Showing 3,321 - 3,340 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 3321

    The Military Policy of the Rousseff Government: Reflections on the Conduct of the Armed Forces in the UPP and the MINUSTAH by Suzeley Kalil Mathias, Bruce Scheidl Campos, Leandro Fernandes Sampaio Santos

    Published 2016-05-01
    “…The UPPs are a key attribute of public security of the government carioca in Brazil and by extension the Brazilian state. …”
    Get full text
    Article
  2. 3322

    Prison efforts to protect escaped prisoners (study at prison class II B Kuantan Singingi, Riau Province) by Kasmanto Rinaldi

    Published 2024-06-01
    “…In addition, in terms of facilities and building conditions, building and security improvements are also carried out to minimize residents from escaping or running away from prisons such as the addition of barbed wire so that fences are not easy to climb. …”
    Get full text
    Article
  3. 3323

    Indonesian Defense Diplomacy in Responding to China’s National Interest in South China Sea by Surryanto Djoko Waluyo

    Published 2023-03-01
    “…This study discovered that China’s national interests in the South China Sea center on securing its economic interests and military modernization. …”
    Get full text
    Article
  4. 3324

    The Performance of LBP and NSVC Combination Applied to Face Classification by Mohammed Ngadi, Aouatif Amine, Bouchra Nassih, Hanaa Hachimi, Adnane El-Attar

    Published 2016-01-01
    “…The growing demand in the field of security led to the development of interesting approaches in face classification. …”
    Get full text
    Article
  5. 3325
  6. 3326

    Federated Learning Applications in Fingerprint and Finger Vein Recognition by Wang Yongchao

    Published 2025-01-01
    “…Fingerprints and finger veins are widely used in security identification in many fields due to their uniqueness and identifiability. …”
    Get full text
    Article
  7. 3327

    Social policy of the Scandinavian countries in relation to women victims of domestic violence by R. M. Sadykov, N. L. Bolshakova

    Published 2023-11-01
    “…It was also revealed that the support programs are mainly aimed at protecting and establishing the security boundary, restoring the self-esteem of victims of domestic violence.…”
    Get full text
    Article
  8. 3328

    Active Ageing Level of Older Persons: Regional Comparison in Thailand by Md. Nuruzzaman Haque

    Published 2016-01-01
    “…Implementation of an Integrated Active Ageing Package (IAAP), containing policies for older persons to improve their health and economic security, to promote participation in social groups and longer working lives, and to arrange learning programs, would be helpful for increasing older persons’ active ageing level in Thailand.…”
    Get full text
    Article
  9. 3329

    FractalNet-based key generation for authentication in Voice over IP using Blockchain by Vajjala Sreenivasulu, Chinthaginjala Ravikumar

    Published 2025-03-01
    “…However, VoIP systems face critical security challenges, including threats to integrity, authenticity, and confidentiality. …”
    Get full text
    Article
  10. 3330

    Emotional distress of adolescents from dysfunctional families as a subject of scientific research by N. M. Nikitaev, N. A. Tsvetkova

    Published 2024-11-01
    “…The social significance of the topic is noted: the emotional distress of adolescent children not only makes unhappy themselves, but also reduces the level of social health of the family and the whole society, affecting social security. The purpose of the research is a theoretical analysis of sources of scientific information which, presumably, can form a methodological basis for studying family predictors of the adolescent emotional distress. …”
    Get full text
    Article
  11. 3331

    «Save the Man». In way of documentary and exhibition project by Yu. Z. Kantor

    Published 2020-02-01
    “…The article, thanks to documents from the Pantyukhov family archive, the archives of the Federal Security Service of Russia in the Omsk Region and the Ministry of Internal Affairs of Russia in the Magadan Region, the Historical Archive of the Omsk Region and the archive of the Omsk State Medical University, for the first time put into scientific circulation, makes it possible to find out the details of the biography of Pantyukhov, who devoted himself to serving the most humane from professions…”
    Get full text
    Article
  12. 3332

    A Double-Layer Optimization Method for Cascading Failure Prevention Considering Transient Stability by Huiqiong Deng, Zhiwei Liang, Hui Wu, Junfu Shen

    Published 2024-01-01
    “…In terms of algorithms, the paper uses the Extended Particle Swarm Optimization (EPSO) algorithm with higher precision and accuracy to solve the inner model and innovatively introduced the Practical Dynamic Security Region (PDSR), which uses PSASP software for offline calculation and online application, as a dynamic analysis method to quickly realize transient stability constraint to solve the outer model. …”
    Get full text
    Article
  13. 3333

    The Impact of Suicide Attacks on Voting Behavior: The Case of November 2015 Early Elections by Ceren Yegen

    Published 2018-10-01
    “…Terror aims to disrupt peace and security of countries. Suicide attacks, a form of terrorism is carried out in many parts of the world today. …”
    Get full text
    Article
  14. 3334
  15. 3335

    Evaluation of Barriers to Digital Transformation in Maritime Logistics Based on A Spherical Fuzzy Multi-Criteria Decision-Making Framework by Veysel Tatar

    Published 2025-02-01
    “…When the results obtained from the study were examined, ‘Technology’ is the most important barrier category (B1) (0.341) for the adoption of digital transformation in maritime logistics, followed by the main barrier categories related to “Security” (B4) (0.266), “Environment” (B3) (0.223) and “Organisation” (B2) (0.171) respectively. …”
    Get full text
    Article
  16. 3336

    Addressing Depletion in Alluvial Aquifers by Partik Kumar, Veena Srinivasan

    Published 2025-01-01
    “…The vast alluvial aquifers of the Indo-Gangetic Plain are vital for the country’s food security and livelihoods of millions. However, abstraction far exceeds natural recharge, resulting in a gradual decline. …”
    Get full text
    Article
  17. 3337

    SDN-Enabled Communication Network Framework for Energy Internet by Zhaoming Lu, Chunlei Sun, Jinqian Cheng, Yang Li, Yong Li, Xiangming Wen

    Published 2017-01-01
    “…Finally, we evaluate and verify the performance of this framework in terms of latency, reliability, and security by both theoretical analysis and real-world experiments.…”
    Get full text
    Article
  18. 3338

    Study on Helicopter Antitorque Device Based on Cross-Flow Fan Technology by Du Siliang, Tang Zhengfei, Xu Pei, Ji Mengjiang

    Published 2016-01-01
    “…In order to improve low-altitude flight security of single-rotor helicopter, an experimental model of a helicopter antitorque device is developed for wind tunnel test. …”
    Get full text
    Article
  19. 3339

    Young investors, precariousness, and the maturing asset economy by Monique de Jong McKenzie

    “…This affective atmosphere of precariousness pushes young people to seek stability and security wherever they can, and for young investors, this is found in financial assets.…”
    Get full text
    Article
  20. 3340

    The evolution of ASEAN's language policies: A diachronic analysis of official documents and website. by Chen Zhang, Ronghui Zhao, Yan Huang

    Published 2025-01-01
    “…The study reveals three key insights: 1) The evolution of the ASEAN official website can be categorized into three distinct stages. 2) A consistent use of the collective pronoun "we" in the statements highlights the emphasis on cooperation and progress across economic and political-security domains. 3) The ASEAN community has persistently upheld its values, fostering an ASEAN identity and a genuine ASEAN community throughout its development. …”
    Get full text
    Article