Showing 3,581 - 3,600 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 3581

    Identification of Ecological Priority Areas Based on Nested-Scale Analysis: A Case Study of Metropolitan Nanjing, China by Yuxi Zhu, Jianqiang Yang, Le Zhu, Liping Sun

    Published 2024-12-01
    “…Rapid urbanization has led to severe fragmentation of ecological spaces in high-density metropolitan regions, threatening urban ecological security and environmental well-being. While cities explore various restoration strategies, the systematic identification of ecological priority areas remains an urgent challenge, particularly due to the limitations of multi-scale evaluation methods. …”
    Get full text
    Article
  2. 3582

    Morphological, Morphometric, and Distribution Pattern Characteristics of Optimal Harvest Phase Sago in Forest Area Based on Drone Imagery by Iriansa, Mutmainnah

    Published 2024-12-01
    “…On the other hand, Sago is one of the food crops that is considered to have the potential for development to improve the community's economy and increase global food security. The main objective of this study is to extract the morphological characteristics, morphometry, and distribution patterns of sago in the optimal harvest phase in non-cultivated areas. …”
    Get full text
    Article
  3. 3583

    A Multistory Building Evacuation Model Based on Multiple-Factor Analysis by Yang Zhou, Tanghong Wu, Gaofan Zhang, Zichuan Fan

    Published 2019-01-01
    “…Emergency evacuation is an important issue in public security. To make a considerate plan, various situations are presented including blocking the accident area and letting the emergency access path available. …”
    Get full text
    Article
  4. 3584

    Optimizing Credit Card Fraud Detection: A Genetic Algorithm Approach with Multiple Feature Selection Methods by Sunil Kumar Patel, Devina Panday

    Published 2024-12-01
    “…To protect our financial security, it is crucial to develop robust and accurate fraud detection systems that stay one step ahead of the fraudsters. …”
    Get full text
    Article
  5. 3585

    Money Laundering Practices and Singapore’s Steps Against Indonesian Tax Amnesty by Septyanto Galan Prakoso, Royce Kharisma Agung Wibowo, Nadia Dian Ardita, Ferdian Ahya Al Putra, Retnaningtyas Puspitasari

    Published 2025-01-01
    “…The implementation of those policies is classified as a two-pronged sword because it also ensures the privacy and security of corrupt money investments from other countries. …”
    Get full text
    Article
  6. 3586

    A Torus-Chaotic System and Its Pseudorandom Properties by Jizhao Liu, Xiangzi Zhang, Qingchun Zhao, Jing Lian, Fangjun Huang, Yide Ma

    Published 2020-01-01
    “…Furthermore, the pseudorandom properties of output sequence are well studied and a random number generator algorithm is proposed, which has the potential of being used in several cyber security systems such as the verification code, secure QR code, and some secure communication protocols.…”
    Get full text
    Article
  7. 3587

    INTERNET INFLUENCE ON INTERNATIONAL POLITICS by E. S. Zinovieva

    Published 2013-08-01
    “…New forms of international conflicts, including information war, network wars, hacker attacks etc. are one of the negative results of the fast internet and information technologies development.At the same time development of information technology poses new challenges to international and national security, which can only be reduced through collective efforts of the international community.…”
    Get full text
    Article
  8. 3588
  9. 3589

    The role of information skewness in shaping extremist content: A look at four extremists by Waseem Afzal

    Published 2023-06-01
    “…It is hoped that the findings of this research will inform future enquiries into the role of information and its properties in shaping extremist content and help security agencies to effectively engage in information warfare with extremists. …”
    Get full text
    Article
  10. 3590
  11. 3591

    Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game by Ashraf Al Sharah, Taiwo Oyedare, Sachin Shetty

    Published 2016-01-01
    “…Security in mobile ad hoc networks (MANETs) is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. …”
    Get full text
    Article
  12. 3592

    From Maximization to Optimization: A Paradigm Shift in Rice Production in Thailand to Improve Overall Quality of Life of Stakeholders by Ryoichi Doi, Supachai Pitiwut

    Published 2014-01-01
    “…The system has resulted in good health conditions for the farmers and villagers, financial security, availability of extra time, and additional opportunities and freedom and hence in the improvement of their overall quality of life. …”
    Get full text
    Article
  13. 3593

    Employer Branding and Brand Building in the Aviation Industry by Gabrišová Ivana, Koman Gabriel

    Published 2025-01-01
    “…To build customer loyalty, airlines should focus on meeting diverse needs based on travel types, offering memorable experiences, and ensuring website security. By strengthening their brand, companies can enhance their attractiveness to job seekers, boost employee and customer satisfaction and loyalty, and improve overall business performance.…”
    Get full text
    Article
  14. 3594
  15. 3595

    Forearm multimodal recognition based on IAHP‐entropy weight combination by Chaoying Tang, Mengen Qian, Ru Jia, Haodong Liu, Biao Wang

    Published 2023-01-01
    “…Abstract Biometrics are the among most popular authentication methods due to their advantages over traditional methods, such as higher security, better accuracy and more convenience. The recent COVID‐19 pandemic has led to the wide use of face masks, which greatly affects the traditional face recognition technology. …”
    Get full text
    Article
  16. 3596
  17. 3597

    Monitoring Heart Disease and Diabetes with Mobile Internet Communications by David Mulvaney, Bryan Woodward, Sekharjit Datta, Paul Harvey, Anoop Vyas, Bhaskar Thakker, Omar Farooq, Robert Istepanian

    Published 2012-01-01
    “…As an extra layer of security in the data transmission, information embedded in the data is used in its verification. …”
    Get full text
    Article
  18. 3598

    Does Turkey have a Central Asian Project? by Ali Emre Sucu, O. I. Iskandarov, R. B. Mahmudov, D. N. Chernov

    Published 2021-06-01
    “…However, it has limited influence on regional security and military affairs, which Russia dominates. …”
    Get full text
    Article
  19. 3599

    Dual Citizenship in Germany and what it Means for World Politics by M. S. Salkina

    Published 2015-04-01
    “…In these circumstances further changes are possible in integration processes, the relations between EU and its key partners and equally in international security architecture. The analysis is preceded by a short historical overview of Turkish diaspora formation in Germany and German vision of a national community that inevitably determines the State citizenship policies.…”
    Get full text
    Article
  20. 3600

    Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method by Udaya Suriya Raj Kumar Dhamodharan, Rajamani Vayanaperumal

    Published 2015-01-01
    “…Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. …”
    Get full text
    Article