e Cabo Verde by Carolina dos Anjos de Borba

    Published 2013-01-01
    “…Additionally, the two localities offer dense ethnographic materials to work the theoretical issue of "land-security".…”
    Get full text
    Article
  13. 2233
  14. 2234

    African Orphan Crops under Abiotic Stresses: Challenges and Opportunities by Zerihun Tadele

    Published 2018-01-01
    “…A changing climate, a growing world population, and a reduction in arable land devoted to food production are all problems facing the world food security. The development of crops that can yield under uncertain and extreme climatic and soil growing conditions can play a key role in mitigating these problems. …”
    Get full text
    Article
  15. 2235

    Aid Effectiveness: From Project Appraisal to Strategic Impact Evaluation by D. A. Degterev

    Published 2020-11-01
    “…The US case shows key principles of ensuring policy coherence at different levels of goal-setting — from the National Security Strategy to planning individual projects and programs. …”
    Get full text
    Article
  16. 2236

    Multi-sensor image fusion based on contrast and directional features optimization by Haiyan Jin, Meng Zhang, Zhaolin Xiao, Yaning Li

    Published 2018-12-01
    “…Multi-sensor image fusion is always an important and opening problem, which can enhance visual quality and benefit some social security applications. In this article, we use contrast pyramid to decompose visible and infrared images, respectively, and the directional filter banks are applied to obtain multiple directional sub-band image features. …”
    Get full text
    Article
  17. 2237

    Patients’ Health Records Management in Ugandan Hospitals: A Case of Kabale Regional Referral Hospital by Daniel, Nabimanya, Sembatya, Richard, Ambrose, Atuhaire, Phelix, Businge Mbabazi

    Published 2021
    “…The study concluded that privacy of patients’ records was vital to the patients and recommended that security measures be implemented.…”
    Get full text
    Article
  18. 2238

    Dynamic monitoring and drivers of ecological environmental quality in the Three-North region, China: Insights based on remote sensing ecological index by Leyi Zhang, Xia Li, Xiuhua Liu, Zhiyang Lian, Guozhuang Zhang, Zuyu Liu, Shuangxian An, Yuexiao Ren, Yile Li, Shangdong Liu

    Published 2025-03-01
    “…Additionally, these have provided scientific references for determining whether to expand the implementation of ecological restoration measures in arid regions to enhance the ecological environment and establish a robust ecological security barrier.…”
    Get full text
    Article
  19. 2239

    Mathematical modelling-based blockchain with attention deep learning model for cybersecurity in IoT-consumer electronics by Hayam Alamro, Mohammed Maray, Jawhara Aljabri, Saad Alahmari, Monir Abdullah, Jehad Saad Alqurni, Faiz Abdullah Alotaibi, Abdelmoneim Ali Mohamed

    Published 2025-02-01
    “…Security in the Internet of Things (IoT)-consumer electronics is decisive in safeguarding connected devices from possible vulnerabilities and threats. …”
    Get full text
    Article
  20. 2240

    « Paroles de flics ». Communications policières et actualité politique au Maroc (2005-2023) by Mériam Cheikh

    Published 2023-12-01
    “…In line with the political readjustment period, communication will become less and less aimed at the general public and more and more focused on members of the security forces.…”
    Get full text
    Article