Showing 3,361 - 3,380 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 3361

    A Biometric Key Establishment Protocol for Body Area Networks by Lin Yao, Bing Liu, Guowei Wu, Kai Yao, Jia Wang

    Published 2011-08-01
    “…The correctness of the proposed key establishment protocol is formally verified based on SVO logic. Security analysis shows that our protocol can guarantee data confidentiality, authenticity and integrity. …”
    Get full text
    Article
  2. 3362

    Structural and Dynamic Changes in International Trade in Agricultural Products in Ukraine by Yuriy Hubeni, Volodymyr Krupa, Nataliia Zelisko

    Published 2024-03-01
    “…The peculiarities of key directions of Ukraine's agro-industrial market under martial law and its place in the global food security system are described. The article also examines the structure of Ukraine's trading partners, which have been revised since the beginning of the war. …”
    Get full text
    Article
  3. 3363

    Generating Encrypted Document Index Structure Using Tree Browser by Doaa N. Mhawi, Haider W. Oleiwi, Heba L. Al-Taie

    Published 2023-06-01
    “…Many information retrieval systems encounter security issues and execution time to retrieve relevant documents. …”
    Get full text
    Article
  4. 3364

    Deep features fusion for user authentication based on human activity by Yris Brice Wandji Piugie, Christophe Charrier, Joël Di Manno, Christophe Rosenberger

    Published 2023-07-01
    “…Abstract The exponential growth in the use of smartphones means that users must constantly be concerned about the security and privacy of mobile data because the loss of a mobile device could compromise personal information. …”
    Get full text
    Article
  5. 3365

    A REAL TIME FACE RECOGNITION SYSTEM USING ALEXNET DEEP CONVOLUTIONAL NETWORK TRANSFER LEARNING MODEL by LAWRENCE O. OMOTOSHO, IBRAHIM K. OGUNDOYIN, JOSHUA O. OYENIYI, OLUWASHINA A. OYENIRAN

    Published 2021-10-01
    “…In various applications such as access control system, security, attendance management etc., it has been widely used for authentication and identification purposes. …”
    Get full text
    Article
  6. 3366

    Chinese Intellectuals’ Perspectives on Russia's Invasion of Ukraine by Emre Demir

    Published 2023-01-01
    “…While many accuse the Russian leadership and in particular Russian President Vladimir Putin for the war, some others criticize Western countries and principally the US for NATO’s eastward expansion and for disregarding Russia’s security concerns. Chinese intellectuals with diverse academic and political backgrounds have also contributed to these discussions and offered their assessments about the war in Ukraine as well as what kind of a policy China should follow. …”
    Get full text
    Article
  7. 3367

    Petrochemical Equipment Detection by Improved Yolov5 with Multiscale Deep Feature Fusion and Attention Mechanism by Zhenqiang Wei, Shaohua Dong, Xuchu Wang

    Published 2022-01-01
    “…Petrochemical equipment detection technology plays important role in petrochemical industry security monitoring systems, equipment working status analysis systems, and other applications. …”
    Get full text
    Article
  8. 3368
  9. 3369

    Ring Oscillators with Additional Phase Detectors as a Random Source in a Random Number Generator by Łukasz Matuszewski, Mieczysław Jessa, Jakub Nikonowicz

    Published 2024-12-01
    “…This feature enhances the security of the produced sequences, as eavesdroppers are unable to observe the continuous random bit generation process, such as through monitoring power lines. …”
    Get full text
    Article
  10. 3370
  11. 3371

    Harnessing UV radiation for enhanced agricultural production: benefits on nutrition, quality, and sustainability by Gideon Sadikiel Mmbando

    Published 2024-12-01
    “…This review offers essential knowledge and methods for using UV radiation as a safe tool to increase global food security.…”
    Get full text
    Article
  12. 3372

    Multi-alignment under "Uneven Multipolarity": India’s Relations with Russia in an Evolving World Order by Nivedita Kapoor

