Showing 3,001 - 3,020 results of 5,943 for search '"security"', query time: 0.10s Refine Results
  1. 3001

    Implementasi Algoritme Morus V2 untuk Pengamanan Data Pada Perangkat Bluetooth Low Energy by Diah Ratih Destyorini, Ari Kusyanti, Reza Andria Siregar

    Published 2022-12-01
    “…Data transmission will be insecure without a data security process. Cryptography is one of the options for securing data.  …”
    Get full text
    Article
  2. 3002
  3. 3003

    Characteristics of Land Use Change and Evaluation of Ecological Sensitivity in Chongqing by XIE Xianjian, GOU Qiantao, WU Han

    Published 2024-12-01
    “…[Objective] Chongqing, as the economic center of the upper reaches of the Yangtze River in China and a barrier to ensure ecological security in the middle and lower reaches of the Yangtze River, is a typical ecological functional and fragile area in China. …”
    Get full text
    Article
  4. 3004

    Blockchain dan Kecerdasan Buatan dalam Pertanian : Studi Literatur by Fajar Delli Wihartiko, Sri Nurdiati, Agus Buono, Edi Santosa

    Published 2021-02-01
    “…Besides, this combination can also increase security on the blockchain system through the application of artificial intelligence. …”
    Get full text
    Article
  5. 3005

    Cross-Platform Ecological Momentary Assessment App (JTrack-EMA+): Development and Usability Study by Mehran Sahandi Far, Jona M Fischer, Svea Senge, Robin Rathmakers, Thomas Meissner, Dominik Schneble, Mamaka Narava, Simon B Eickhoff, Juergen Dukart

    Published 2025-01-01
    “…It strongly commits to security and privacy and complies with the General Data Protection Regulations to safeguard user data and ensure confidentiality. …”
    Get full text
    Article
  6. 3006

    Strategic alternatives for increasing the enterprise's financial potential by Мyroslava Zabediuk, Іlona Yatsuk

    Published 2023-03-01
    “…The basic financial strategies in the aspect of increasing the enterprise's financial potential are considered: the strategy of forming financial resources, the structural financial strategy and the strategy of ensuring financial security. The formation and implementation of the enterprise's basic financial strategies must be consistent with the situation and development trends of the market in which the enterprise operates. …”
    Get full text
    Article
  7. 3007

    Providing a General Model for the Successful Implementation of Digital Transformation in Organizations by Haidar Ahmadi, Najme Parsaei, Seyyed Hamed Hashemi, Hamidreza Nematollahi

    Published 2024-06-01
    “…These results highlighted that leadership and vision, change management, collaboration and partnership, user-centered design, and privacy and data security are the principal factors in the implementation of digital transformation. …”
    Get full text
    Article
  8. 3008

    The role of 5G network in revolutionizing agriculture for sustainable development: A comprehensive review by Wasif ur Rehman, Mohsin Ali Koondhar, Samandar Khan Afridi, Lutfi Albasha, Idris H. Smaili, Ezzeddine Touti, Mouloud Aoudia, Wassim Zahrouni, Ibrahim Mahariq, M.M.R. Ahmed

    Published 2025-03-01
    “…Additionally, the paper explores development optimization of various nodes, fault detection, self-healing mechanisms, AI application optimization, and security issues specific to 5G-enabled smart agriculture. …”
    Get full text
    Article
  9. 3009

    Factors Influencing Telemedicine Adoption Among Health Care Professionals: Qualitative Interview Study by Fiona Schürmann, Daniel Westmattelmann, Gerhard Schewe

    Published 2025-01-01
    “…Practically, the findings guide stakeholders: policy makers should prioritize transparent regulations and data security, health care organizations should provide training and support for HCPs, and technology developers must design telemedicine solutions aligning with trust and usability needs. …”
    Get full text
    Article
  10. 3010

    The Impact of Artificial Intelligence on Healthcare: A Comprehensive Review of Advancements in Diagnostics, Treatment, and Operational Efficiency by Md. Faiyazuddin, Syed Jalal Q. Rahman, Gaurav Anand, Reyaz Kausar Siddiqui, Rachana Mehta, Mahalaqua Nazli Khatib, Shilpa Gaidhane, Quazi Syed Zahiruddin, Arif Hussain, Ranjit Sah

