Showing 3,301 - 3,320 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 3301

    School Leadership and the Civic Nationalist Turn: towards a typology of leadership styles employed by Head Teachers in their enactment of the Prevent Duty and the promotion of fund... by Hazel Bryan, Lynn Revell

    Published 2021-06-01
    “…Drawing on literature from school leadership, this research engages with head teachers in schools in England to explore the leadership styles they employ when enacting the requirements of the Counter-Terrorism and Security Act 2015 (Home Office, 2015) and the Teachers’ Standards (DfE, 2012) and navigating the civic nationalist turn. …”
    Get full text
    Article
  2. 3302
  3. 3303
  4. 3304

    A Comprehensive Investigation of Fraud Detection Behavior in Federated Learning by Sun Rui

    Published 2025-01-01
    “…By addressing these challenges, FL can offer scalable, secure solutions for real-time fraud detection, ensuring the protection of sensitive financial data while enhancing detection accuracy across diverse data sources.…”
    Get full text
    Article
  5. 3305

    THE IMPACT OF DEMOGRAPHIC CHANGES ON THE PENSION SYSTEM FINANCING SUSTAINABILITY IN THE FEDERATION OF BOSNIA AND HERZEGOVINA by Slavo Vukić, Danijel Knežević

    Published 2014-05-01
    “…According to long-term projections of the reformed pension system of the FBiH, the greater stability of initial and average pensions, as well as stable social security of pensioners, will result in a relatively stable share of pension expenditures in GDP, of about 10%. …”
    Get full text
    Article
  6. 3306

    Encoding and Decoding of Secret Messages Using Matrices. by Niwagaba, James

    Published 2023
    “…Due to the great need of security for passing sensitive information from one person to another or from one organization to another through electronic technology, there is need for cryptography as a solution to this problem. …”
    Get full text
    Thesis
  7. 3307

    Financial Inclusion and Women Empowerment in Uganda A Case of Lango Sub Region, Northern Uganda by Eton, Marus, Fabian, Mwosi, Benard, Patrick Ogwel, Charles Edaku, Dennis, Obote

    Published 2018
    “…The study therefore recommended that Government should establish buffers to serve as collateral security for women who intend to secure financial credit. …”
    Get full text
    Article
  8. 3308

    Climate Smart Agriculture (CSA) for Sustainable Agriculture Nexus: A Tool for Transforming Food Systems by Turyasingura, Benson, Ayiga, Natal, Tumwesigye, Wycliffe, James, Philip Hegarty

    Published 2023
    “…CSA and SA share a common principal goal of achieving food security. It was concluded that developing countries are the worst affected by the negative impacts of climate change and don’t have the adaptive capacity to respond to climate change effects.…”
    Get full text
  9. 3309

    Diversity at Landscape Level to Increase Resilience. A Review by Turyasingura, Benson, Mwanjalolo, Majaliwa, Ayiga, Natal

    Published 2023
    “…Hence, building on these insights, diversity at landscape level is paramount to promoting resilient livelihoods as a means of improving the health and functioning of socio-ecological systems, as well as a mechanism for achieving food security. The study concludes that there should be involving many actors in a landscape management aspect to stimulate knowledge exchange and training.…”
    Get full text
  10. 3310

    Investigation of Storage and Retrieval of Records At Kisoro District Local Government. by Arinda, Rodgers

    Published 2024
    “…This inadequacy contributes to numerous challenges, including poor professionalism, untimely retrieval of requested records, and insufficient data security. The study recommended allocating more funds to the records section for overall maintenance. …”
    Get full text
    Thesis
  11. 3311

    Design and Simulation of an Optimized Reliable Microgrid System for Kabale University Using Solar and Battery Storage. by Aturinde, Alban

    Published 2024
    “…The project highlights the potential of microgrids to enhance energy security, reduce costs, and promote environmental sustainability in educational institutions and similar settings facing energy challenges.…”
    Get full text
    Thesis
  12. 3312
  13. 3313

    Analyzing Iran's Legislative Criminal Policy in Dealing with Environmental Terrorism, Emphasizing the Need for Criminalization and Preventive Measures by behrouz sepehri, Nourooz Kargari, mohammad ashouri, ghassem ghassemi

