Showing 3,441 - 3,460 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 3441

    Device-Free Localization Techniques: A Review by Abd Al-Rahman Tariq Rasheed, Aseel Hameed AL-Nakkash, Osama Abbas Al Tameemi, Debashri Roy

    Published 2023-12-01
    “…By shedding light on these critical aspects, it offers valuable insights into the current state of DFL technology and its potential in diverse domains, ranging from smart environments to security systems. …”
    Get full text
    Article
  2. 3442
  3. 3443

    Weighted Sum Secrecy Rate Optimization for Cooperative Double-IRS-Assisted Multiuser Network by Shaochuan Yang, Kaizhi Huang, Hehao Niu, Yi Wang, Zheng Chu, Gaojie Chen, Zhen Li

    Published 2024-01-01
    “…In this paper, we present a double-intelligent reflecting surfaces (IRS)-assisted multiuser secure system where the inter-IRS channel is considered. …”
    Get full text
    Article
  4. 3444

    SECHA: A Smart Energy-Efficient and Cost-Effective Home Automation System for Developing Countries by Abdulhafiz Ahmed Mustofa, Yohannes Alemayehu Dagnew, Prabhakar Gantela, M. Javed Idrisi

    Published 2023-01-01
    “…They simplify our lives, reduce workloads, improve home safety and security, and pave the way for newer developments. …”
    Get full text
    Article
  5. 3445
  6. 3446

    Sizing and Simulation of PV-Wind Hybrid Power System by Mustafa Engin

    Published 2013-01-01
    “…The output of the program will display the performance of the system during the year, the total cost of the system, and the best size for the PV-generator, wind generator, and battery capacity. Security lightning application is selected, whereas system performance data and environmental operating conditions are measured and stored. …”
    Get full text
    Article
  7. 3447

    Date Attachable Offline Electronic Cash Scheme by Chun-I Fan, Wei-Zhe Sun, Hoi-Tung Hau

    Published 2014-01-01
    “…Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.…”
    Get full text
    Article
  8. 3448

    Detection of Data Integrity Attack Using Model and Data-Driven-Based Approach in CPPS by G. Y. Sree Varshini, S. Latha

    Published 2023-01-01
    “…Protecting sensitive data from data integrity attacks (DIA) is essential for ensuring system security and reliability. A tragic event will occur if the attack goes unreported. …”
    Get full text
    Article
  9. 3449

    Deep Learning Based DDoS Attack Detection by Xu Ziyi

    Published 2025-01-01
    “…Nowadays, one of the biggest risks to network security is Distributed Denial of Service (DDoS) assaults, which cause disruptions to services by flooding systems with malicious traffic. …”
    Get full text
    Article
  10. 3450

    Socialisation of student youth in social networks by T. Shcherban, O. Samoilov

    Published 2024-06-01
    “…It was noted that the protection of privacy and the development of critical thinking are important for ensuring the security and information competence of social network users. …”
    Get full text
    Article
  11. 3451
  12. 3452

    National Defense as fiscal policy during the Mauricio Macri administration (2015-2019) by Sergio Gabriel Eissa

    Published 2020-09-01
    “…The article establishes that, although the security-oriented discourse was apparently predominant, in the end, a fiscal adjustment rationale prevailed over all the other proposals. …”
    Get full text
    Article
  13. 3453

    Support Vector Machine for Behavior-Based Driver Identification System by Huihuan Qian, Yongsheng Ou, Xinyu Wu, Xiaoning Meng, Yangsheng Xu

    Published 2010-01-01
    “…Since human driving behaviors belong to a dynamic biometrical feature which is complex and difficult to imitate compared with static features such as passwords and fingerprints, we find that this novel idea of utilizing human dynamic features for enhanced security application is more effective. In this paper, we first describe our experimental platform for collecting and modeling human driving behaviors. …”
    Get full text
    Article
  14. 3454
  15. 3455

    Human-Terrestrial Wildlife Conflict in Ethiopia: A Systematic Review by Getahun Shanko, Bekele Tona

    Published 2022-01-01
    “…About 178 keywords’ analysis revealed a focus on “coexistence,” “mitigation,” and “food security.” The literature focused mainly on larger mammals, led by Ethiopian authors, and excluded the social dimensions of HWC. …”
    Get full text
    Article
  16. 3456

    Risk-based approach in external migration public management by V. A. Volokh, T. N. Dmitrieva

    Published 2024-03-01
    “…External migration state management should be aimed at solving the socio-economic development problems in Russia and ensuring national security and at the same time should minimize potential risks of social and cultural nature. …”
    Get full text
    Article
  17. 3457

    Implementation of Simplified Data Encryption Standard on FPGA using VHDL by salim Qadir Mohammed

    Published 2022-03-01
    “…Due to enormous development in communication devices, globally internet-connected network largely used in all human activities. The security of information has been becoming a major concern for all users and clients, whom depend on network system. …”
    Get full text
    Article
  18. 3458

    TR-SDTN: Trust Based Efficient and Scalable Routing in Hostile Social DTNs by Zhenjing Zhang, Maode Ma, Zhigang Jin

    Published 2015-07-01
    “…In view of these defects, we propose a novel solution to address the selfish and security issues in social DTNs. Based on nodes’ social characteristics, a dynamic trust model is proposed to prevent bad-mouthing and ballot stuffing attacks and the Shannon entropy function is introduced to avoid blackhole and greyhole attacks. …”
    Get full text
    Article
  19. 3459

    The war inside your mind: unprotected brain battlefields and neuro-vulnerability by Robert McCreight

    Published 2024-02-01
    “…Experts in neuromedicine, technology, societal security, and strategy must grasp that a variety of technologies that arguably enhance brain function, influence or augment intelligence, link brains with computers, and enablenon invasice access to the brain-are highly attractive. …”
    Get full text
    Article
  20. 3460

    Modeling the Grain Import Trade: A Cointegration Analysis of China’s Panel Data by Feng Zhao, Pingping Sun, Jie Zhang

    Published 2021-01-01
    “…Therefore, China should pay close attention to the impact of international factors on the fluctuation of its own food prices and enhance its ability to rationally utilize the international food market and international agricultural resources to ensure domestic food security.…”
    Get full text
    Article