Showing 2,421 - 2,440 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 2421
  2. 2422

    Quality of public services in the field of population administration in malang public administrative mall by Didik Supriyanto

    Published 2023-12-01
    “…Employees in terms of helping people who need services, especially people who are confused about services, have been seen between officers and visitors who communicate with each other. Security at the Malang City Public Administration Mall has shown efforts to improve the quality of its services related to providing a sense of security for the community. …”
    Get full text
    Article
  3. 2423

    An Analysis of Spatial Pathology of the Physical and Social Structure of the City with Non-Relevant Defense Approach Case Study: Tehran Metropolitan Area by s z, a t, m a

    Published 2019-06-01
    “…In addition, it was revealed that education and awareness, resiliency against security-military threats, skill and expertise, respectively, are the effective indicators of the vulnerability of the social structure of the area.…”
    Get full text
    Article
  4. 2424

    Identifying the Dimensions and Components of the Executive Requirements of Islamic Microfinance by Akram Taftiyan, Farideh Noor Mohammadi

    Published 2023-12-01
    “…The findings of the research show that the aspects related to ownership and control, the characteristics of loan contracts and security are considered to be the most important aspects affecting the executive requirements of Islamic microfinance, respectively. …”
    Get full text
    Article
  5. 2425

    Detecting Obfuscated Malware Infections on Windows Using Ensemble Learning Techniques by Yadigar Imamverdiyev, Elshan Baghirov, John Chukwu Ikechukwu

    Published 2025-01-01
    “…In the internet and smart devices era, malware detection has become crucial for system security. Obfuscated malware poses significant risks to various platforms, including computers, mobile devices, and IoT devices, by evading advanced security solutions. …”
    Get full text
    Article
  6. 2426

    ASEAN Regional Integration: The Philippines' domestic constraints to Physical connectivity by Tobit Abao, Hazel Jovita

    Published 2023-03-01
    “…Specifically, the Philippines faces severe domestic problems such as reduced spending on infrastructural development, coupled with critical institutional challenges and issues on stability and security. This paper argues the primacy of good governance as the precondition for a well-connected and sustainable infrastructure. …”
    Get full text
    Article
  7. 2427

    ECP-IEM: Enhancing seasonal crop productivity with deep integrated models. by Ghulam Mustafa, Muhammad Ali Moazzam, Asif Nawaz, Tariq Ali, Deema Mohammed Alsekait, Ahmed Saleh Alattas, Diaa Salama AbdElminaam

    Published 2025-01-01
    “…Accurate crop yield forecasting is vital for ensuring food security and making informed decisions. With the increasing population and global warming, addressing food security has become a priority, so accurate yield forecasting is very important. …”
    Get full text
    Article
  8. 2428

    Enhancing the Process of AES: A Lightweight Cryptography Algorithm AES for Ad-hoc Environments by Alharith A. Abdullah, Çağatay Aydin, Oğuz Ata, Mustafa Alhandhal

    Published 2022-12-01
    “…This algorithm will be modified to improve the security as well as reduce the amount of time and energy consumed in comparison with the original algorithm. …”
    Get full text
    Article
  9. 2429

    A study of Belarusian women’s perceptions of safety and its relationships with victimization and social gender by I. V. Golyakova, V. А. Karpiyevich

    Published 2024-10-01
    “…It has been shown that for women security is associated with such concepts as peace in their country, reliability, health, and control of the situation. …”
    Get full text
    Article
  10. 2430
  11. 2431

    A New Sensors-Based Covert Channel on Android by Ahmed Al-Haiqi, Mahamod Ismail, Rosdiadee Nordin

    Published 2014-01-01
    “…New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze its security model, in particular the two key principles: process-isolation and the permissions system. …”
    Get full text
    Article
  12. 2432

    Secrecy Cognitive Gain of Cognitive Radio Sensor Networks with Primary Outage Constraint by Hongyu Ma, Kai Niu, Weiling Wu, Shengyu Li, Guangqian Chu

    Published 2015-06-01
    “…Then, the concept of secrecy cognitive gain is produced to highlight the effect of SR systems with secrecy on the whole networks security. Comparing with a single PR system, the SR system is beneficial to enhance the secrecy level for overlaid CRSNs. …”
    Get full text
    Article
  13. 2433
  14. 2434

    Geomodeling soil quality using remote sensing and land use metrics in Abeokuta, Nigeria by Tobore Anthony, Anoke Emmanuel

    Published 2025-01-01
    “…The findings suggest valuable ways for SQ improvement and could contribute to efforts on achieving food security, well-being and meet sustainable development goal 2.…”
    Get full text
    Article
  15. 2435

    The Kurdish Movement’s Factor in US Politics at the Peak of Iran and Afghanistan Crises, 1979 – January 1981 by V. T. Yungblud, A. I. Sennikov

    Published 2023-11-01
    “…Faced with the challenges presented by the Iranian and Afghan crises, the United States' analytical, intelligence, and military bodies navigated various resources in search of viable solutions.This study delves into the consideration of the Kurdish factor as a potential instrument in shaping the regional landscape. The National Security Council (NSC), State Department, Central Intelligence Agency (CIA), and the US Department of Defense all scrutinized the Kurdish movement, evaluating its prospects for advancing American interests. …”
    Get full text
    Article
  16. 2436

    Explaining The Territoriality Of Fundamentalist Organizations in Fragile States(Case Study: ISIS in Libya) by Morad Kaviani Rad, Hadi Aazami, Majid Rasouli, Ahmad Bakhshi

    Published 2018-03-01
    “…Fundamentalism is one of the security issues of today's world, and the Territorialize and , Territoriality of  fundamentalist terrorist groups has attracted a large part of the world's security literature.  …”
    Get full text
    Article
  17. 2437
  18. 2438

    Catalyzing digital transformation through Smart Cities initiatives in Indonesian local government by Rio Yusri MAULANA, Usman MARJAMAT, Dimas SUBEKTI, Agung WICAKSONO

    Published 2025-01-01
    “…Addressing leadership awareness and the digital talent gap is essential for successful implementation, alongside improving cyber management and data security. Building on these challenges, the research highlights potential development areas including collaboration enhancement, prioritization of interoperability, robust data center development focusing on cyber management and data security, and targeted digital talent cultivation. …”
    Get full text
    Article
  19. 2439

    Performance Improvement Based Authentication Protocol for Intervessel Traffic Service Data Exchange Format Protocol Based on U-Navigation System in WoT Environment by Byunggil Lee, Namje Park

    Published 2014-01-01
    “…And the vessel traffic information requires high security since it is highly protected by the countries. …”
    Get full text
    Article
  20. 2440

    AccFIT-IDS: accuracy-based feature inclusion technique for intrusion detection system by C. Rajathi, P. Rukmani

    Published 2025-12-01
    “…In today’s digital landscape, maintaining security has become increasingly difficult. Many organizations implement security mechanisms to protect their valuable resources from potential threats. …”
    Get full text
    Article