Showing 3,341 - 3,360 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 3341

    PHYSICAL LAYER SECRECY ON WIRELESS NETWORK by Trương Tiến Vũ, Trần Đức Dũng, Hà Đắc Bình, Võ Nhân Văn

    Published 2016-06-01
    “…In this paper, we present an approach for wireless security based on physical layer. The basic principle of physical layer secrecy (PHY Secrecy) is ensuring secure information transmission in the the system that consists of illegal receiver without using any coding solution on application layer. …”
    Get full text
    Article
  2. 3342

    A strategy of the new “green revolution” in wheat breeding: celebrating the jubilee of Lyudmila A. Bespalova, Full Member of the Russian Academy of Sciences by E. K. Khlestkina

    Published 2022-04-01
    “…Lukyanenko National Grain Center is a practically proven strategy of the new “green revolution” capable of ensuring the global food security.…”
    Get full text
    Article
  3. 3343

    Sulla (ri)articolazione della “marocchinità” nel Marocco contemporaneo, tra festivalizzazione del dissenso giovanile e revival sufi by Michela Buonvino

    Published 2024-06-01
    “…After September 11, 2001, and following terrorist attacks in Casablanca, the Moroccan monarchy was engaged in redefining a field of the sacred, which involved the neutralization of Salafist tendencies and their replacement with a Sufism deemed harmless and incapable of threatening the nation's spiritual security. The monarchy's discursive strategies required and still require the elaboration of public representations of virtue, particularly of the principle of democratic citizenship, central in the transitional discourses of today's Moroccan state, performed within the framework of national and international festivals. …”
    Get full text
    Article
  4. 3344

    The real-time data processing framework for blockchain and edge computing by Zhaolong Gao, Wei Yan

    Published 2025-05-01
    “…However, traditional centralized methods struggle with real-time requirements and data security. This paper introduces VCD-TSNet, a novel real-time IoT data processing framework that combines blockchain and edge computing. …”
    Get full text
    Article
  5. 3345
  6. 3346

    Nosocomial infection in the intensive care unit. 1997-2002. by Marta Luján Hernández, Leticia Justafré Couto, Gudelia Cuellar Gutiérrez

    Published 2005-04-01
    “…The rates of mortality associated to infection stayed low and the lethality suffered a on decreased in the studied period, however the pneumonias associated to the ventilation mechanics stayed high with an average of 24, 6 for every 1000 patient days and to the closing of the 2002 the service you will find in the area of security of the endemic channel.<span style="font-family: Calibri;"><strong><span style="font-size: 10pt">K</span></strong></span>…”
    Get full text
    Article
  7. 3347

    TM-Chain: TCB Measurement Management Using Cloud Blockchain for IoT Devices by Jaemin Park, Sungjin Park

    Published 2025-01-01
    “…In the IoT era, RA is an important security feature because verifiers make critical decisions based on the RA result. …”
    Get full text
    Article
  8. 3348

    Cooperation in border areas among some Southeast Asian mainland countries: a case study of the Cambodia-Laos-Vietnam Development Triangle by Nguyen Dinh Co, Le Ba Vuong, Tong Thi Tan, Nguyen Tuan Binh

    Published 2025-12-01
    “…Border cooperation in mainland Southeast Asia has received attention from the countries of Myanmar, Thailand, Cambodia, Laos and Vietnam to both strengthen cooperation to promote the economy and improve people’s lives in the region border, ensuring national security and preventing crime. Typical of the border cooperation mechanism of mainland Southeast Asia is the Cambodia-Laos-Vietnam Development Triangle (CLVDT) which established in 1999.…”
    Get full text
    Article
  9. 3349

    Challenges and recommendations for enhancing digital data protection in Indian Medical Research and Healthcare Sector by Anubhuti Sood, Deepika Mishra, Varun Surya, Harpreet Singh, Rajesh Sundaresan, Debnath Pal, Raghu Dharmaraju, Rohit Satish, Shashwat Mishra, Nishant A. Chavan, Soham Mondal, Pavan Duggal, Venkateswaran K. Iyer