    Published 2023-05-01
    “…It argues that India's perception of the balance of threats has shifted with respect to China, particularly in the Asia-Pacific and Indian Ocean regions, which are crucial to India's national security and future power projection ambitions. In the current context of uneven multipolarity, the capabilities of the US and China exceed those of weaker major powers, such as India, Russia, and Japan, without tipping the system into explicit bipolarity. …”
    Get full text
    Article
  13. 3373

    THE NIGERIA MILITARY AND THE FIGHT AGAINST ISLAMIC STATE`s WEST AFRICA PROVINCE (ISWAP), 2016-2022 by BABA ALI KELLU, RUTH CALEB LUKA LUKA, MOHAMMED BELLO BABAN’UMMA

    Published 2024-09-01
    “…The findings from the study revealed that there were several offensives by the Nigerian military against ISWAP with the aim of neutralizing their fighters by destroying their camps and hideouts and restoring peace and security in the affected areas, certain strategies exhibit significant shortcomings, necessitating continuous refinement. …”
    Get full text
    Article
  14. 3374

    Effectiveness of the Spatial Domain Techniques in Digital Image Steganography by Rosshini Selvamani, Yusliza Yusoff

    Published 2024-03-01
    “… Digital steganography is a new and extremely demanding method for transmitting information securely over the internet while employing a covert device. …”
    Get full text
    Article
  15. 3375

    A Better Model for Socio-economic Governance? by Bryn Jones, Peter Nisbet

    Published 2011-06-01
    “…Investigation shows a bias towards external and brand-related, rather than internal priorities of job security and the social capital of workplace communities. …”
    Get full text
    Article
  16. 3376

    INVESTIGATING THE COST EFFECTIVENESS OF BIODIESEL DISTRIBUTION IN INDONESIA by Herbert Wibert Victor Hasudungan, Elis Heviati, Sulthon Sjahril Sabaruddin, Sigit Hargiyanto

    Published 2023-05-01
    “… The implementation of biodiesel in Indonesia has been regarded as one of the main strategies to improve country’s energy security equally and equitably. However, as the largest archipelago country in the world, the activity in distributing their biodiesel production bears a key problem. …”
    Get full text
    Article
  17. 3377

    Barriers and Enablers of AI Adoption in Human Resource Management: A Critical Analysis of Organizational and Technological Factors by Mitra Madanchian, Hamed Taherdoost

    Published 2025-01-01
    “…Change aversion, data security worries, and integration expenses are major roadblocks, but strong digital leadership, company culture, and advancements in NLP and machine learning are key enablers. …”
    Get full text
    Article
  18. 3378

    GLOBAL SUPRANATIONAL ACTORS OF INTERNATIONAL RELATIONS AND SOCIAL PHILOSOPHY by I. V. Surma

    Published 2013-08-01
    “…In article it is shown that the information support of foreign policy and international relations of the stands in one row with such priority issues of world policy as non-proliferation of nuclear weapons, restriction and prohibition of weapons of mass destruction, settlement of regional conflicts and peace-making, strengthening of comprehensive security, the preservation of cultural heritage and promotion of human rights.…”
    Get full text
    Article
  19. 3379

    Normal Deviance: The Dreyfus Affair by Marie-Christine Leps

    Published 2005-12-01
    “…Enmeshing issues of security and nation, of population and race, the Dreyfus affair forced governments, intellectuals, media, and what we now refer to as the ‘new social movements’ into wide-ranging debates and strategic interventions that forged new relations among them. …”
    Get full text
    Article
  20. 3380

    Digital Transformation: A Case Study of a Legal Firm in Sri Lanka and Its Impact by Dulanjani Dissanayake, Kajini Pasadika Hapuarachchi Hapuarachchige, Yogesh Jindal

    Published 2024-08-01
    “…Saram company’s manual practices, which hinder its operational effectiveness and adaptability in the contemporary legal landscape, where quick and secure access to information is pivotal. We have adopted TAM as the theoretical framework for this research. …”
    Get full text
    Article