    Published 2025-01-01
    “…However, there are major obstacles to the mainstream implementation of AI in healthcare, including issues with data security and budget constraints. Conclusion Healthcare may be transformed by AI, but its successful use requires ethical and responsible use. …”
    Get full text
    Article
  11. 3011

    A critical evaluation of religious syncretism among the Igbo Christians of Nigeria by E.C. Anizoba

    Published 2021-12-01
    “…Besides the belief in ritualistic charms, many Igbo/Igbo-speaking Christians consult diviners for various reasons, including security and prosperity, causes of illness and death, ways of preserving life, as well as to discern the mind of God about one’s future and destiny. …”
    Get full text
    Article
  12. 3012

    Relieve Adversarial Attacks Based on Multimodal Training by Lai Hongjie

    Published 2025-01-01
    “…However, the emergence of adversarial attacks has exposed shortages of neural networks, forcing people to confront their limitations and further increasing concerns about the security of deep learning models. Adversarial training is an effective defense mechanism that incorporates adversarial samples into the training data, enabling models to better detect and resist attacks. …”
    Get full text
    Article
  13. 3013

    Political Elites as an Object of Coercive Influence in Contemporary World Politics by A. I. Podberezkin, M. V. Kharkevich

    Published 2015-10-01
    “…The assumption then is that the main object of the security and the securitization in world politics is to be political elite. …”
    Get full text
    Article
  14. 3014

    Behaviour change communication influences on food consumption behaviours and the demand for diverse nutritious foods in the Makoni District, Zimbabwe. by Delilah Takawira, Mthokozisi Kwazi Zuma, Xikombiso Gertrude Mbhenyane

    Published 2024-01-01
    “…Participants indicated that the Livelihoods and Food Security Programme intervention successfully increased their nutrition knowledge, enhanced their ability to diversify crop production, and improved their access to varied foods, including some new crops. …”
    Get full text
    Article
  15. 3015

    Reserves and extraction of rare earth metals and elements as a key factor in the renewable energy sector development at the the world economy transformation current stage by R. D. Mingaleeva

    Published 2023-06-01
    “…The use of renewable energy sources, which are experiencing a period of rapid development, is one of the stages of the current energy transition, as the world community tries to ensure a future with zero CO2 emissions and to achieve energy independence and security. At the same time, for output of the wide range of products for the renewable energy sector, as well as for the development of energy depot systems, it is necessary to use rare earth elements and metals in production. …”
    Get full text
    Article
  16. 3016

    A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis by Hyun-Ju Jo, Ji Won Yoon

    Published 2015-06-01
    “…Both methods look different; however, they have similar security goals and they both feature distribution transforming encoders based on statistical schemes. …”
    Get full text
    Article
  17. 3017

    Transformer Inrush Current and Internal Fault Discrimination Using Multitypes of Convolutional Neural Network Techniques by Abedalgany Abedallah Athamneh, Ali Mohammad Alqudah

    Published 2024-01-01
    “…To maintain the security of transformer differential protection, it is essential to restrain its response to oversetting differential current caused by the inrush current or other switching conditions. …”
    Get full text
    Article
  18. 3018

    Pomodori e pesticidi. (In)giustizia alimentare, sanitaria e ambientale nelle Regioni ultraperiferiche: il caso di Mayotte by Paola Schierano

    Published 2024-06-01
    “…Through this paper we intend to offer a contribution to the debate on food and environmental security and sustainability in the European Outermost regions, so as to illustrate the not-so-apparent linkages between departmentalisation, socio-economic inequalities and food and environmental insecurity. …”
    Get full text
    Article
  19. 3019
  20. 3020

    A Particle Swarm Optimization Algorithm for Deployment of Sensor Nodes in WSN Network by Jie Liang, Lu Wang, Qingchang Ji

    Published 2022-01-01
    “…In order to solve the problems of security hidden dangers in the process of node location due to the characteristics of limited resources, open deployment, and being unattended in wireless sensor networks, this paper proposes a mainstream location algorithm combined with the current WSN node. …”
    Get full text
    Article