Showing 2,241 - 2,260 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 2241

    Ecological problem identification based on spatial and temporal dynamics of ecosystem quality: A case study by Rui Zhang, Huamin Liu, Zhichao Xu, Xinchuan Zhao, Lu Wen, Yi Zhuo, Lixin Wang

    Published 2025-01-01
    “…Bayannur, located in the Hetao Plain and the Urat Grassland, is China’s important ecological security barrier. It plays a significant role in the country’s sustainable socio-economic development, ecological protection, and high-quality growth. …”
    Get full text
    Article
  2. 2242

    Discussion on Artificial Intelligence Safety and Ethical Issues by Chen Xinyu, Hui Tianfang, Li Yanlin, Yang Haoyuan

    Published 2025-01-01
    “…This article explores the development of artificial intelligence technology and its potential safety and ethical challenges in various fields. In terms of security, the risk of adversarial attacks is analyzed in depth, and the robustness of the model is enhanced through adversarial training and data enhancement techniques. …”
    Get full text
    Article
  3. 2243

    Understanding, anticipating and managing health risks linked to climate migration by François Gemenne

    Published 2025-01-01
    “…Migration can improve the health and security of refugees, but also more broadly the health and security of people in host and home countries.…”
    Get full text
    Article
  4. 2244

    Aligning policy for success in developing countries: evidence from the poultry sector of Ghana by Omid Zamani, Craig Chibanda, Mavis Boimah, Collins Asante-Addo

    Published 2025-02-01
    “…Specifically, our study emphasizes the importance of striking a balance between fostering domestic production and ensuring food security.…”
    Get full text
    Article
  5. 2245

    THE ROLE OF TEENAGEERS’ LIFE EXPERIENCE ACTUALIZATION IN THE FRAMEWORK OF THE SAFE SOCIAL ENVIRONMENT FORMATION by O. A. Selivanov

    Published 2015-03-01
    “…The paper looks at the problem of social security and emphasizes the urgent need for developing the general theory of social security, its concepts and models designed to meet the requirements of time and specify different aspects and levels of socialization process – federal, regional and municipal. …”
    Get full text
    Article
  6. 2246
  7. 2247

    Challenges in providing correctional service education: A case study in a correctional institution in Amhara regional state, Ethiopia by Genet Gelana Kabeta, S G Pretorius

    Published 2023-06-01
    “…It was concluded that the majority of challenges faced in the case correctional institution occurred as a result of inadequate attention and conflicting missions of the correctional institution (security and rehabilitation) and the tendency of prioritizing security over rehabilitation. …”
    Get full text
    Article
  8. 2248

    A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding by S. J. Sheela, K. V. Suresh, Deepaknath Tandur

    Published 2017-01-01
    “…Chaotic maps have good potential in security applications due to their inherent characteristics relevant to cryptography. …”
    Get full text
    Article
  9. 2249

    Prediction and Analysis of Saltwater Intrusion in Pearl River Estuary Based on Machine Learning by DU Boheng, ZHANG Jingwen, KANG Zheng, CHEN Yifan, HUANG Hanliang, LIN Kairong, XIAO Mingzhong

    Published 2025-01-01
    “…To enhance the water supply security of coastal cities, it is necessary to analyze and predict saltwater intrusion. …”
    Get full text
    Article
  10. 2250
  11. 2251

    Statistical Comparison of piracy and armed robbery with emphasis on the South China Sea - Malacca Strait and the Persian Gulf - Strait of Hormuz by Mohammad Ali Zohourian

    Published 2019-12-01
    “…This research allowed us: 1) to make a distinction between the security in two aforementioned areas; 2) to represent the source of the information for researchers.…”
    Get full text
    Article
  12. 2252

    Integrating artificial intelligence into healthcare systems: opportunities and challenges by Bongs Lainjo

    Published 2024-10-01
    “…To address these concerns, healthcare organizations must promote a culture of accountability, ensuring that healthcare providers remain vigilant about patient data security. Overall, the article underscores the potential of AI to revolutionize healthcare while emphasizing the need to address the ethical, technical, and security challenges it brings.…”
    Get full text
    Article
  13. 2253

    Modeling Peer-to-Peer Botnet on Scale-Free Network by Liping Feng, Hongbin Wang, Qi Han, Qingshan Zhao, Lipeng Song

    Published 2014-01-01
    “…Our findings can provide meaningful instruction to network security management.…”
    Get full text
    Article
  14. 2254

    Revolutionizing healthcare delivery with blockchain technology by S Saravanan

    Published 2024-09-01
    “…By incorporating blockchain technology into the medical drone system, it is possible to improve the transparency and security of medical supply chains, as well as the tracking and monitoring of medical drones. …”
    Get full text
    Article
  15. 2255

    User Access Control and Authentication System for VoIP Service in Mobile Communication Environments by Ho-Kyung Yang, Jeong-Kyung Moon, Cheol-Rim Choi, Hwang-Bin Ryou

    Published 2014-02-01
    “…With the increasing demand for VoIP services, problems are also occurring, namely, security vulnerabilities and degraded service quality. …”
    Get full text
    Article
  16. 2256

    WESTERN BALKANS U. S. POLICY IN THE CONTEXT OF THE PRESIDENT TRUMP’S GRAND STRATEGY by Dragan Simić, Dragan Živojinović

    Published 2019-11-01
    “…Many critics of Donald Trump argue that Donald Trump’s Grand Strategy is an absence of Grand Strategy or that his foreign and security policy is driven by impulses and tactical approach. …”
    Get full text
    Article
  17. 2257

    Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks by Libing Wu, Jing Fan, Yong Xie, Jing Wang, Qin Liu

    Published 2017-03-01
    “…Due to the real-time requirement of message in vehicle ad hoc networks, it is a challenge to design an authentication for vehicle ad hoc networks to achieve security, efficiency, and conditional privacy-preserving. …”
    Get full text
    Article
  18. 2258

    Reconceptualizing Corruption as an International Crime: A Review of International Law by Satria Unggul Wicaksana Prakasa

    Published 2024-10-01
    “…The discourse surrounding corruption as an international crime is increasingly urgent, as it transcends national borders and contributes to economic crises, conflicts, and various crimes that threaten global security. Scholars such as Christensen (2017), Peters (2018), Davis (2018), and Rothe (2010) have linked corruption to human rights violations, revealing that states often struggle to address it effectively. …”
    Get full text
    Article
  19. 2259

    Micro-Trivium: A lightweight algorithm designed for radio frequency identification systems by Shiyong Zhang, Gongliang Chen

    Published 2017-02-01
    “…Mathematical analysis shows that using Micro-Trivium is as secure as using Trivium.…”
    Get full text
    Article
  20. 2260

    SQLite Encryption Method for Embedded Databases Based on Chaos Algorithm by Junlong Shi

    Published 2023-01-01
    “…It is an important topic in the field of information security at present, and it is an effective way to apply to embedded systems. …”
    Get full text
    Article