Showing 2,341 - 2,360 results of 5,943 for search '"security"', query time: 0.05s Refine Results
  1. 2341

    Nurturing care during COVID-19: a rapid review of early evidence by Bernadette Daelmans, Tarun Dua, Vanessa Cavallera, Kristy Hackett, Kerrie Proulx, Rachel Lenzi-Weisbecker, Rachel Hatch, Carina Omoeva

    Published 2022-06-01
    “…A relatively large number of studies examined child safety and security and indicate a reduction in maltreatment referrals. …”
    Get full text
    Article
  2. 2342
  3. 2343
  4. 2344
  5. 2345

    Food economics : industry and markets / by Hansen, Henning Otte, 1959-

    Published 2013
    View in OPAC
    Book
  6. 2346

    A Detection Method Against Load Redistribution Attacks in the Interdependence of the Natural Gas Network and Power System Based on Entropy by Yaoying Wang

    Published 2023-09-01
    “…The findings indicate that the detector based on entropy exhibits efficacy in detecting both stochastic and purposeful attacks, thereby augmenting the security of interconnected gas and electricity networks.…”
    Get full text
    Article
  7. 2347

    Attitudes and preferences toward the adoption of voice-controlled intelligent personal assistants: Evidence from Croatia by Antun Biloš, Bruno Budimir, Borna Kraljević

    Published 2023-06-01
    “…The main research focus was set on attitudes and perceptions of users and non-users related to benefits and barriers of IPA adoption, privacy and security issues, trust as well as mobile phone usage patterns, motivators, and associated smartphone digital literacy. …”
    Get full text
    Article
  8. 2348

    Patients’ Experiences with Specialist Care via Video Consultation in Primary Healthcare in Rural Areas by Annette M. Johansson, Inger Lindberg, Siv Söderberg

    Published 2014-01-01
    “…Additionally, good communication was essential for the patient’s perception of security during the VC encounter.…”
    Get full text
    Article
  9. 2349

    RUSSIA IN THE GLOBAL INFORMATION SOCIETY by E. S. Zinovieva

    Published 2016-06-01
    “…Russian diplomacy is trying to foster the development of global rules regulating the information society and information security based on respect for sovereignty and equality of states. …”
    Get full text
    Article
  10. 2350

    EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications by Rong Jiang, Chengzhe Lai, Jun Luo, Xiaoping Wang, Hong Wang

    Published 2013-11-01
    “…Compared with conventional EAP-AKA, our protocol guarantees stronger security and provides better performance. Detailed security analysis has shown that the proposed EG-AKA protocol is secure in terms of user and group identity protection and resistance to several attacks. …”
    Get full text
    Article
  11. 2351

    An encryption algorithm for multiple medical images based on a novel chaotic system and an odd-even separation strategy by Chunyun Xu, Yubao Shang, Yongwei Yang, Chengye Zou

    Published 2025-01-01
    “…To simultaneously augment security and optimize encryption efficiency, we undertake a dual-pronged approach. …”
    Get full text
    Article
  12. 2352

    Effects of Integrated Soil Fertility Management Technologies on the Productivity of Sorghum in the Drier Parts of Upper Eastern Kenya by Hezron Mogaka, Shadrack Kiprotich

    Published 2025-01-01
    “…Similarly, the results have wider policy effects for agriculture, especially in places where ISFM may be very important for long-term food security and agricultural productivity.…”
    Get full text
    Article
  13. 2353

    A Survey of Blockchain Applications for Management in Agriculture and Livestock Internet of Things by Yang Yang, Min Lin, Yangfei Lin, Chen Zhang, Celimuge Wu

    Published 2025-01-01
    “…The findings suggest that blockchain technology not only improves data security and trustworthiness but also opens new avenues for efficient and transparent management in agriculture and animal husbandry.…”
    Get full text
    Article
  14. 2354

    La politique de réconciliation nationale en Algérie : une approche sécuritaire by Mansour Kedidir

    Published 2022-01-01
    “…In order to restore peace and security, the government undertook a reconciliation process characterized by three phases: Clemency measures in the criminal field and two policies of civil concord and national reconciliation. …”
    Get full text
    Article
  15. 2355

    Policing wildlife trafficking in northeastern Mexico: the case of Tamaulipas in 2023-2024 by José Luis Carpio-Domínguez, José Juan Cervantes-Niño, Jesús Ignacio Castro-Salazar, Violeta Mendezcarlo-Silva

    Published 2025-01-01
    “…Illegal wildlife trade is an environmental, economic, and social problem that threatens global public health and the security of countries. It is one of the main drivers of biodiversity loss on a global scale. …”
    Get full text
    Article
  16. 2356
  17. 2357

    A Data-Driven Approach for Reactive Power Optimization Incorporating Interval Values for Renewable Power Generation by Honglei Jia, Cong Zhang, Jieming Du, Na Kuang

    Published 2023-01-01
    “…The increasing integration of renewable energy sources into modern electric grids has led to a rise in uncertain factors that must be managed to maintain voltage security during reactive power optimization (RPO). …”
    Get full text
    Article
  18. 2358

    Accelerating the SM3 hash algorithm with CPU‐FPGA Co‐Designed architecture by Xiaoying Huang, Zhichuan Guo, Mangu Song, Xuewen Zeng

    Published 2021-11-01
    “…Abstract SM3 hash algorithm developed by the Chinese Government is used in various fields of information security, and it is being widely used in commercial security products. …”
    Get full text
    Article
  19. 2359

    EFFECT OF SOCIAL MEDIA IN PROMOTING INSECURITY AND PROPAGANDA IN NIGERIA by ABDULWAHAB ABDULKABIR, NURUDEEN SOLA IBRAHIM

    Published 2024-07-01
    “…It was also discovered that the regulation of social media in Nigeria for security purpose is very poor, which is a matter of concern to the citizens. …”
    Get full text
    Article
  20. 2360

    Frequency-bin-encoded entanglement-based quantum key distribution in a reconfigurable frequency-multiplexed network by Anahita Khodadad Kashi, Michael Kues

    Published 2025-01-01
    “…Abstract Large-scale quantum networks require dynamic and resource-efficient solutions to reduce system complexity with maintained security and performance to support growing number of users over large distances. …”
    Get full text
    Article