Showing 2,701 - 2,720 results of 5,943 for search '"security"', query time: 0.10s Refine Results
  1. 2701

    Geopolityczne położenie Armenii oraz jej perspektywy po upadku Górskiego Karabachu by Kamil KŁYSZEJKO

    Published 2024-07-01
    “…The hypothesis of the paper is that in view of the current geopolitical situation, Armenia should deepen its cooperation with Iran, India and the United States at the expense of limiting its relations with the Russian Federation, which does not provide Armenia with security in the region anyway. …”
    Get full text
    Article
  2. 2702

    Budget Policy of the New Federal Government by Überblick

    Published 2022-01-01
    “…The red lines of the new coalition partners — adherence to the debt brake, reform of basic security, no tax increases, green investments — were often seen as “squaring the circle”. …”
    Get full text
    Article
  3. 2703

    Robust Distributed Reprogramming Protocol of Wireless Sensor Networks for Healthcare Systems by Kuo-Yu Tsai

    Published 2015-11-01
    “…In this paper, we propose a robust distributed reprogramming protocol of WSNs for healthcare systems, in which the security requirements are proved to be secure based on the elliptic curve discrete logarithm problem, such as existential unforgeability of signature for code image, authenticity of code image, freshness, and node compromised tolerance.…”
    Get full text
    Article
  4. 2704

    Dynamic Analysis of Network Protocol Hiding Behavior Based on Perceptual Mining by Xiaoyan Xu

    Published 2022-01-01
    “…This paper analyzes the typical abnormal behaviors such as hidden and invisible attacks of network protocols and proposes a new method to perceive and mine the abnormal behaviors of protocols so as to evaluate the operational security of protocols. Aiming at the problems of long latency and difficulty to expose the hidden behavior of network protocols, a scheme combining dynamic stain analysis and instruction clustering analysis is proposed. …”
    Get full text
    Article
  5. 2705

    ECOLOGICALLY ORIENTED MATHEMATICAL MODELS OF RISK MANAGEMENT AND SAFETY by I. Gvozdkova

    Published 2016-09-01
    “…Recommendations on the implementation and development of eco-friendly models in the interests of rational nature management, resource saving, human security and natural-anthropogenic complexes are formulated.…”
    Get full text
    Article
  6. 2706

    Digitalization of national economy by L. P. Goncharenko, S. A. Sybachin

    Published 2019-09-01
    “…The gradual transition to a digital model of development will increase the competitiveness of Russian products on international markets and it will also contribute to the improvement of national security. Analysis of the implementation of information and communication technologies in the national economy shows significant lag behind the leaders. …”
    Get full text
    Article
  7. 2707

    Measures against the financing of “lone wolves” and small terrorist cells in Europe by Svetoslav YORDANOV

    Published 2025-01-01
    “…The paper focuses on the emergence of new risks and threats to the European security system, such as the activity of “lone wolves” and small terrorist cells. …”
    Get full text
    Article
  8. 2708

    Sub-regional efforts to achieve gender equality in land ownership by Marcel Loyd MINKA

    Published 2025-01-01
    “…Results: The results obtained from my analysis are: the mechanisms for implementing women’s tenure security; the tools for codifying women’s land tenure; and the monitoring progress for strengthening women’s land rights in Africa. …”
    Get full text
    Article
  9. 2709

    Unleashing the power of internet of things and blockchain: A comprehensive analysis and future directions by Abderahman Rejeb, Karim Rejeb, Andrea Appolloni, Sandeep Jagtap, Mohammad Iranmanesh, Salem Alghamdi, Yaser Alhasawi, Yasanur Kayikci

    Published 2024-01-01
    “…Among the most recurrent themes are IoT and blockchain integration in supply chain management and blockchain in healthcare data management and security, indicating the significant potential of this convergence to transform supply chains and secure healthcare data. …”
    Get full text
    Article
  10. 2710

    Identification of maize kernel varieties based on interpretable ensemble algorithms by Chunguang Bi, Chunguang Bi, Xinhua Bi, Jinjing Liu, Hao Xie, Shuo Zhang, He Chen, Mohan Wang, Lei Shi, Lei Shi, Shaozhong Song

    Published 2025-02-01
    “…The findings have significant practical value in agricultural production, improving quality management efficiency and contributing to food security assurance.…”
    Get full text
    Article
  11. 2711

    Transformative adaptation: from climate-smart to climate-resilient agriculture by Jon Hellin, Eleanor Fisher, Marcus Taylor, Suhas Bhasme, Ana María Loboguerrero

    Published 2023-08-01
    “…Abstract In response to the climate crisis, there has been much focus on climate-smart agriculture (CSA); namely, technologies and practices that enhance adaptation, reduce greenhouse gas emissions, and contribute to food security; the so-called triple win. Success has tended to be measured in terms of the number of farmers adopting CSA with less focus given to the impacts especially on human development. …”
    Get full text
    Article
  12. 2712
  13. 2713
  14. 2714

    Violent behaviour during sports event or public gathering: Disscutable questions in doctrine and court practice by Marjanović Đorđe B.

    Published 2024-01-01
    “…In the third part of the paper, the author analyzes the position of the article of the Criminal Code in which violent behavior during sports events or other public gatherings is criminalized, and which obligates the courts to impose the security measure of prohibition from attending certain sports events on the perpetrators of this act at sports events. …”
    Get full text
    Article
  15. 2715

    USING ARTIFICIAL INTELLIGENCE (AI) AND DEEP LEARNING TECHNIQUES IN FINANCIAL RISK MANAGEMENT by Joseph Olorunfemi AKANDE

    Published 2024-12-01
    “…Moreover, federated learning systems present a promising solution for ensuring privacy and security when dealing with sensitive financial data. …”
    Get full text
    Article
  16. 2716

    A Framework for Privacy-Preserving in IoV Using Federated Learning With Differential Privacy by Muhammad Adnan, Madiha Haider Syed, Adeel Anjum, Semeen Rehman

    Published 2025-01-01
    “…Vehicles in the VANET are highly connected to each other and this thing can cause security, safety, and privacy risks for the asset itself and driver also. …”
    Get full text
    Article
  17. 2717
  18. 2718

    Accelerating Deep Learning-Based Morphological Biometric Recognition with Field-Programmable Gate Arrays by Nourhan Zayed, Nahed Tawfik, Mervat M. A. Mahmoud, Ahmed Fawzy, Young-Im Cho, Mohamed S. Abdallah

    Published 2025-01-01
    “…This dependency on internet connectivity increases bandwidth consumption and fails to meet the required security criteria, contrary to ZYBO-Z7 board hardware programming. …”
    Get full text
    Article
  19. 2719

    USING ARTIFICIAL INTELLIGENCE (AI) AND DEEP LEARNING TECHNIQUES IN FINANCIAL RISK MANAGEMENT by Joseph Olorunfemi AKANDE

    Published 2023-12-01
    “…Moreover, federated learning systems present a promising solution for ensuring privacy and security when dealing with sensitive financial data. …”
    Get full text
    Article
  20. 2720

    Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks by Yongli Tang, Menghao Guo, Binyong Li, Kaixin Geng, Jinxia Yu, Baodong Qin

    Published 2024-12-01
    “…Finally, it is shown that the scheme is secure by analyzing encryption/decryption private keys, ciphertext quantum state sequences during transmission, plaintext quantum state sequence, and the result after computations on the plaintext quantum state sequence.…”
    Get full text
    Article