    Published 2024-10-01
    “…Introduction: environmental security, is a necessary condition for the health and continuity of human life on earth and due to the vital, widespread and inevitable dependence of humans on the environment, if the environmental security is taken away and it is removed from the possibility of healthy living, as a result of the goal or the means of placing the environment, following environmental terrorism, with various methods such as polluting the natural and man-made environment with dangerous substances, extensive and irreparable damage is caused to human life and health And often, the most obvious effects of damage to the safety and health of the environment appear in the form of epidemics, and on the other hand, the cross-border effects of such actions and the possibility of transferring the said effects from through the flow of air or water or the carriers of disease agents to countries and regions beyond the place of the accident, and the possibility of spreading some of these effects on the life and health of future generations, reveals the seriousness of the danger of environmental terrorism, hence, The purpose of this thesis is to explain the vital necessity of legal, technical and specialized contrast, against environmental terrorism in the form of an efficient criminal policy with international interaction, with emphasizing the extent and irreparability of the effects caused by environmental terrorism, and the necessity and importance of preventive measures.Materials and Methods:  In terms of the goal, the current research will cause expansion the legal theories and doctrine and complete the previous theories with the fundamental method of the research results, and also with the practical approach, effective practical solutions to deal with environmental terrorism will be presented, and on the other hand, the materials and information used in the research, They are collected with the library method and after collecting and categorizing the materials and information, with the descriptive-analytical method, the findings and the collected materials are analyzed logically and legally and they are used as the basis of citation to strengthen the approach of the researcher in the relevant subject.Results: In a comprehensive and efficient criminal policy to contrast against environmental terrorism, in addition to criminalizing this criminal phenomenon along with the real conceptology and in addition to recognizing its specific elements, it is expected that with the necessary criminal measures, specialized measures will be taken to identify and criminalize behaviors that it has a preliminary aspect to dangerous crimes, and it is possible that environmental terrorism is also committed through them, and therefore, in order to prevent this criminal phenomenon, criminalize such behaviors in the form of obstruction crimes seems necessary.Discussion: In Iran's criminal system, environmental terrorism has not been considered as an independent criminal behavior, with specific elements and specific conditions, However, due to the inherent of the behaviors related to environmental terrorism, this type of terrorism is inherently reprehensible, and as a rule, it can be included in various legal elements in the criminal laws, and on the other hand, due to the analogy of some elements of this criminal phenomenon with the destruction of the earth, According to jurisprudence, significant examples of environmental terrorism behaviors can be considered as examples of corruption in the land subject to Article 286 of the Islamic Penal Code (approved in 2012). …”
    Get full text
    Article
  14. 3314
  15. 3315

    Desain Layanan E-Surat untuk Desa Waru Barat, Pamekasan, Madura menggunakan QR-Code by Wahyudi Agustiono, Intan Rofika Putri, Devie Rosa Anamisa

    Published 2021-11-01
    “…The functionality testing showed the application successfully generated e-certificate along with the unique QR Code to secure and maintain the validity of the document. …”
    Get full text
    Article
  16. 3316

    Les nouveaux modes de gestion de la proximité euromaghrébine by Jean-Robert Henry

    Published 2013-10-01
    “…As regards multilateral relationships, the failure of Europe-Mediterranean partnership fosters “5+5” dialogue, through which West-Mediterranean rimming countries try to strengthen bilateral and transnational relationships and to extend sub-regional cooperation imbued with security concerns. So doing, the “5+5” system indirectly helps restart the Union of Arab Maghreb. …”
    Get full text
    Article
  17. 3317

    Human-Vehicle Intersection Traffic Lights Timing Optimization Research by Wen Li, Hongying Zhang, Zhaoguo Huang, Chenhui Li

    Published 2022-01-01
    “…The VISSIM software was used for traffic simulation, aimed at improving traffic volume and right-turning vehicle average speed for less vehicle queuing delays, less human-vehicle conflicts, and better security for pedestrians without excessive interruption on their street crossing efficiency. …”
    Get full text
    Article
  18. 3318

    ENVIRONMENT AND CONFLICTS IN NIGERIA: CAUSES AND TRENDS OF FARMERS – HERDERS CONFLICTS by UMAR ZUBAIRU, TERNA PAISE AGBA AGBA

    Published 2023-12-01
    “… The nomadic pastoralists and sedentary farmers’ conflict is one of the reoccurring security challenges Nigeria.  The constant insecurity and overbearing uncertainty which had come to characterise Nigeria’s existence compelled scholars to focus their attention on formulating an all- encompassing explanation of the phenomenon. …”
    Get full text
    Article
  19. 3319

    An Efficient and Lightweight Source Privacy Protecting Scheme for Sensor Networks Using Group Knowledge by Zhiqiang Ruan, Wei Liang, Decai Sun, Haibo Luo, Fanyong Cheng

    Published 2013-04-01
    “…Providing source privacy is a critical security service for sensor networks. However, privacy preserving in sensor networks is a challenging task, particularly due to the limited resources of sensor nodes and the threat of node capture attack. …”
    Get full text
    Article
  20. 3320

    Islandora and TEI: Current and Emerging Applications/Approaches by Kirsta Stapelfeldt, Donald Moses

    Published 2013-06-01
    “…The Islandora framework is designed to ease the management of security and workflow for digital assets, and to help implementers create custom interfaces for display, search, and discovery. …”
    Get full text
    Article