Showing 3,421 - 3,440 results of 5,943 for search '"security"', query time: 0.09s Refine Results
  1. 3421

    Alert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks by Vinod Namboodiri, Abtin Keshavarzian

    Published 2011-01-01
    “…This is particularly important for security-related applications like intrusion detection and fire alarm systems. …”
    Get full text
    Article
  2. 3422

    Determinants of digital bank transformation: a systematic literature review with prisma and bibliometrics by Wahyu Avianto, Hermanto Siregar, Anny Ratnawati, Mulya E Siregar

    Published 2024-11-01
    “…The determinants in the digital bank transformation process include the level of digitalization, application user growth, IT investment, IT committee, cyber security, and ecosystem stocks. The results of this literature review will be a reference for further research related to digital banks, in line with the rapid digital transformation process in banking.…”
    Get full text
    Article
  3. 3423

    Functions and Authorities of the Armed Forces of Ukraine on the Crime Scene by Y. V. Grinenko

    Published 2019-12-01
    “…It is emphasized that in order to ensure the implementation of the said functions of the Armed Forces of Ukraine, they have the right to take measures to restore the territorial integrity of Ukraine, as well as to provide comprehensive development of secure, economic, information, telecommunication, social and humanitarian infrastructure on the territories adjacent to the temporarily occupied territories in Donetsk and Luhansk to implement, in accordance with strategic defense planning documents, measures to strengthen defense and security capabilities of the country. …”
    Get full text
    Article
  4. 3424
  5. 3425

    Analysis of Climate Change from the Aliguodarz Region Farmers’ Viewpoint with an Emphasis on the Central District by Mohammad Tavakoli, Bohlol Alijani, Reza Borna, Hosain Mohammadi

    Published 2013-11-01
    “…Therefore, it is necessary to predict or simulate this effect using various available tools in the field of management, to ensure consumer food security and the maximum welfare of producers, with the necessary planning and policy making. …”
    Get full text
    Article
  6. 3426

    Energy Efficient Partial Permutation Encryption on Network Coded MANETs by Ali Khan, Qifu Tyler Sun, Zahid Mahmood, Ata Ullah Ghafoor

    Published 2017-01-01
    “…Mobile Ad Hoc Networks (MANETs) are composed of a large number of devices that act as dynamic nodes with limited processing capabilities that can share data among each other. Energy efficient security is the major issue in MANETs where data encryption and decryption operations should be optimized to consume less energy. …”
    Get full text
    Article
  7. 3427

    The use of Telenomus remus (Nixon, 1937) (Hymenoptera: Scelionidae) in the management of Spodoptera spp.: potential, challenges and major benefits by Yelitza Coromoto Colmenarez, Dirk Babendreier, Francisco Ramón Ferrer Wurst, Carlos Luis Vásquez-Freytez, Adeney de Freitas Bueno

    Published 2022-01-01
    “…Abstract Spodoptera frugiperda (Smith, 1797) (Lepidoptera: Noctuidae), also known as fall armyworm (FAW) is a polyphagous pest which can cause significant losses and is considered a global threat to different crops and a risk to food security. Currently, in maize, the pest is predominantly controlled by pesticides or transgenic events. …”
    Get full text
    Article
  8. 3428

    Unveiling Islamophobia: navigating its presence in Sweden by Adrián Groglopo, Fereshteh Ahmadi, Jimmy Stephen Munobwa

    Published 2025-12-01
    “…Political and media narratives often manufacture immigration as a social problem, framing the construction of meaning through the discourses of cultural differences as social, political and security problems. Of specific concern is how Muslims and immigrants from predominantly Muslim countries are perceived as the undesirable ‘Other’. …”
    Get full text
    Article
  9. 3429

    Amerika Birleşik Devletleri’nin NSC-68 Çerçevesinde Uyguladığı Soğuk Savaş Stratejisi ve Türkiye’ye Yansımaları by Serpil GÜDÜL

    Published 2021-12-01
    “…In order to fight with this threat, the report number 68 (NSC-68) was prepared and implemented by the American National Security Council in 1950. In this study, in addition to the analysis of the NSC-68 which was one of the most significiant documents of the Cold War, its Cold War strategy implemented against the USSR and its relations with Turkey are examined accordingly. …”
    Get full text
    Article
  10. 3430

