Showing 2,541 - 2,560 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 2541

    Analysis and prediction of urban agglomeration ecological footprint based on improved three-dimensional ecological footprint and shared socioeconomic pathways by Ruirui Jiang, Liangjun Fei, Shouxuan Kang

    Published 2025-01-01
    “…This study analyzes the spatial–temporal dynamics of ecological security, sustainability, and driving factors in Shaanxi’s Guanzhong urban agglomeration. …”
    Get full text
    Article
  2. 2542

    Food insecurity among African Americans in the United States: A scoping review. by Elizabeth Dennard, Elizabeth Kristjansson, Nedelina Tchangalova, Sarah Totton, Donna Winham, Annette O'Connor

    Published 2022-01-01
    “…The primary objectives of this review were to identify which risk factors have been investigated for an association with food insecurity, describe how food insecurity is measured across studies that have evaluated this outcome among African Americans, and determine which dimensions of food security (food accessibility, availability, and utilization) are captured by risk factors studied by authors. …”
    Get full text
    Article
  3. 2543

    Transformation of Turkey's Anti-Terrorism Policy under the AKP by V. A. Avatkov, A. I. Sbitneva

    Published 2022-07-01
    “…In the era of new challenges and threats, the most dangerous of which has occurred terrorism, the Republic of Turkey becomes one of the key centers of power in the Middle East and pursues the goal to create a regional security architecture around itself as well as to counter various terrorist organizations. …”
    Get full text
    Article
  4. 2544

    The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database by Jeongseok Choi, Jaekwon Kim, Dong Kyun Lee, Kwang Soo Jang, Dai-Jin Kim, In Young Choi

    Published 2016-03-01
    “…The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.…”
    Get full text
    Article
  5. 2545

    Optimal Topology Management for Software-Defined Networks Minimizing Latency and Using Network Slicing by Andrés Viveros, Pablo Adasme, Ali Dehghan Firoozabadi

    Published 2024-01-01
    “…To the best of our knowledge, this journal paper constitutes a first attempt to incorporate network slicing in SDN allowing flexibility, resource efficiency, security, and effective management of the network facilitating the deployment of customized and adaptive services. …”
    Get full text
    Article
  6. 2546

    A Modified WASPAS Method for the Evaluation of E-Commerce Websites Based on Pythagorean Fuzzy Information by Xiufang Ou, Bingbin Chen

    Published 2025-01-01
    “…They are essential to keep up with the market changes and shifts to provide better compliance with security requirements and to optimize the interface to hold onto user attention. …”
    Get full text
    Article
  7. 2547

    Development of Hybrid Intrusion Detection System Leveraging Ensemble Stacked Feature Selectors and Learning Classifiers to Mitigate the DoS Attacks by P. Mamatha, S. Balaji, S. Sai Anuraghav

    Published 2025-02-01
    “…Since these technologies are deeply rooted in the individual’s comfort life, protecting the user’s privacy and security against the growing DoS attack has become a major challenge among researchers. …”
    Get full text
    Article
  8. 2548

    Detection of False Data Injection Attacks (FDIA) on Power Dynamical Systems With a State Prediction Method by Abhijeet Sahu, Truc Nguyen, Kejun Chen, Xiangyu Zhang, Malik Hassanaly

    Published 2025-01-01
    “…With the deeper penetration of inverter-based resources in power systems, false data injection attacks (FDIA) are a growing cyber-security concern. They have the potential to disrupt the system’s stability like frequency stability, thereby leading to catastrophic failures. …”
    Get full text
    Article
  9. 2549

    Smart home technology to support engagement in everyday activities while ageing: A focus group study with current and future generations of older adults. by William Son Galanza, Jens Offerman, Sofi Fristedt, Susanne Iwarsson, Nebojsa Malesevic, Steven M Schmidt

    Published 2025-01-01
    “…The perceived advantages of SHT include enhancing the sense of security and safety, which can facilitate engagement in everyday activity. …”
    Get full text
    Article
  10. 2550

    Wild Edible Plant Nutritional Contribution and Consumer Perception in Ethiopia by Haile Tesfaye Duguma

    Published 2020-01-01
    “…Even though wild edible plants are important for food security, they are usually overlooked and perceived as food for poor families. …”
    Get full text
    Article
  11. 2551

