Showing 2,441 - 2,460 results of 5,943 for search '"security"', query time: 0.05s Refine Results
  1. 2441

    Association between Cardiac Hypertrophy and Sex of Patients from a Hospital in Ecuador by Guido Nino Guida Acevedo, María Fernanda Cueva Moncayo, Piedad Elizabeth Acurio Padilla

    Published 2024-01-01
    “…<br /><strong>Objective:</strong> determine the association between cardiac hypertrophy and sex of patients in a hospital of the Ecuadorian Institute of Social Security. <br /><strong>Methods:</strong> a descriptive and cross-sectional study was carried out in December 2022 in a hospital of the Ecuadorian Social Security Institute. 88 patients were analyzed distributed into two groups: male and female, each with 44 patients. …”
    Get full text
    Article
  2. 2442
  3. 2443

    Research on Indoor Positioning Systems and Autonomous Mechatronic Systems for Surveillance of Intrabuilding Zones by Alexandru Vlăsceanu, Mihai Avram, Victor Constantin, Edgar Moraru

    Published 2025-01-01
    “…Given increasingly complex threats, adapting surveillance approaches to meet the necessary security levels is essential. The aim of this paper is to develop a surveillance architecture based on autonomous mechatronic systems (mobile robots and drones) designed to secure areas of strategic interest, covering a predefined space while providing enhanced security at minimal costs. …”
    Get full text
    Article
  4. 2444

    Transformation in European Defence Supply Chains as Ukraine Conflict Fuels Demand by Roland Hellberg, Martin Lundmark

    Published 2025-01-01
    “…This study contributes to a deeper understanding and theoretical advancement in managing military and security challenges, with particular emphasis on enhancing readiness, resilience, and the scaling of military capabilities across cross-border defence supply chains.…”
    Get full text
    Article
  5. 2445

    Evolutionary modeling and robustness analysis of multi-domain cooperative communication network under the environment of Internet of things by Jianrong Wang, Pan Zhang, Wei Bai, Guoyuan Yang, Yunyun Yang

    Published 2022-11-01
    “…Through real-time monitoring and updating of the performance and security indicators of the multi-domain cooperative communication networks, it provides a strong guarantee for the node deployment and security management of the Internet of things cooperative communication system.…”
    Get full text
    Article
  6. 2446
  7. 2447

    Efficient data possession–checking protocol with deduplication in cloud by Jinxia Wei, Xinxin Niu, Ru Zhang, Jianyi Liu, Yuangang Yao

    Published 2017-08-01
    “…Data integrity verification with deduplication can not only save space of the cloud server but also ensure security of the stored data. In the existing integrity verification scheme, deduplications are implemented by the cloud server. …”
    Get full text
    Article
  8. 2448

    Terrorist Group Behavior Prediction by Wavelet Transform-Based Pattern Recognition by Ze Li, Duoyong Sun, Bo Li, Zhanfeng Li, Aobo Li

    Published 2018-01-01
    “…Predicting terrorist attacks by group networks is an important but difficult issue in intelligence and security informatics. Effective prediction of the behavior not only facilitates the understanding of the dynamics of organizational behaviors but also supports homeland security’s missions in prevention, preparedness, and response to terrorist acts. …”
    Get full text
    Article
  9. 2449

    Fuzzy logic based social trust computation scheme in Flying Ad-hoc network by Joydeep Kundu, Sahabul Alam, Arindam Dey

    Published 2025-03-01
    “…The Flying Ad Hoc Networks (FANETs) are becoming more popular in civic security, military, and multipurpose applications. …”
    Get full text
    Article
  10. 2450

    Design, Simulation, and Experimental Verification of a Destruction Mechanism of Transient Electronic Devices by Yu Xiao, Zhengyuan Zhang, Xiyi Liao, Feiyu Jiang, Yan Wang

    Published 2020-01-01
    “…To quickly destroy electronic devices and ensure information security, a destruction mechanism of transient electronic devices was designed in this paper. …”
    Get full text
    Article
  11. 2451

    Digitization and Preservation of Academic Records: A case Study of Kabale University Registry. by Ainanani, Catherine

    Published 2024
    “…The study also identified several threats to these records, such as inadequate data security measures, insufficient storage space, cybersecurity threats, poor maintenance of digitization equipment, technological obsolescence, and potential disasters. …”
    Get full text
    Thesis
  12. 2452

    Walkshop ‘Nuclear risks and long-term peacekeeping’: 26.06.2025 – 01.07.2025 by IGJR-Editors

    Published 2024-12-01
    “… Since 2021, the FRFG has organised Walkshops on the topics social security and intergenerational contracts, atomic waste, the coal phase-out, and climate change. …”
    Get full text
    Article
  13. 2453

    Blockchain and Artificial Intelligence for Decentralized Edge Environments by Yuansong Qiao

    Published 2025-01-01
    “…Edge environments typically involve multiple stakeholders and the management of decentralized devices and resources, presenting significant challenges related to the assurance of data security, real-time processing, and efficient coordination [...]…”
    Get full text
    Article
  14. 2454
  15. 2455

    TRANSPORT SECTOR AND ITS ROLE IN THE IMPORT SUBSTITUTION OF AGRICULTURAL PRODUCTS: FORESIGHT by V. Persianov, A. Kurbatova

    Published 2016-05-01
    “…It also proposes a project of factory-farm integration to ensure the economic security of our country.…”
    Get full text
    Article
  16. 2456

    REDUCING ELECTRICITY CONSUMPTION FOR IRON AND STEEL SMELTING by L. E. Rovin, S. L. Rovin

    Published 2013-09-01
    “…It is shown that the introduction of high-temperature heating installation charge fusion provides increased security, stability of operation arc, reduced noise to 75–85 dB, the elimination of fugitive emissions in the work zone…”
    Get full text
    Article
  17. 2457

    THE METHODOLOGY OF THE FINANCIAL PROVIDING OF ACTIVITY OF THE FEDERAL GOVERNMENT BUDGETARY INSTITUTIONS by R. Murav’Ev

    Published 2017-01-01
    “…In this article considered the key principles of financing federal state budgetary institutions, analyzed the main sources of financial support activities, and also the analysis of the structure of financial security of the federal government budgetary institutions.…”
    Get full text
    Article
  18. 2458
  19. 2459

    Cost accounting for environmental safety by O. Kovalenko

    Published 2016-04-01
    “…The article describes the main approaches to cost accounting for environmental security, the analysis of methods of cost accounting, proposals for the organization of accounting for the item "Environmental protection measures", systematizing the cost of measures for environmental protection aimed at co-storage and restoration of natural environment, rational use and vosproizvel of natural resources…”
    Get full text
    Article
  20. 2460