Showing 2,621 - 2,640 results of 5,943 for search '"security"', query time: 0.08s Refine Results
  1. 2621

    Skema Kredibilitas Sertifikat Berbasis Ilearning Gamifikasi Blockchain pada Kampus Merdeka by Qurotul Aini, Nur Azizah, Rahmat Salam, Nuke Puji Lestari Santoso, Fitra Putri Oganda

    Published 2023-02-01
    “…Blockchain technology is the answer to every security problem because of the permanent and peer-to-peer storage in a distributed network and significant security. …”
    Get full text
    Article
  2. 2622

    De la police coloniale française à la police nationale marocaine : décolonisation et héritages policiers (1953-1960) by Benjamin Badier

    Published 2023-12-01
    “…Among the numerous institutional continuities between the French protectorate over the Cherifian Empire (1912-1956) and independent Morocco, the security forces, particularly the police, stand out. …”
    Get full text
    Article
  3. 2623

    Enhanced Intrusion Detection in Drone Networks: A Cross-Layer Convolutional Attention Approach for Drone-to-Drone and Drone-to-Base Station Communications by Mohammad Aldossary, Ibrahim Alzamil, Jaber Almutairi

    Published 2025-01-01
    “…This study pioneers a unified security solution for Drone-to-Drone (D2D) and Drone-to-Base Station (D2BS) communications, filling a crucial IoD security gap. …”
    Get full text
    Article
  4. 2624

    First aid guidelines for fragile contexts (conflict, disaster and remote areas): Contextualization & Adaptation

    Published 2022-07-01
    “…In some instances, safety and security of the first aider and the person requiring help should be prioritized over providing care. …”
    Get full text
    Article
  5. 2625

    Intrusion detection using synaptic intelligent convolutional neural networks for dynamic Internet of Things environments by Hui Chen, Zhendong Wang, Shuxin Yang, Xiao Luo, Daojing He, Sammy Chan

    Published 2025-01-01
    “…The swift proliferation of IoT devices has brought about a multitude of complex cyberattacks that breach network security and compromise user privacy. To address these threats, this paper proposes a synaptic intelligent convolutional neural network (SICNN) model for intrusion detection in dynamic IoT environments. …”
    Get full text
    Article
  6. 2626

    Novel Technique of Pneumatic Posterior Capsulorhexis for Treatment and Prevention of Posterior Capsular Opacification by Ahmed M. Eid, Shaaban Abd-Elhamid Mehany Elwan, Ahmed M. Sabry, Hossam M. Moharram, Ashraf M. Bakhsh

    Published 2019-01-01
    “…Setting. (1) Ophthalmology department, Faculty of Medicine, Minia University, 61519, El-Minia, Egypt. (2) Security Forces Hospital, Ophthalmology Department, Riyadh, Kingdom of Saudi Arabia. …”
    Get full text
    Article
  7. 2627

    Sorghum yield prediction based on remote sensing and machine learning in conflict affected South Sudan by John Karongo, Joseph Ivivi Mwaniki, John Ndiritu, Victor Mokaya

    Published 2025-02-01
    “…This paper demonstrates that despite ongoing conflict, reasonably good end-of-season sorghum yield prediction with relevant food security planning implications could be done with ML, but challenges remain in generalizing these results due to limited crop data and regional variability in South Sudan.…”
    Get full text
    Article
  8. 2628

    Nutritional management and maize variety combination effectively control Striga asiatica in southern Africa by Simbarashe Mutsvanga, Edmore Gasura, Peter S. Setimela, Cacious S. Nyakurwa, Stanford Mabasa

    Published 2022-07-01
    “…Abstract Maize (Zea mays L.) is an important staple food crop in sub-Saharan Africa (SSA) and contributes significantly to food security. Due to Striga, maize yield loss is estimated between 20 and 80% forcing some farmers to abandon their land therefore threatening food security. …”
    Get full text
    Article
  9. 2629
  10. 2630

    The Potential of Emergency Medical Response to CBRNE Threats in the Context of Military-Civilian Cooperation by Arkadiusz Trzos, Karol Łyziński

    Published 2024-12-01
    “…Conclusions: Based on the results of four-year research and conceptual works completed under the project “Strengthening CBRNE Safety and Security — Coordination and Standardisation”, as part of Norway Grants for 2014–2021, a new medical rescue and healthcare functioning model was developed based on the potential of the latest technical solutions, resources and security management systems. …”
    Get full text
    Article
  11. 2631

    Russia and NATO’s ‘Open Door’ Policy in the Post-Bipolar Period by P. Ye. Smirnov

    Published 2024-07-01
    “…The author concludes that NATO enlargement has had an ambiguous impact on both the European security architecture, and the alliance itself. On the one hand, it gave the United States new opportunities to project power and consolidate its hegemonic status in Europe. …”
    Get full text
    Article
  12. 2632
  13. 2633

    The 1945 World Order – Process with «Open» Continuation by V. T. Yungblud

    Published 2020-09-01
    “…The Yalta-Potsdam system of international relations, established by culmination of World War II, was created to maintain the security and cooperation of states in the post-war world. …”
    Get full text
    Article
  14. 2634

    Public safety in the conditions of martial law and mental warfare by S. O. Tkachenko, A. S. Diadin

    Published 2022-09-01
    “…The main purpose of the study is to develop proposals and concrete measures to strengthen public security in the conditions of martial law and mental war unleashed against Ukraine. …”
    Get full text
    Article
  15. 2635
  16. 2636

    Improving Telemedicine through IoT and Cloud Computing: Opportunities and Challenges by M. Sunil Kumar, D. Ganesh

    Published 2024-09-01
    “…However, significant challenges are addressed, including data security, interoperability, and reliable internet connectivity in various healthcare settings. …”
    Get full text
    Article
  17. 2637

    The defense function of the state: Traditional and modern understanding by Vračar Milinko S., Barišić Igor I.

    Published 2025-01-01
    “…Since the defense function of the state is a complex phenomenon encompassing biological, anthropological, philosophical, sociological, psychological, political, security, military, strategic, and other aspects, understanding its essence is no easy task. …”
    Get full text
    Article
  18. 2638
  19. 2639

    Assessment of post-harvest fish losses at the fishers’ level in Lake Tana, Ethiopia by Solomon Birie, Minwyelet Mingist, Mulugeta Kibret

    Published 2025-01-01
    “…Fish are essential for ensuring food and nutrition security; and economic growth. However, post-harvest loss poses a significant challenge in the value chain due to the perishable nature of fish. …”
    Get full text
    Article
  20. 2640

    Survey of Artificial Intelligence Model Marketplace by Mian Qian, Abubakar Ahmad Musa, Milon Biswas, Yifan Guo, Weixian Liao, Wei Yu

    Published 2025-01-01
    “…It further explores the AI model life-cycle, highlighting pricing, trading, tracking, security, and compliance challenges. This detailed analysis is intended for an audience with a foundational understanding of AI systems, marketplaces, and their operational ecosystems. …”
    Get full text
    Article