Showing 3,501 - 3,520 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 3501

    Digital Technology Empowers Grain Supply Chain Optimization Simulation by Xiaoyan Xu, Zhongye Sun

    Published 2021-01-01
    “…The issue of the balance of food supply and demand has always been the main issue of national and even world food security. There are many factors that affect food supply and demand, and the factors are interrelated. …”
    Get full text
    Article
  2. 3502

    Christianity, ‘supernatural’ beliefs and COVID-19 by E. Shoko

    Published 2023-06-01
    “…The paper concludes that the pervasive influence of church leaders and their emphasis on spiritual remedies such as prayer and miracles may have given Pentecostal followers a false sense of security, which might have affected their awareness of COVID-19. …”
    Get full text
    Article
  3. 3503

    DETECTING WEB-BASED BOTNETS USING A WEB PROXY AND A CONVOLUTIONAL NEURAL NETWORK by Trần Đắc Tốt, Phạm Tuấn Khiêm, Phạm Nguyễn Huy Phương

    Published 2020-09-01
    “…Botnets are increasingly becoming the most dangerous threats in the field of network security, and many different approaches to detecting attacks from botnets have been studied. …”
    Get full text
    Article
  4. 3504

    Artificial Intelligence Bias and the Amplification of Inequalities in the Labor Market by Matjaz Perc, H. Eren Suna, Mahmut Özer

    Published 2024-06-01
    “…We assess these threats by studying data from various labor fields, including justice, security, healthcare, human resource management, and education.…”
    Get full text
    Article
  5. 3505

    Distributed Generation Integration in the Electric Grid: Energy Storage System for Frequency Control by Maurizio Delfanti, Davide Falabretti, Marco Merlo, Gabriele Monfredini

    Published 2014-01-01
    “…Transmission system operators are greatly concerned about the impact of RESs on the operational security and efficiency of their networks and more in general of the ENTSO-E interconnected system. …”
    Get full text
    Article
  6. 3506

    Becoming an Employer of Choice for Generation Z in the Construction Industry by Makram Bou Hatoum, Hala Nassereddine

    Published 2025-01-01
    “…The findings reveal that Gen Z prioritizes respect, work–life balance, and job security, and values flexibility in work schedules and hybrid work environments. …”
    Get full text
    Article
  7. 3507

    REGIONAL COOPERATION ON THE BLACK SEA: ACHIEVEMENTS, PROBLEMS, PROSPECTS by E. D. Eshba

    Published 2013-12-01
    “…To summarize, the author concludes that , despite the development of cooperation in the region , there are problems in the formation of a comprehensive system of regional security and cooperation, so as major obstacles to the successful implementation of the plan of cooperation in the Black Sea region still remain .…”
    Get full text
    Article
  8. 3508

    Optimizing safety performance through risk-based modeling in Nigeria’s oil and gas sector by Mgbowaji Zacchaeus, John Ugbebor, Ikechukwu Agbagwa, Ochuko Felix Orikpete

    Published 2023-11-01
    “…The analysis highlighted key risks like inadequate infrastructure, valve and seal failures, security concerns, and oil spill risks, underscoring the need for targeted interventions to promote a safer working environment and reduce accident risks. …”
    Get full text
    Article
  9. 3509

    DIFFERING APPROACHES OF THE JAPANESE GOVERNMENT TOWARDS THE “HISTORY ISSUES” by A. A. Batakova

    Published 2016-02-01
    “…Given the fact that it was nevertheless received positively by Tokyo's main ally Washington and did not become an obstacle to political dialogue with Seoul and Beijing, the author suggests that S.Abe will continue step-by-step efforts to remove "historical issues" from the bilateral political and economic agenda with China and South Korea, as well as to erase the link between the necessity to issue apologies, characteristic of the Japanese diplomacy of the 1990s, and a strategy to a larger Japan's role in international politics and security.…”
    Get full text
    Article
  10. 3510

    LAMENT PSALMS, THE CHRISTIAN COMMUNITY AND GOVERNANCE IN CONTEMPORARY NIGERIA by Uzoma Amos Dike

    Published 2023-08-01
    “…Thus, the need to further explore justification for the Christian community in mobilizing lament to ease distresses ushered in by contemporary security challenges, create awareness for justice and foster national cohesion. …”
    Get full text
    Article
  11. 3511

    Zero-Shot Traffic Identification with Attribute and Graph-Based Representations for Edge Computing by Zikui Lu, Zixi Chang, Mingshu He, Luona Song

    Published 2025-01-01
    “…Experimental results on IoT datasets demonstrate that AG-ZSL achieves exceptional performance in classifying both known and unknown traffic, highlighting its potential for enhancing secure and efficient traffic management at the network edge.…”
    Get full text
    Article
  12. 3512
  13. 3513

    A novel RNN architecture to improve the precision of ship trajectory predictions by Martha Dais Ferreira, Jessica N. A. Campbell

    Published 2025-12-01
    “…Monitoring maritime transport activities is crucial for ensuring the security and safety of people and goods. This type of monitoring often relies on the use of navigation systems such as the Automatic Identification System (AIS). …”
    Get full text
    Article
  14. 3514

    The impact of a new coronavirus infection spread on the environment and on the public policy for environmental development by O. A. Filchenkova

    Published 2022-01-01
    “…The impact of COVID-19 pandemic on the current state of the environment and the environmental effects of this impact have been shown, the main challenges and threats to environmental security have been described, opportunities have been formulated in the current situation and can be used in the development of state environmental policy. …”
    Get full text
    Article
  15. 3515
  16. 3516

    The role of civil-military cooperation in contemporary United Nations peacekeeping operations: a case study of UNIFIL by Slobodan M. RADOJEVIC

    Published 2025-01-01
    “…Through these activities, the CIMIC personnel influence the security of the unit and contribute to the success of the mission. …”
    Get full text
    Article
  17. 3517

    Production Constraints and Improvement Strategies of Cowpea (Vigna unguiculata L. Walp.) Genotypes for Drought Tolerance by Gabriel V. Nkomo, Moosa M. Sedibe, Maletsema A. Mofokeng

    Published 2021-01-01
    “…L) is an important leguminous crop largely grown by smallholder farmers in sub-Saharan Africa for food security and animal feed. The objective of this study was to review the production constraints and improvement strategies of cowpea genotypes for drought tolerance. …”
    Get full text
    Article
  18. 3518

    Presenting a Geomorphological Conceptual Model of Construction of bridges in urban floodway- river valleys by Esmaiel Najafi, Amir Safari, Ezatoalah Ghavavati, Amir Karam

    Published 2024-06-01
    “…The results indicate the capability and application of geomorphology in modeling and optimal location and construction of bridges, in order to create more security and welfare of citizens, reduce costs and prevent financial and human losses due to the destruction and improper location of such structures in an urban floodway- river valleys and other natural environments. …”
    Get full text
    Article
  19. 3519

    Quantitative evaluation of China’s public health emergencies response policies: a PMC index model approach by Yongwen Liu, Min Jiao, Yan Wang, Anning Ma

    Published 2025-01-01
    “…Abstract Background In recent years, public health emergencies, such as the COVID-19 pandemic and Ebola outbreaks, have occurred with increasing frequency worldwide, posing significant threats to global public health security. Policies serve as the foundation and institutional framework for effective emergency responses. …”
    Get full text
    Article
  20. 3520