Showing 3,381 - 3,400 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 3381

    Mental health in the hadith spotlight: enlightenment for a healthy soul by Yuliharti Yuliharti, Agustiar Agustiar, M. Ridwan Hasbi, Syafi'ah Syafi'ah, Usman Usman, M. Fahli Zatrahadi

    Published 2024-09-01
    “…The research results show that mental health in the hadith includes principles such as feelings of security, independence, responsibility, and physical and spiritual balance. …”
    Get full text
    Article
  2. 3382

    Improving Data Privacy in the Internet of Things by Using Artificial Immune System, in Regard with the Internet Limitations by Marzieh Faridi Masouleh, Ali Harounabadi, Asal Sayyad

    Published 2022-03-01
    “…Studies show that the lack of a complete, efficient and standard model has caused many security flaws in these networks. By using the Internet limitations, this study discusses how to create a target function to protect data privacy in the Internet of Things. …”
    Get full text
    Article
  3. 3383

    Yield and Profitability of Sweet Potato (Ipomoea batatas (L.) Lam) as a Function of Increasing Levels of Phosphorus and Varieties in Southern Ethiopia by Mesfin Dawit, Abera Habte

    Published 2023-01-01
    “…Sweet potato is among the most important food security crops in Ethiopia. However, its productivity is constrained by poor soil fertility and a lack of improved varieties. …”
    Get full text
    Article
  4. 3384

    A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map by Ali Soleymani, Md Jan Nordin, Elankovan Sundararajan

    Published 2014-01-01
    “…In this paper, a novel encryption scheme is presented for securing images based on Arnold cat and Henon chaotic maps. …”
    Get full text
    Article
  5. 3385

    From forensic chemistry: an educational experience by González Graciela A.

    Published 2024-10-01
    “…In this way, it contributes to generating awareness about safety and security, ethics, and the professional responsibilities of chemists. …”
    Get full text
    Article
  6. 3386

    Assessment of the effectiveness of management of innovative development institutions at the meso level by Yu. A. Abutalipova

    Published 2022-02-01
    “…It has concluded that the creation and development of a technological digital environment contribute to the effective interaction between various sectors of the economy and market entities, which is based on regulatory and legal regulation, ensuring information security, developing innovative infrastructure, providing highly qualified personnel in the industry.…”
    Get full text
    Article
  7. 3387

    Studi Literatur Penggunaan Smartphone-based Thermal Imaging dalam Pengkajian Perfusi Vascular Perifer by Syafa’atun Mirzanah, Rr.Tutik Sri Hariyati

    Published 2020-10-01
    “…Next research should examine the specifity and sensitivity of the device and also the standard protocol in capturing photo and also solve the problem of security issue. …”
    Get full text
    Article
  8. 3388

    DAG-Based Swarm Learning Approach in Healthcare: A Survey by David Gana, Faisal Jamil

    Published 2025-01-01
    “…Blockchain’s innovative consensus mechanisms and secure data flow systems offer encouraging solutions to crucial issues in healthcare data management and security. …”
    Get full text
    Article
  9. 3389
  10. 3390

    Application of IoT and blockchain technology in the integration of innovation and industrial chains in high-tech manufacturing by Zepei Li, Peng Zheng, Yanjia Tian

    Published 2025-04-01
    “…The framework leverages blockchain technology to ensure data transparency and security, while smart contracts automate exception handling to enhance efficiency. …”
    Get full text
    Article
  11. 3391

    Information Support of Foreign Policy by O. A. Melnikova

    Published 2015-04-01
    “…Modern international relations present new challenges and threats ofcross-border nature, which fall within the area of information security. This brings issues of informational influence on international policy to the fore. …”
    Get full text
    Article
  12. 3392

    Multiobjective Prioritized Workflow Scheduling in Cloud Computing Using Cuckoo Search Algorithm by Babuli Sahu, Sangram Keshari Swain, Sudheer Mangalampalli, Satyasis Mishra

    Published 2023-01-01
    “…., Max–Min, first come first serve, minimum completion time, Min–Min, resource allocation security with efficient task scheduling in cloud computing-hybrid machine learning, and Round Robin. …”
    Get full text
    Article
  13. 3393

    A Review of Biomass Energy: Comparison of Utilization Methods and Future Prospects by Zhang Kai

    Published 2025-01-01
    “…Biomass energy, considered sustainable and eco-friendly, can reduce greenhouse gas emissions and enhance energy security, contributing significantly to net-zero emission goals. …”
    Get full text
    Article
  14. 3394

    Comparative Analysis of Drones and Riders in On-Demand Meal Delivery Based on Prospect Theory by Hong Jiang, Xinhui Ren

    Published 2020-01-01
    “…However, rider delivery has certain problems in terms of timeliness and security. Due to its advantages of being fast, convenient, and safe, drone delivery can, to a certain extent, solve the problems of rider delivery. …”
    Get full text
    Article
  15. 3395

    A comparison study on optical character recognition models in mathematical equations and in any language by Sofi.A. Francis, M. Sangeetha

    Published 2025-03-01
    “…This technology has the potential to be used for industries, banking, the medical field, security, and document storage among others. OCR faces significant challenges in accurately predicting language and mathematical expressions due to variations in handwriting styles, complex layouts, and the ambiguity of symbols. …”
    Get full text
    Article
  16. 3396

    Genebanks at Risk: Hazard Assessment and Risk Management of National and International Genebanks by Theresa Herbold, Johannes M. M. Engels

    Published 2023-08-01
    “…Financing is a major problem for national genebanks in developing countries, whereas the Global Crop Diversity Trust achieved considerable financial security for international genebanks. Large differences in the risk exposure of genebanks exist, making a location- and institution-specific risk assessment indispensable. …”
    Get full text
    Article
  17. 3397

    Money Laundering Practices and Singapore’s Steps Against Indonesian Tax Amnesty by Septyanto Galan Prakoso, Royce Kharisma Agung Wibowo, Nadia Dian Ardita, Ferdian Ahya Al Putra, Retnaningtyas Puspitasari

    Published 2025-01-01
    “…The implementation of those policies is classified as a two-pronged sword because it also ensures the privacy and security of corrupt money investments from other countries. …”
    Get full text
    Article
  18. 3398

    A Shared Interest Discovery Model for Coauthor Relationship in SNS by Xin An, Shuo Xu, Yali Wen, Mingxing Hu

    Published 2014-04-01
    “…In order to share one's sensitive data with random people without security and privacy concerns, this paper proposes a shared interest discovery model for coauthor relationship in SNS, named as coauthor topic (coAT) model, to identify the users with similar interests from social networks, and collapsed Gibbs sampling method is utilized for inferring model parameters. …”
    Get full text
    Article
  19. 3399

    Indicadores de Bem-estar Humano para Povos Tradicionais: o caso de uma comunidade ribeirinha na fronteira da Amazônia brasileira by Luiz Felipe Barbosa Lacerda, Luis Eduardo Acosta

    Published 2017-01-01
    “…The set of Human Wellbeing Indicators for Traditional Societies presented is supported in five main capacities: collective control of territory, autonomous cultural agency, food security guarantee, the construction of a peaceful environment to live in, and self-care and reproduction. …”
    Get full text
    Article
  20. 3400

    Design of Remote Monitoring Iot System Based on 5G and New Optical Fiber Intelligent Structure by Lei Hu

    Published 2022-01-01
    “…The remote monitoring system is mainly a network system with convenient layout, simple maintenance, and high security performance built on the basis of the wireless network, which can realize real-time monitoring, and collects transmit information. …”
    Get full text
    Article