    Detection and diagnosis of unknown threats in power equipment using machine learning and Spark technology by Li Di, Cen Chen, Zhuo Lv, Mingyan Li, Nuannuan Li, Hao Chang

    Published 2025-01-01
    “…This approach allows for more efficient and accurate detection of unknown threat attacks on power grid equipment, providing robust network security for power systems. Our findings offer a new theoretical perspective for the evolving field of network security.…”
    Get full text
    Article
  12. 2552

    Ethnobotanical study of wild edible plants in Metema and Quara districts, Northwestern Ethiopia by Daniel Tadesse, Getinet Masresha, Ermias Lulekal, Asmamaw Alemu

    Published 2025-02-01
    “…Abstract Background Wild edible plants (WEPs) are vital to enhance food security and generate income. Despite Ethiopia’s vast area and cultural diversity, there remains a need for further investigation of WEPs. …”
    Get full text
    Article
  13. 2553
  14. 2554

    MonoMax Suture: A New Long-Term Absorbable Monofilament Suture Made from Poly-4-Hydroxybutyrate by Erich K. Odermatt, Lutz Funk, Rainer Bargon, David P. Martin, Said Rizk, Simon F. Williams

    Published 2012-01-01
    “…Its tensile modulus of 0.48 GPa is approximately one-third of the value of the PDS II fiber providing an exceptionally flexible and pliable fiber with excellent knot strength and security. These features are further enhanced by the fiber's elasticity, which also improves knot security and may help prevent wound dehiscence. …”
    Get full text
    Article
  15. 2555

    Supply risk propagation in international trade networks of the tungsten industry chain by Xinxin Zheng, Huajiao Li, Xiaojie Liu, Xingxing Wang, Yuqi Zhang, Qianyong Tang, Bo Ren

    Published 2025-01-01
    “…The results can provide reference and decision support for different economies to secure the supply security and sustainability of tungsten resources.…”
    Get full text
    Article
  16. 2556

    ASEAN Defence Ministers MeetingPlus: Institutional structure, specific features, and evolution (2010–2022) by K. G. Muratshina

    Published 2024-09-01
    “…In 2010, a specific security-related dialogue format has been introduced into this system, — the ASEAN Defence Ministers Meeting-Plus (ADMM-Plus). …”
    Get full text
    Article
  17. 2557

    A Covert α-Stable Noise-Based Extended Random Communication by Incorporating Multiple Inverse Systems by Areeb Ahmed, Zoran Bosnic

    Published 2025-01-01
    “…The results from Monte Carlo simulations show that deploying the proposed ERCS not only leads to better Bit Error Rate (BER) performance but also provides increased covertness values, which proves the design’s ability to enhance performance and security compared to earlier models. Simulation analysis also suggests that the utilization of multiple inverse systems in the proposed ERCS can enhance the physical-layer security of next-generation communication devices.…”
    Get full text
    Article
  18. 2558

    Analysis of new varieties adoption behavior of Chinese turbot farmer based on the perspective of heterogeneity by Qilei Ding, Zhengyong Yang, Renjie Xu, Yifei Chen

    Published 2025-01-01
    “…China is the largest turbot farming in the world, where germplasm source security is closely related to national security. To further promote the sustainable development of the turbot aquaculture industry, the China Marine Fish Industry Technology System team has developed a new variety of fast-growing turbot (hereinafter referred to as new varieties) in 2012. …”
    Get full text
    Article
  19. 2559

    Systems Evaluation for Operational Risks of International Transport Corridors: A Case Study of China-Pakistan-Iran-Turkey International Transport Corridor by Zhou Xiaoxiang, Huang Chengfeng

    Published 2021-01-01
    “…The Chinese section has the lowest operational risk index. (2) Pakistan has been trapped in severe political risks and security risks in recent years. Turkey suffers from severe security risks due to the Kurdish problem. …”
    Get full text
    Article
  20. 2560

    Grid-Based Anomaly Detection of Freight Vehicle Trajectory considering Local Temporal Window by Zixian Zhang, Geqi Qi, Avishai (Avi) Ceder, Wei Guan, Rongge Guo, Zhenlin Wei

    Published 2021-01-01
    “…The security travel of freight vehicles is of high societal concern and is the key issue for urban managers to effectively supervise and assess the possible social security risks. …”
    Get full text
    Article