Showing 2,281 - 2,300 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 2281

    From threat to response: Cybersecurity evolution in Albania by Klorenta PASHAJ, Vilma TOMÇO, Eralda GJIKA

    Published 2025-01-01
    “…The focus is on how Albania has tailored its strategic responses to enhance digital resilience and national security. In the second part, the paper provides an in-depth review of the threat models prevalent in the Western Balkans and Albania, highlighting key areas where Albania's cyber management requires further development. …”
    Get full text
    Article
  2. 2282

    Recessive transition of rural residential land use from the perspective of value co-creation: A case study of Yiwu City, Zhejiang by ZHANG Cong, LONG Hualou, FENG Dedong

    Published 2025-01-01
    “…[Results] (1) Value co-creation of ural residential land follows the process model of “value consensus-value execution-value win-win” and the operational paradigm of “subject interaction - capacity embedding - benefit sharing”, driving the “element integration - structure reorganization - function optimization” of rural residential land use system, resulting in the dynamic evolution of diverse values such as residential security, economic property, production and operation, ecological protection, and cultural inheritance, and achieving the recessive rural residential land use transition. (2) Yiwu’s practice path of guiding multiple stakeholders to interact collaboratively, constructing “value consensus” for rural residential land, driving with multiple forces, and implementing “value execution” for rural residential land through multi-dimensional rule interaction is a successful model for realizing the recessive rural residential land use transformation through value co-creation. (3) Through the practice of value co-creation, Yiwu has achieved a transformation of the functional value of rural residential land from residential security orientation to economic property orientation, and then to a comprehensive and coordinated approach that encompasses residential security, production and operation, economic assets, and ecological protection, etc. …”
    Get full text
    Article
  3. 2283
  4. 2284

    Averting War in Northeast Asia: A Proposal by Mel Gurtov

    Published 2011-01-01
    “…The most critical need of countries in Northeast Asia is an institution for crisis prevention, crisis management, and other security-promoting purposes-what might be called a Northeast Asia Security Dialogue Mechanism (NEASDM). …”
    Get full text
    Article
  5. 2285

    Cybersecurity in microgrids: A review on advanced techniques and practical implementation of resilient energy systems by Ijaz Ahmed, Ali M. El-Rifaie, Fazia Akhtar, Hasnain Ahmad, Zuhair Alaas, M.M.R. Ahmed

    Published 2025-03-01
    “…This study offers an in-depth examination of cyber security within the energy sector, exploring the historical backdrop of cyber-attacks and classifying different forms of MG breaches, encompassing both cyber and physical security strategies. …”
    Get full text
    Article
  6. 2286

    The Small Wars Doctrine of the US Marine Corps and Colonial Experience of the European Powers by S. G. Malkin

    Published 2023-12-01
    “…The findings broaden the understanding of the modern leading powers’ approaches to internal security models transfer, as well as of its limits.…”
    Get full text
    Article
  7. 2287

    Are free school meals failing families? Exploring the relationship between child food insecurity, child mental health and free school meal status during COVID-19: national cross-se... by Maria Bryant, Tiffany C Yang, Madeleine Power, Bridget Lockyer, Rachael H Moss, Wendy Burton, Bob Doherty

    Published 2022-06-01
    “…This study examined levels of food security and FSM status to support decision-making regarding increasing the current eligibility criteria.Design Two cross-sectional national surveys administered in August–September 2020 and January–February 2021 were used to examine the impact of COVID-19 on the food experiences of children and young people.Setting UK.Participants 2166 children (aged 7–17 years) and parents/guardians.Main outcome measures Participant characteristics were described by food security and FSM status; estimated marginal means were calculated to obtain the probability of poor mental health, expressed as children reporting feeling stressed or worried in the past month, by food security status and FSM status.Results We observed food insecurity among both children who did and did not receive of FSM: 23% of children not receiving FSM were food insecure. …”
    Get full text
    Article
  8. 2288

    Speeding Violation Type Prediction Based on Decision Tree Method: A Case Study in Wujiang, China by Zeyang Cheng, Jian Lu, Zhenshan Zu, Yunxuan Li

    Published 2019-01-01
    “…This study is approved by the Traffic Police Brigade of Wujiang Public Security Bureau and aims to explore the characteristic of the speeding violation behaviour and attempt to make an effective prediction about it. …”
    Get full text
    Article
  9. 2289

    Artificial Intelligence in Pediatric Epilepsy Detection: Balancing Effectiveness With Ethical Considerations for Welfare by Marina Ramzy Mourid, Hamza Irfan, Malik Olatunde Oduoye

    Published 2025-01-01
    “…However, ethical considerations around privacy, data security, and model bias remain crucial for responsible AI integration. …”
    Get full text
    Article
  10. 2290
  11. 2291
  12. 2292
  13. 2293
  14. 2294
  15. 2295

    Zero-Trust Access Control Mechanism Based on Blockchain and Inner-Product Encryption in the Internet of Things in a 6G Environment by Shoubai Nie, Jingjing Ren, Rui Wu, Pengchong Han, Zhaoyang Han, Wei Wan

    Published 2025-01-01
    “…This mechanism ensures data security while maintaining system efficiency in environments with large-scale data interactions.…”
    Get full text
    Article
  16. 2296
  17. 2297

    Food Insecurity and Not Dietary Diversity Is a Predictor of Nutrition Status in Children within Semiarid Agro-Ecological Zones in Eastern Kenya by Zipporah N. Bukania, Moses Mwangi, Robert M. Karanja, Richard Mutisya, Yeri Kombe, Lydia U. Kaduka, Timothy Johns

    Published 2014-01-01
    “…No significant difference (P>0.05) was observed in food security and dietary diversity score (DDS) between LM4 and LM5. …”
    Get full text
    Article
  18. 2298

    Cloud Platform Selection Model in the Framework of Differential Quality Game With Fuzzy Information by Kaiyrbek Makulov, Arkadii A. Chikrii, Valery Lakhno, Bagdat Yagaliyeva, Volodimir Malyukov, Inna Malyukova, Miroslav Lakhno

    Published 2025-01-01
    “…Employing a differential quality game with fuzzy information, this study introduces a reliable DSS that incorporates cost, security and QoS to select the most appropriate cloud platform. …”
    Get full text
    Article
  19. 2299

    Tea Growing and Socio-Economic Development of Small Holder Farmers: A Case Study of Rushoroza Kabale District. by Byamukama, Hillary

    Published 2025
    “…The study findings indicated that there were contributions of tea growing to welfare they included; poverty alleviation, food security, illiteracy level, financial support, capital base, collateral security, and illiteracy level. …”
    Get full text
    Thesis
  20. 2300