Showing 3,081 - 3,100 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 3081
  2. 3082

    UAV swarms: research, challenges, and future directions by Yunes Alqudsi, Murat Makaraci

    Published 2025-01-01
    “…Key areas such as coordinated path planning, task assignment, formation control, and security considerations are examined, highlighting how Artificial Intelligence (AI) and Machine Learning (ML) are integrated to improve decision-making and adaptability. …”
    Get full text
    Article
  3. 3083

    Construction of Internet of things trusted group based on multidimensional attribute trust model by Jinghan Chen, Bei Gong, Yubo Wang, Yu Zhang

    Published 2021-01-01
    “…Accurate prediction of the trust relationship is the basis for trusted access and secure interaction between Internet of things nodes. …”
    Get full text
    Article
  4. 3084

    Abnormal Event Detection via Multikernel Learning for Distributed Camera Networks by Tian Wang, Jie Chen, Paul Honeine, Hichem Snoussi

    Published 2015-09-01
    “…Distributed camera networks play an important role in public security surveillance. Analyzing video sequences from cameras set at different angles will provide enhanced performance for detecting abnormal events. …”
    Get full text
    Article
  5. 3085

    An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity by Yousheng Zhou, Junfeng Zhou, Feng Wang, Feng Guo

    Published 2016-01-01
    “…Once the partnered two users are authenticated by the trusted server, they can easily proceed with the agreement of the session key. Formal security analysis demonstrates that the proposed scheme is secure under the random oracle model.…”
    Get full text
    Article
  6. 3086
  7. 3087

    Enhancing drought tolerance in horticultural plants through plant hormones: a strategic coping mechanism by Shanxia Huang, Songheng Jin

    Published 2025-01-01
    “…The development of effective strategies to mitigate drought stress is essential for sustainable agriculture and food security, especially considering the continuous growth of the world population. …”
    Get full text
    Article
  8. 3088

    A Comprehensive Review: Interaction of Appearance and Behavior, Artificial Skin, and Humanoid Robot by Nguyen Minh Trieu, Nguyen Truong Thinh

    Published 2023-01-01
    “…Recent research on humanoid robots is designed to appear to be copies of the anthropometric indicators of real people, which may affect the security of other people’s identities. Besides, these robots cause a feeling of horror in the user if their appearance is in the position of the uncanny valley. …”
    Get full text
    Article
  9. 3089

    Organizing Coastal Land Use for Urban Tourism Development (Case Study: Sorkhrood) by mehdi razjouyan, sadralddin motavali, gholamreza janbaz ghobadi

    Published 2020-06-01
    “…The results of this research show that from the perspective of half of the officials and government experts, the expansion of tourism industry, on one hand, causes the region's economic prosperity and, on the other hand, reduces regional security and causes pollution of the environment.…”
    Get full text
    Article
  10. 3090

    Talk About Crime Among Young People in Northern Mexico: The Impact of Drug Trafficking in the Neighborhood by Ariagor Manuel Almanza Avendaño, Martha Romero-Mendoza, Anel Hortensia Gómez San Luis

    Published 2025-01-01
    “…The main changes pointed out by the young people were the intensification of insecurity, the expansion of drug dealing in the community, mental health problems (especially addictions), the restriction of mobility on the streets, and changes in the relationship with security institutions. They also refer to changes such as the normalization of drug trafficking and the decline of the neighborhood’s image.…”
    Get full text
    Article
  11. 3091

    « You don’t suspect me of doing anything wrong, do you ? » Peurs, soupçons et paranoïa dans The Woman in White de Wilkie Collins by Laurence Taleirach-Vielmas

    Published 2008-12-01
    “…From mere domestic secrets to anxieties related to national security, Collins describes a modern world ruled by suspicions, and constructs his characters as paranoid patients.…”
    Get full text
    Article
  12. 3092

    The effect of using Naive Bayes to detect spam email by Sun Zehui

    Published 2025-01-01
    “…This high level of accuracy underscores the effectiveness of the Bayesian approach in identifying and filtering out spam, thereby enhancing the overall efficiency and security of email communication.…”
    Get full text
    Article
  13. 3093

    Motivators for using on-demand vehicle sharing services in Brazil by Fábio Violin

    Published 2021-01-01
    “…The five major regions of Brazil were considered in this research, totaling 2150 interviews, indicating the existence of fourteen motivators for use involving the economic, social, environmental, and technological dimensions, however, only six variables comprise the structuring nucleus of demand and are based on an element of economic order (Reduced Tariff), one of a socioeconomic nature (Expectation of Benefits) and four technological drivers (Technological Availability, Convenience of Time and Boarding in addition to Data Security), which figure as utilitarian indicators, corroborating the results of international studies and contrasting those that signal hedonistic elements as relevant. …”
    Get full text
    Article
  14. 3094

    Problems of investing in enterprises for processing and disposal of solid municipal waste by E. I. Shamanina, I. S. Arshinskaia

    Published 2022-03-01
    “…The issues of investing in enterprises engaged in the utilisation and processing of municipal solid waste are currently relevant due to increasing consumption, correspondingly increasing production and the amount of waste and require the most careful approach from the point of view of environmental security. The object of the research are the factors that determine the potential benefits of investing in enterprises of this industry. …”
    Get full text
    Article
  15. 3095

    Algorithm Domination As A New Surveillance System by Ahmet Ayhan Koyuncu, Muhittin Evren

    Published 2024-12-01
    “…Algorithms constitute a domination form because they threaten people's freedoms and security. Algorithm domination is seen as a form of control and discipline in today's world. …”
    Get full text
    Article
  16. 3096
  17. 3097

    A New Approach to Assessing the Accuracy of Forecasting of Emergencies with Environmental Consequences Based on the Theory of Fuzzy Logic by Eduard Tshovrebov, Vladimir Moshkov, Irina Oltyan and Filyuz Niyazgulov

    Published 2024-12-01
    “…Prevention of the occurrence and development of emergencies of a natural and man-made nature is one of the basic fundamental foundations of ensuring the national security of any state. The most important mechanism for preventing emergencies is an effective system of monitoring and forecasting emergencies established at the state level. …”
    Get full text
    Article
  18. 3098

    Study and Analysis of Barriers for Implementation of Industry 4.0 Technologies Using Spherical Fuzzy TOPSIS Method by Akshay Kumar, Chimata Murli Krishna

    Published 2025-01-01
    “…Drivers such as government initiatives, establishment of fast internet connectivity, job security, etc., are recommended in this research work for minimizing the effect of barriers.…”
    Get full text
    Article
  19. 3099

    Current and Emerging Protocols for Carbon Measurement in Agricultural Soils by Suraj Melkani, Noel Manirakiza, Shirley M. Baker, Jehangir H. Bhadha

    Published 2023-10-01
    “…These massive C sinks have the potential to reverse soil degradation, mitigate climate change, and enhance food security. It is therefore essential to monitor the C cycle by accurately measuring the amount of soil C in agricultural fields. …”
    Get full text
    Article
  20. 3100

    Service Provider Selection For Project Logistics Operations With Fuzzy Analytic Hierarchy Process by Gökay Çiçekli, Yunus Kaymaz

    Published 2023-01-01
    “…The results are that for project logistics management, logistics service providers need to improve vehicle availability, cargo security, on-time delivery, etc. to become more competitive.…”
    Get full text
    Article