    Trust evaluation model of cloud user based on behavior data by Zhenguo Chen, Liqin Tian, Chuang Lin

    Published 2018-05-01
    “…The user authentication can provide a certain degree of security, but when the user information was leaked, this method will not be effective. …”
    Get full text
    Article
  11. 3431
  12. 3432

    Operational Risk Assessment for International Transport Corridor: A Case Study of China-Pakistan Economic Corridor by Yang Lei, Chengfeng Huang, Yuan Wu

    Published 2019-01-01
    “…The risk management and control should focus on these three types of risks and strengthen the security management along the route. Strengthen policy docking and communication, maintain political stability, and strengthen antiterrorism cooperation.…”
    Get full text
    Article
  13. 3433

    Optimization tool for small hydropower plant resource planning and development: A case study by Antans Sauhats, Hasan Huseyin Coban

    Published 2022-09-01
    “…In order to decrease carbon dioxide emissions, fight climate change, not being attached to fuel resources, and increase energy security while decreasing dependence on foreign countries, governments of many countries are increasing the share of renewable energy in electricity production and have taken actions to exploit their domestic resources, which is why renewable energy is an essential and important issue in today‘s world and also in the future it may continue to play a globally essential role. …”
    Get full text
    Article
  14. 3434

    Analysis of the Mechanism of Political Cost in the Complex Environmental Governance System by Xintao Li, Tongshun Cheng, Zaisheng Zhang, Li Zhao

    Published 2022-01-01
    “…The emergence of conflicts between environmental safety incidents and protection rights generates sizeable political costs, which endangers the legitimacy of the government as well as political security and stability. This article further examines the role of political costs in environmental issues. …”
    Get full text
    Article
  15. 3435

    Study on the Influence of Tectonic Stress on Stability of Horseshoe-Shaped Tunnels by Xin Lv, Shuzhi Wang, Yu Qiu, Xiangxin Liu

    Published 2021-01-01
    “…The numerical model of the tunnel is built by FLAC3D, and the influence of the magnitude and direction of structural stress on the horseshoe-shaped tunnel is studied in detail. Finally, the security support of the tunnel is discussed. Results show that the stress concentration phenomenon is easily focused on the left, right, and bottom sides of the tunnel; these places should therefore be the focus of attention of tunnel stability analysis. …”
    Get full text
    Article
  16. 3436
  17. 3437

    Armenia: an Uneasy Choice Between Russia's New Initiatives and the EU Eastern Partnership by M. Y. Vardazaryan

    Published 2014-02-01
    “…Deepened strategic cooperation with Moscow, first of all, provides military and energy security of Armenia, although the economic factor shouldn't be underestimated. …”
    Get full text
    Article
  18. 3438
  19. 3439

    ASSESSMENT AND ANALYSIS OF DIGITAL TRANSFORMATION OF REGIONAL ECONOMIC SYSTEMS OF THE RUSSIAN FEDERATION: METHODOLOGICAL APPROACHES AND THEIR APPROBATION by M. R. Safiullin, A. A. Abdukaeva, L. A. Elshin

    Published 2020-02-01
    “…A distinctive aspect of the proposed algorithm is the orientation of the developed tools to study the five main directions of digitalization, defined by the Order of the Government of the Russian Federation of July 28, 2017 (No. 1632-r): regulatory regulation, personnel for the digital economy, formation of research competencies and technological foundations, information infrastructure, information security. Based on the results of the study, the main qualitative and quantitative characteristics have been identified, that assess the development of the digital economy in the constituent entities of the Russian Federation at the present stage of development; a toolkit has been offered, that allows you to determine key areas of regional policy aimed at intensifying the processes of digitalization of business processes.…”
    Get full text
    Article
  20. 3440

    VALUE CHAIN IN AGRICULTURE: THE CASE OF THE EUROPEAN UNION by Sanja Franc, Vlatka Bilas, Lana Trifunić

    Published 2021-05-01
    “…Through a deduction method, certain conclusions were made about the state of the EU food system as well as demand and supply trends in order to provide a broader understanding of the food security and the significance of agricultural sector in general. …”
    Get full text
    Article