    Published 2025-01-01
    “…Abstract The Digital Personal Data Protection Act (DPDPA), 2023 of India provides a regulatory framework for use and security of personal digital data. However, instances, wherein the patients consult the clinicians via digital means of communication: the implications of DPDPA, 2023 for the medical personnel remain unclear. …”
    Get full text
    Article
  10. 3350

    Study of living standards in Sahebgharaniyeh neighborhood of Tehran by Mehran Mohammadi, Naser eghbali, mahmood rezaii

    Published 2022-03-01
    “…But with 95 percent confidence, Sahebgharriyeh neighborhood can be considered as individual and social security indexes, identity and sense of place belonging, facilities and services needed, and the status of the visual landscape and the environmental pollution of the habitat.…”
    Get full text
    Article
  11. 3351

    Integrating Machine Learning for Predictive Maintenance on Resource-Constrained PLCs: A Feasibility Study by Riccardo Mennilli, Luigi Mazza, Andrea Mura

    Published 2025-01-01
    “…This approach minimizes latency, enhances data security, and reduces the bandwidth required for data transmission, making it ideal for industrial applications that demand immediate response times. …”
    Get full text
    Article
  12. 3352
  13. 3353

    „Nie wierzę w bajki!”: Henrietta Regina Davidson Avram (1919–2006) by Joanna Gajowiecka-Misztal

    Published 2023-12-01
    “…Droga zawodowa Avram wpisuje się w triadę stworzoną przez Vannevara Busha: wojsko (National Security Agency) – świat akademicki (Biblioteka Kongresu) – firmy prywatne (Datatrol). …”
    Get full text
    Article
  14. 3354
  15. 3355

    Facial Recognition Databases: Recent Developments and Review of Methods by Waleed Ayad, Siraj Qays, Asanka G. Perera, Ali Al-Naji

    Published 2023-12-01
    “… Facial recognition is one of the most important biometrics that many researchers are increasingly studying, as it is used in various applications such as surveillance, security, law enforcement, information, person identification, smart cards, access control, etc. …”
    Get full text
    Article
  16. 3356

    Feature-Level vs. Score-Level Fusion in the Human Identification System by Rabab A. Rasool

    Published 2021-01-01
    “…The design of a robust human identification system is in high demand in most modern applications such as internet banking and security, where the multifeature biometric system, also called feature fusion biometric system, is one of the common solutions that increases the system reliability and improves recognition accuracy. …”
    Get full text
    Article
  17. 3357

    Leveraging drone technology for enhanced safety and route planning in rock climbing and extreme sports training by Ulzhalgas Seidaliyeva, Nurzhigit Smailov

    Published 2025-01-01
    “…Furthermore, drones enhance athletes' psychological comfort, leading to increased confidence and security during high-risk activities. Conclusions: Despite the advantages, challenges such as technological dependency and potential drone malfunctions in extreme environments are acknowledged. …”
    Get full text
    Article
  18. 3358

    Ensete ventricosum: A Multipurpose Crop against Hunger in Ethiopia by Getahun Yemata

    Published 2020-01-01
    “…Moreover, enset shows high genetic diversity within a population which in turn renders resilience and food security against the ever-changing environmental factors and land use dynamics. …”
    Get full text
    Article
  19. 3359

    Investigating the impact of physical dimensions - space to encourage walking in Tehran (Case Study: neighborhood Amirabad and Daneshgah Tehran) by ahmad pourahmad, nabi moradpour, hossen hataminejad

    Published 2018-06-01
    “…The amount of factor loadings obtained in all the research indicates that the selected indicators to measure the physical dimensions of space, encourage walking properly measure these dimensions, so that the physical dimensions, safety index (99/0 ) and the spatial dimensions of the security indicator (75/0) have had the highest amount of loadings. …”
    Get full text
    Article
  20. 3360

    Cross-stream attention enhanced central difference convolutional network for CG image detection by HUANG Jinkun, HUANG Yuanhang, HUANG Wenmin, LUO Weiqi

    Published 2024-12-01
    “…Although these technologies are widely used in daily life and bring many conveniences, they also come with many security risks. If forged images generated using CG technology are maliciously used and widely spread on the Internet and social media, they may harm the rights of individuals and enterprises. …”
    Get full text
    Article