Showing 3,661 - 3,680 results of 5,943 for search '"security"', query time: 0.08s Refine Results
  1. 3661

    Russia and the Issues of the Korean Peninsula by G. D. Toloraya

    Published 2014-08-01
    “…It can be solved only by multilateral efforts for comprehensive solution combining security guarantees for North Korea and its abandonment of nuclear option.…”
    Get full text
    Article
  2. 3662

    Quantum Private Comparison Protocol with Cluster States by Min Hou, Yue Wu

    Published 2025-01-01
    “…In this paper, we introduce a quantum private comparison (QPC) protocol designed for two players to securely and privately assess the equality of their private information. …”
    Get full text
    Article
  3. 3663

    Obesity and overweight among the poor and marginalized in rural Mexico: impact analysis of the effect of school breakfasts on children aged five to eleven by Odra A. Saucedo-Delgado, Marcela De-La-Sota-Riva-Echánove, Leovardo Mata

    Published 2023-05-01
    “…These findings highlight the need for a more comprehensive school breakfast program, that is connected to the food and nutritional security approach and is designed and implemented according to each Mexican region’s specific alimentary requirements and socioeconomic needs.…”
    Get full text
    Article
  4. 3664

    Stability of Bar Code Information Stored in Magnetic Nanowire Arrays by Eduardo Cisternas, Eugenio E. Vogel, Julián Faúndez

    Published 2017-01-01
    “…Firmware applications such as security codes, magnetic keys, and similar products can be stored in magnetic bar codes similar to optical bar codes. …”
    Get full text
    Article
  5. 3665

    Effect of balanced nutrition intervention based on local food on young women of orang rimbo in Bukit Duabelas National Park, Jambi province by Asparian Asparian, Sri Asturi Siregar, Usi Lanita

    Published 2024-09-01
    “…The population of the Anak Dalam Tribe in Jambi Province is 200 thousand people who still live in the forests and around the TNBD forests at risk of experiencing malnutrition, including their teenage daughters, due to socio-economic status factors, limited access to health services, food security, family empowerment, and low levels of knowledge and education. . …”
    Get full text
    Article
  6. 3666
  7. 3667

    Development of the bank of russia’s fast payment system in modern conditions by S. V. Krivoruchko, I. A. Rizvanova, A. V. Berdyshev

    Published 2024-10-01
    “…The potential of FPS in the context of ensuring the Russian payment infrastructure security represents an important direction for strengthening user confidence and system sustainability. …”
    Get full text
    Article
  8. 3668

    Mitigating Sinkhole Attacks in MANET Routing Protocols using Federated Learning HDBNCNN Algorithm by Sherril Sophie Maria Vincent

    Published 2025-02-01
    “…In this study, Federated Learning is utilized to improve the security and privacy through empowering nodes to train the model deprived of distribution complex data. …”
    Get full text
    Article
  9. 3669

    Lived experiences of how the care relationship in primary healthcare contributes to recovery from stress-related disorders: a reflective lifeworld research study by Markus Sjösten, Cecilia Fagerström, Ulrica Hörberg, Hanna Tuvesson

    Published 2025-12-01
    “…Conclusions Sensing security and hope is a crucial element in the care relationship in primary healthcare when recovering from stress-related disorders. …”
    Get full text
    Article
  10. 3670

    FARMER-HERDERS CONFLICTS IN NIGERIA: ITS CHALLENGES AND INTERVENTIONS by M.O. Mazeli, Binta Side

    Published 2023-09-01
    “…The fight for peace in the north-central states, the fight against social insecurity and conflicts, must comprise determined action against food security, poverty, inequality, injustice, and against the most extreme and most dependence-inducing form of poverty - being hungry, insecure of today's and tomorrow's food. …”
    Get full text
    Article
  11. 3671

    Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing by Changbo Ke, Zhiqiu Huang, Weiwei Li, Yi Sun, Fangxiong Xiao

    Published 2014-01-01
    “…However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features. …”
    Get full text
    Article
  12. 3672

    Investment and Saving Among House Hold in Kabale District: A Case Study of Kitumba Sub-County Kabale District. by Aturinde, Annitor

    Published 2024
    “…Motives identified included retirement planning, economic development, income security, savings, precautionary measures, inheritance, employment, education, income levels, and social status. …”
    Get full text
    Thesis
  13. 3673

    The Effects of Economic Deprivation on the Welfare of Older Persons in Kabale District: A Case Study of Butanda Sub-County. by Atusingwize, Prize A.

    Published 2024
    “…To mitigate these impacts, the study suggested expanding social security schemes to non-civil servants, tailoring grants for older persons, and continuously providing skills training in productive ventures. …”
    Get full text
    Thesis
  14. 3674

    Design of a Maize Sieving Machine. by Keshubi, Nice Alex

    Published 2024
    “…Overall, this reciprocating maize sieving machine represents a significant advancement in post-harvest processing techniques, contributing to increased food security and sustainability in agriculture…”
    Get full text
    Thesis
  15. 3675

    Trends, contradictions, and patterns of functioning of interregional and inter-municipal cooperation institutions by R. F. Gataullin, E. R. Chuvashaeva

    Published 2025-01-01
    “…Among the patterns in the institutions development it is necessary to define their focus on functioning in the context of horizontal links globalization, growth of development sustainability and population mobility, digitalization and innovativeness, ensuring security on the basis of risk management, which implies legal integration and standards harmonization, intensive exchange of the best projects, activation of local authorities and population in projects implementation. …”
    Get full text
    Article
  16. 3676
  17. 3677

    INTERROGATING THE EFFECTS OF ARMED BANDITRY ON THE SOCIO-ECONOMIC DEVELOPMENT OF NIGERIA’S NORTH-CENTRAL REGION (2015-2022) by YUSUFU Ahmed Audu, ODAUDU Alfred Idachaba, ILEVBARE Igheoise Trust

    Published 2023-09-01
    “… Armed banditry has being a major security challenge confronting northern Nigeria in recent years. …”
    Get full text
    Article
  18. 3678
  19. 3679

    A-priori multi-objective optimization for the short-term dispatch of distributed energy resources by G. Carpinelli, A.R. Di Fazio, S. Perna, A. Russo, M. Russo

    Published 2025-03-01
    “…In order to exploit the flexibility provided by distributed energy resources (DERs), a multi-objective optimization (MOO) approach is proposed to minimize the bus voltage deviations, the network losses, and the current security index. Effective linear power flow equations are included into both the objective functions and the inequality constraints of the MOO model, thus yielding benefits in terms of reduced model dimension and computational complexity. …”
    Get full text
    Article
  20. 3680

    Collective Agreement for Members of Slovenian Armed Forces: Reflections on Features of Collective Negotiations in the Public Sector for the Military Profession by Ljubo Štampar

    Published 2014-12-01
    “…The most important European institutions, in terms of safety and protection of the rights in the European region, are following the trend of changes in the security environment, new tasks of the military organization, the changed nature of the military profession in the postmodern era, and defend the concept of the “citizen in uniform”. …”
    Get full text
    Article