Showing 3,281 - 3,300 results of 5,943 for search '"security"', query time: 0.05s Refine Results
  1. 3281

    Quantum Particle Swarm Optimization Extraction Algorithm Based on Quantum Chaos Encryption by Chao Li, Mengna Shi, Yanqi Zhou, Erfu Wang

    Published 2021-01-01
    “…The bit error rate and similarity coefficient of the voice signal are extracted by testing the source voice signal SA1, SA2, and SI943 under different SNR, and the similarity coefficient, uncertainty, and disorder of the observed signal and the source voice signal SA1, SA2, and SI943 verify the effectiveness of the proposed speech signal extraction method and the security of quantum chaos used in speech signal encryption.…”
    Get full text
    Article
  2. 3282
  3. 3283

    Russia’s inventive activity in new technological trends by V. V. Narbut

    Published 2024-06-01
    “…Consideration of the relationship among the indicators can be used to make decisions in the field of intellectual property, which can contribute to the intellectual security of Russia and serve as a basis for technological independence.…”
    Get full text
    Article
  4. 3284

    Gazetecilik Yıllarında Bülent Ecevit ve Anti-Komünizm (1950-1961) by Ferit Salim SANLI

    Published 2021-12-01
    “…Ecevit, who sees communism as a means for the Soviets' ambitions in Turkey and the world, and thinks that this will create a security threat, argued that the Soviets have ambitions on Turkey and that they use communism as an instrumental in this way. …”
    Get full text
    Article
  5. 3285

    A Survey of Farmers’ Perceptions on Maize and Sorghum Storage Duration and Level of Pest Infestations in the Case of Two Selected Districts of Jimma Zone, Ethiopia by Nezif Abamecha

    Published 2021-01-01
    “…While in Ethiopia, like in other east African countries, Maize and sorghum were an important postharvest chain for food security and income sources for small-scale rural farmers. …”
    Get full text
    Article
  6. 3286

    The Conflict in Mali: Causes, Actors, and Challenges by Wardah Shahid

    Published 2025-01-01
    “…This essay examines the interconnected roles of local, regional, and international stakeholders in perpetuating the conflict, highlighting the need for a multifaceted approach to address root causes, rebuild governance, and foster sustainable peace through coordinated humanitarian, security, and developmental efforts. …”
    Get full text
    Article
  7. 3287

    Design and Performance of Solar PV Integrated Domestic Vapor Absorption Refrigeration System by Divya Arputham Selvaraj, Kirubakaran Victor

    Published 2021-01-01
    “…This technology might sound like a luxury on the surface, but they are in high demand to achieve food security. They can also help lifesaving vaccines to reach even the isolated parts of the world. …”
    Get full text
    Article
  8. 3288

    Fast Antinoise RFID-Aided Medical Care System by Ming-Hour Yang, Jia-Ning Luo

    Published 2015-10-01
    “…We prove that our generated proof is reliable because it can resist most security threats and guarantee the integrity of the proof. …”
    Get full text
    Article
  9. 3289

    Business ecosystem sustainability management by Yu. N. Kafiyatullina, E. E. Panfilova

    Published 2022-06-01
    “…The development of research in the field of sustainable development of business ecosystems is related to the consideration of information security issues for agents of the digital economy.…”
    Get full text
    Article
  10. 3290

    East and West: global technological confrontation by S. S. Belikova, A. V. Belikov

    Published 2023-10-01
    “…As China’s economy grows and its technological capabilities expand, the USA is increasingly concerned about the consequences of China’s rapid technological growth for national security, economic competitiveness and for global dominance of the USA. …”
    Get full text
    Article
  11. 3291

    İngiliz Konsolos James Henry Monahan’ın Raporlarında Bitlis Vilayeti (1896-1898) by Emel DEMİR GÖRÜR

    Published 2020-06-01
    “…In our study, the famine in Bitlis province of 1896-1898 and the subsequent migration events, the tax issue, various debt systems applied within the province, the livelihoods of the people, security problems, the issue of Kurdish guards (bekdji) and the socio-economic structure of the province were examined in detail.…”
    Get full text
    Article
  12. 3292

    Analysis of renewable energy potential in the Asia-Europe geographical axis by Alexandru Marius Tătar

    Published 2023-12-01
    “…It also investigated the opportunities associated with renewable energy sources, such as energy security. …”
    Get full text
    Article
  13. 3293

    The Main Directions of Construction of Red Army in Days of the Great Patriotic War by N. M. Vasilyev

    Published 2015-02-01
    “…The current situation in the world draws public attention to the problems of building the armed forces and keeping their readiness to provide defense and security of the country. Rigid centralization of military construction in such collective bodies as the State Defense Committee, the General Headquarters of the Supreme Commander, determination and meticulous work of folk commissioners and the General Staff to identify areas of building and resource mobilization for the implementation of decisions taken can serve as a guide for solving similar problems in our days. …”
    Get full text
    Article
  14. 3294

    Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application by Nuri Wulandari, Mohammad Syauqi Adnan, Chastio Bayu Wicaksono

    Published 2022-01-01
    “…A rise in working and studying from home, activities which depend on the Internet, and the exchange of data coupled with a lack of understanding about security for interacting in cyberspace have made cybersecurity one of the most pressing concerns today. …”
    Get full text
    Article
  15. 3295

    Understanding the Internet of Nano Things: overview, trends, and challenges by Mainor Alberto Cruz Alvarado, Patricia Alejandra Bazán

    Published 2018-11-01
    “…It is concluded that technologies prevail current IoNT literature, applications are focused on health care, and there is no international standardization regarding privacy, security or architecture of nano-networks. …”
    Get full text
    Article
  16. 3296

    Spillover: From climate change to pandemics by Mary E. Wilson

    Published 2025-01-01
    “…Animals and plants are themselves susceptible to die-offs and even extinction from infections, jeopardizing food security and health.Another unknown is whether the vast permafrost, now melting, could become a source of novel microbes that are pathogenic for humans.Travel, trade, and migration contribute to the global movement of human and animal pathogens and vectors. …”
    Get full text
    Article
  17. 3297

    O PROERD funciona? Notas a partir de estudo quase-experimental by Marcos Rolim, Daiana Hermann, Camila Louis Oliveira

    Published 2020-01-01
    “…Empirical studies measuring results in the area of public security are still rare in Brazil, a circumstance that adds value to this work. …”
    Get full text
    Article
  18. 3298

    Protective Immunity against SARS Subunit Vaccine Candidates Based on Spike Protein: Lessons for Coronavirus Vaccine Development by Atin Khalaj-Hedayati

    Published 2020-01-01
    “…The recent outbreak of the novel coronavirus disease, COVID-19, has highlighted the threat that highly pathogenic coronaviruses have on global health security and the imminent need to design an effective vaccine for prevention purposes. …”
    Get full text
    Article
  19. 3299

    Comparative analysis of state support for agricultural producers in Russia and in the world by A. V. Loseva, A. V. Fedosinа, E. V. Dupliy

    Published 2023-07-01
    “…In the conditions of the WTO member countries open markets, the world countries food security, including Russia, largely depends not only on the competitiveness of their own agriculture, but also on the support of their own agricultural sector commensurate with other states. …”
    Get full text
    Article
  20. 3300

    Research on Spam Filters Based on NB Algorithm by Su Shengyue

    Published 2025-01-01
    “…Spam filtering is a crucial part of network security. As spam becomes more complex, traditional rule-based methods struggle to meet the needs of modern email systems. …”
    Get full text
    Article