Showing 2,381 - 2,400 results of 5,943 for search '"security"', query time: 0.10s Refine Results
  1. 2381

    Blockchain-Based Anonymous Reputation System for Performance Appraisal by Hye Jin Lee, Duc Anh Luong, Jong Hwan Park, Hyoseung Kim

    Published 2025-01-01
    “…ARSPA provides a secure and efficient approach to improve the reliability and fairness of performance appraisal.…”
    Get full text
    Article
  2. 2382

    Breeding Maize (Zea mays L.) for Aluminum Tolerance through Heterosis and Combining Ability by Fekadu Asfawu, Gomathi Nayagam, Edossa Fikiru, Girum Azmach

    Published 2024-01-01
    “…Soil acidity, a major threat to food security in developing countries, can cause a staggering 71% decline in maize (Zea mays L.) production. …”
    Get full text
    Article
  3. 2383

    FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review by Abdulmajeed Adil Yazdeen, Subhi R. M. Zeebaree, Mohammed Mohammed Sadeeq, Shakir Fattah Kak, Omar M. Ahmed, Rizgar R. Zebari

    Published 2021-03-01
    “…The DES and the AES provide information security. DES and AES have the distinction of being introduced in both hardware and applications. …”
    Get full text
    Article
  4. 2384

    Multi-Smart Meter Data Encryption Scheme Basedon Distributed Differential Privacy by Renwu Yan, Yang Zheng, Ning Yu, Cen Liang

    Published 2024-03-01
    “…Even if an attacker has enough background knowledge, the security of the electricity information of one another can be ensured.…”
    Get full text
    Article
  5. 2385

    TBAS: Token-based authorization service architecture in Internet of things scenarios by Shih-Hsiung Lee, Ko-Wei Huang, Chu-Sing Yang

    Published 2017-07-01
    “…The advantages of this framework are practical and secure which are explained in the experimental chapter.…”
    Get full text
    Article
  6. 2386
  7. 2387

    Federated Learning-Based Load Forecasting for Energy Aggregation Service Providers by HUANG Yichuan, SONG Yuhui, JING Zhaoxia

    Published 2025-01-01
    “…However,the required forecasting data are typically scattered among different energy suppliers,and owing to data security and privacy concerns,these suppliers are often unwilling to share their data. …”
    Get full text
    Article
  8. 2388

    Engaged by the Revolution: the Lepsis Chekist family in Vyatka (1919) by A. S. Pozdnyakova

    Published 2023-05-01
    “…The purpose of the work is to use the example of a single married couple of security officers to indicate the factors that influenced the life of the family in the era of social cataclysms. …”
    Get full text
    Article
  9. 2389

    Transboundary Water Resources Conflict Analysis Using Graph Model for Conflict Resolution: A Case Study—Harirud River by Abdulsalam Amini, Hamidreza Jafari, Bahram Malekmohammadi, Touraj Nasrabadi

    Published 2021-01-01
    “…One of the most important environmental issues today is the water crisis and the ensuing security challenges. Of these, transboundary waters pose the most significant security challenges. …”
    Get full text
    Article
  10. 2390

    ECONOMIC CRIME UNDER MARTIAL LAW IN UKRAINE by Maksym Korniienko, Hanna Foros, Serhii Baranov

    Published 2024-12-01
    “…Consequently, the prevailing national security and defence strategy falls short in ensuring the alignment of the Ukrainian security sector with the scientific and practical imperatives. …”
    Get full text
    Article
  11. 2391

    Quantum Computing for Advanced Driver Assistance Systems and Autonomous Vehicles: A Review by Avantika Rattan, Abhishek Rudra Pal, Muralimohan Gurusamy

    Published 2025-01-01
    “…The perks of quantum computation (QC) over classical systems are apparent with respect to security, privacy, and an exponentially high computation rate. …”
    Get full text
    Article
  12. 2392

    Analyzing Psychological Operations: A Case Study of Indo-Pak Hostility (2010-2024) by Jannat Naseeb

    Published 2025-01-01
    “…Overall, this research offers valuable insights into the efficacy of PSYOP in influencing audiences and contributes to the broader understanding of persuasion theory in the context of modern information warfare and national security. …”
    Get full text
    Article
  13. 2393

    The contribution of Electronic Records Management towards Organisational Performance: A case study of Stanbic Bank-Kabale Branch. by Kembabazi, Betty

    Published 2023
    “…Lastly, the researcher recommended the construction of ERMS facilities, improve ERMS security, encourage corroborations, have government support, and provide maximum training as better solutions for the topic under study.…”
    Get full text
    Thesis
  14. 2394
  15. 2395

    ASSESSMENT OF THE REGION'S INVESTMENT ENVIRONMENT AND POLICY INSTRUMENTS FOR THE IMPLEMENTATION OF ITS INVESTMENT POTENTIAL IN WARTIME by Ruslan Boiko, Roman Martsenyuk, Arsen Protsykevych

    Published 2024-12-01
    “…It is substantiated that effective instruments of regional investment policy in the context of critical instability are: military risk insurance and diversification; use of concession agreements; private and public investments in the defence industry and critical infrastructure industries/sectors (energy, transport and logistics, medicine and pharmaceuticals, natural resources); support for innovative and technological startups in the areas of security, the real economy and infrastructure; stimulation of investments in human resources; support for investments in business projects of demobilised persons, war veterans and other combatants; encouragement of investments in the development of export potential to maintain the country's financial security.…”
    Get full text
    Article
  16. 2396
  17. 2397

    Implementasi Algoritma Mickey 2.0 untuk Mengamankan Komunikasi Data pada Perangkat Bluetooth Low Energy by Amelia Dwi Rochani, Ari Kusyanti, Fariz Andri Bakhtiar

    Published 2022-12-01
    “…To determine the level of security, a passive sniffing attack and an active Known Plaintext Attack (KPA) were tested. …”
    Get full text
    Article
  18. 2398

    Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption by Rebwar Khalid Muhammed, Ribwar Rashid Aziz, Alla Ahmad Hassan, Aso Mohammed Aladdin, Shaida Jumaah Saydah, Tarik Ahmed Rashid, Bryar Ahmad Hassan

    Published 2024-05-01
    “…Encrypt has grown into an answer that has become an essential element of information security systems. To ensure the security of shared data, including text, images, or videos, it is essential to employ various methods and strategies. …”
    Get full text
    Article
  19. 2399
  20. 2400