Showing 3,401 - 3,420 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 3401

    StegoEDCA: An Efficient Covert Channel for Smart Grids Based on IEEE 802.11e Standard by Marek Natkaniec, Paweł Kępowicz

    Published 2025-01-01
    “…These covert channels provide an innovative solution for securely transmitting large volumes of data within the smart grid.…”
    Get full text
    Article
  2. 3402

    INNOVATIVE INFORMATION TECHNOLOGIES IN ELECTION POLITICAL COMMUNICATIONS by Анна РУДНЄВА

    Published 2024-12-01
    “…The use of AI to create deepfakes and spread disinformation poses ethical and security challenges. The text concludes that while digital technologies offer immense opportunities for enhancing electoral communication, they also require robust ethical guidelines and regulatory oversight. …”
    Get full text
    Article
  3. 3403

    TomatoGuard-YOLO: a novel efficient tomato disease detection method by Xuewei Wang, Jun Liu

    Published 2025-01-01
    “…Tomatoes are highly susceptible to numerous diseases that significantly reduce their yield and quality, posing critical challenges to global food security and sustainable agricultural practices. To address the shortcomings of existing detection methods in accuracy, computational efficiency, and scalability, this study propose TomatoGuard-YOLO, an advanced, lightweight, and highly efficient detection framework based on an improved YOLOv10 architecture. …”
    Get full text
    Article
  4. 3404

    The Rare Coincidence: Nonrecurrent Laryngeal Nerve Pointed by a Zuckerkandl's Tubercle by Emin Gurleyik, Sami Dogan, Omer Gunal, Mevlut Pehlivan

    Published 2012-01-01
    “…Anatomical and embryological variations of the inferior laryngeal nerve (ILN), of the thyroid gland itself and unusual relations between ILN and the gland threaten operation security are discussed. The patient with toxic multinodular goiter is treated with total thyroidectomy. …”
    Get full text
    Article
  5. 3405

    Blockchain based micropayment for e-health IOT sensors by Mahdi Shahraki, Amir Jalali Bighdeli

    Published 2023-09-01
    “…Increasing the use of this technology in smart cities requires improving the IT infrastructure for the security and privacy of users. This has led to the use of blockchain technology alongside the Internet of Things. …”
    Get full text
    Article
  6. 3406

    Model for home-preschool continuity in linguistically and culturally diverse settings by Mila Schwartz, Hanna Ragnarsdóttir

    Published 2025-01-01
    “…Preschool education scholars have argued that teachers must work collaboratively with these children’s families to support their “linguistic security” and well-being. The paper presents a conceptual model integrating linguistically and culturally responsive teaching with family funds of knowledge, language education, and family language policies. …”
    Get full text
    Article
  7. 3407

    Metaverse: Technological evolution and social impact by Marković-Blagojević Marija, Radić Nikola, Cvjetković Milena

    Published 2024-01-01
    “…Through the evolution of virtual worlds and technological advancements, the Metaverse is becoming increasingly prevalent, offering richer socialization experiences and economic opportunities while simultaneously raising concerns about privacy, security, and media addiction. National policies and the attitudes of international organizations also play a crucial role in shaping the future of the Metaverse, with different countries having different strategies and priorities. …”
    Get full text
    Article
  8. 3408

    Home, Physical Disability and Sense of Belonging in Nina Raine’s Tribes by Nurten Çelik

    Published 2023-12-01
    “…Home has traditionally been perceived as a location that provides control, freedom of self-expression, and psychological, social, and physical security. However, the presence and development of physical impairment subvert the positive aspects and conventional conceptions of home. …”
    Get full text
    Article
  9. 3409
  10. 3410
  11. 3411
  12. 3412

    Defending Against Advanced Persistent Threats Using Game-Theory. by Stefan Rass, Sandra König, Stefan Schauer

    Published 2017-01-01
    “…The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailable. …”
    Get full text
    Article
  13. 3413

    Cultural Tourism Management: Advanced Tools and Technologies by Bojana Milenović

    Published 2025-01-01
    “…On the other hand, the blockchain technology could offer numerous advantages in the field of cultural tourism, from enhanced security and transparency to process automation and the creation of innovative visitor experiences. …”
    Get full text
    Article
  14. 3414
  15. 3415

    Effects of Neutralization, Decoloration, and Deodorization on Polycyclic Aromatic Hydrocarbons during Laboratory-Scale Oil Refining Process by Yuxiang Ma, Longkai Shi, Yulan Liu, Qiyu Lu

    Published 2017-01-01
    “…Data obtained in this study suggest that the use of activated carbon during oil refining process is highly recommended; moreover, these results provide a useful guidance for oil refining plant to reduce security risk and ensure the quality of the vegetable oil products.…”
    Get full text
    Article
  16. 3416

    “Big Challenges” and Regional Technical University: Values and Actions by R. V. Aginey, O. I. Belyaeva

    Published 2020-03-01
    “…There is a distinction between civilization and globalist paradigms of Russia positioning, as well as a distinction between well-being and security as two strategies of values generalization. …”
    Get full text
    Article
  17. 3417

    GOVERNMENTAL SUPPORT MECHANISM OF THE RENEWABLE ENERGY IN GERMANY by N. V. Kozaeva

    Published 2016-06-01
    “…Energy reform is intended to increase the energy security level by increasing the share of renewables in its energy portfolio, environmental protection by decreasing the emission into the atmosphere and the level of energy consumption. …”
    Get full text
    Article
  18. 3418

    Implementation of an Android-Based Attendance Application with Geofence Method for Employee Monitoring Efficiency by Arlan Leon Allacsta, T. Yudi Hadiwandra

    Published 2024-11-01
    “…Application testing was conducted based on the ISO 25010 standard, covering eight aspects: functionality, reliability, efficiency, portability, maintainability, compatibility, security, and usability. The test results indicate that this application performs well in all these aspects. …”
    Get full text
    Article
  19. 3419

    Regulatory challenges in ai-based diagnostics: Legal implications of ai use in medical diagnostics by Naili Yuris Tri, Mangkunegara Iis Setiawan, Purwono, Baballe Muhammad Ahmad

    Published 2025-01-01
    “…The research results indicated that algorithmic bias, data security, and the requirement for stringent rules to guarantee the ethical and safe application of AI are the primary obstacles. …”
    Get full text
    Article
  20. 3420

    Flexibility in Power Systems of Integrating Variable Renewable Energy Sources by Wojciech Lewicki, Hasan Huseyin Coban

    Published 2023-03-01
    “…The issue of energy security is addressed in many publications and by specialists in many fields. …”
    Get full text
    Article