Showing 3,701 - 3,720 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 3701

    “FREQUENT FARMERS AND FULANI-HERDSMEN CLASH IN EDO NORTH SENATORIAL DISTRICT” by SUNDAY OMOAFENA IMANAH, JACOB O. OSUINDE

    Published 2024-07-01
    “…This research contribution to knowledge is on the importance of the activities of local vigilante, youth groups and community rulers in security management The Government should encourage them to build more on peace, growth and development in Edo North Senatorial District of Edo Stat for safety purpose. …”
    Get full text
    Article
  2. 3702

    Exploring the vulnerability in the inference phase of advanced persistent threats by Qi Wu, Qiang Li, Dong Guo, Xiangyu Meng

    Published 2022-03-01
    “…The Internet of Things device such as sensors is weaker than host in security. In the field of advanced persistent threat detection, most works used machine learning methods whether host-based detection or network-based detection. …”
    Get full text
    Article
  3. 3703

    Examination of Temporary Shelter Areas of the Eastern Black Sea Part by Fatma Berfin Abanoz, Nilhan Vural

    Published 2023-07-01
    “…Within the scope of this study, temporary shelter areas which determined by the Eastern Black Sea Part Provincial Disaster and Emergency (AFAD); were evaluated in terms of basic features, transportation, security and user. In the study, it is aimed to analyze the deficiencies of temporary shelter areas in the provinces of Artvin, Rize, Trabzon, Bayburt, Gümüşhane, Giresun and Ordu, which constitute the Eastern Black Sea Part, and to plan these areas depending on the requirements and standards for providing a contribution for further researches. …”
    Get full text
    Article
  4. 3704

    Noise‐based logic locking scheme against signal probability skew analysis by Ahmad Rezaei, Ali Mahani

    Published 2021-07-01
    “…So logic locking is deployed to hinder these security threats. In this technique, an IC is locked, and its functionality is retrieved when the right key is loaded onto it. …”
    Get full text
    Article
  5. 3705

    Public and Service Activity of the Ministry of Internal Affairs of Ukraine: Current Issues by O. V. Dzhafarova, O. O. Mozhovyi

    Published 2020-06-01
    “…It has been emphasized that the content of public and service activity of the Ministry of Internal Affairs of Ukraine is: a) a separate function of the service state, the content of which is to change the ideology, forms and methods in the work of law enforcement agencies; b) one of the externally-oriented functions of a specially created state institution along with such functions as regulatory, supervisory and law enforcement, c) the basis for the authorized entity to implement the tasks and functions of the state to ensure human rights and freedoms, as well as the interests of society and the state, keeping public order and security, combating crime, d) high-quality and affordable provision of administrative services to specific individuals in the form of licensing, registration and other similar actions in the law enforcement sphere.…”
    Get full text
    Article
  6. 3706

    Authenticated encryption mode with blocks skipping by A. V. Sokolov, D. A. Isakov

    Published 2021-10-01
    “…Block symmetric ciphers are one of the most important components of modern information security systems. At the same time, in addition to the structure of the applied block symmetric cipher, the cryptographic strength and performance of the information protection system is largely determined by the applied encryption mode. …”
    Get full text
    Article
  7. 3707

    Analysis of the spatial distribution of Police Stations on services to vulnerable urban areas (Case Study: Urmia City) by Ahmad Aftab, Ali Akbar Taghilo, Akbar Houshmand

    Published 2024-09-01
    “…The continuous and active presence of disciplinary centers has an important role in ensuring security and peace in cities.Therefore the fair and efficient distribution of law enforcement centers in urban areas is an important factor in meeting this basic need.Therefore, the present study aims to investigate the service of police stations on vulnerable areas of Urmia.The descriptive-analytical research method used in this study is applied.The results of the study show that the vulnerability zoning of the city of Urmia is in four categories from very high to very low. …”
    Get full text
    Article
  8. 3708

    Susceptibility Evaluation of Fall Armyworm (Spodoptera frugiperda) Infesting Maize in Kenya against a Range of Insecticides by Savinda Njeri Gichere, Kakai Shem Khakame, Okoth Patrick

    Published 2022-01-01
    “…The fall armyworm infestation has greatly threatened food security in Kenya. Consequently, this has heightened the need to evaluate the susceptibility of the fall armyworm to commonly used insecticides in Kenya. …”
    Get full text
    Article
  9. 3709

    The Role of Slum Tourism in Sustainable Urban Development of Slum Areas in Iraq by Al-Taee Omaima, Jaleel Ameera

    Published 2024-12-01
    “…Iraq suffers from spread of slums around cities with a clear shortage of tourist facilities; difficult access; loss of security and safety; weak marketing and promotion; and the need for organization and integrated management. …”
    Get full text
    Article
  10. 3710
  11. 3711

    APPROACHES TO THE SETTLEMENT OF THE NUCLEAR CRISIS ON THE KOREAN PENINSULA: AN ECONOMIC ASPECT by L. V. Zakharova

    Published 2018-11-01
    “…A nuclear crisis on the Korean peninsula was primarily caused by security reasons. However, from the very beginning an economic component has been inextricable part of any settlement plan. …”
    Get full text
    Article
  12. 3712

    University Social Responsibility during The Covid-19 Pandemic: Lessons from the Indonesian Context by yeni rosilawati, Zain Rafique, Atik Septi Winarsih

    Published 2022-06-01
    “…During the Covid-19 pandemic, social responsibility has become a key subject since it refers to the contribution of non-state actors in resolving the pandemic impact, becoming a non-traditional security issue. One non-state actor playing a significant role in society is educational institutions through university social responsibility (USR) programs. …”
    Get full text
    Article
  13. 3713
  14. 3714

    CONTRACTUALISTIC MEASUREMENTS OF THE GENDER: POSSIBILITIES AND BORDERS by D. V. Usov

    Published 2019-06-01
    “…Significance of the gender community for the sociocultural and existential identity of the individual enables (through organic, life-world belonging to a certain tradition and culture) his/her security and the ability to adequately orient in difficult life situations. …”
    Get full text
    Article
  15. 3715
  16. 3716

    Application of real options valuation in nuclear energy systems by Abdollah Arasteh

    Published 2024-09-01
    “…Nuclear power has been re-evaluated as a viable alternative to fossil fuels due to growing energy costs, climate change, and concerns about supply security. The present implementation of economies of scale has led to the development of a Light Water Reactor (LWR) design that lacks the ability to assess the strategic advantage and economic potential of contemporary nuclear systems. …”
    Get full text
    Article
  17. 3717
  18. 3718

    Detection of UAV GPS Spoofing Attacks Using a Stacked Ensemble Method by Ting Ma, Xiaofeng Zhang, Zhexin Miao

    Published 2024-12-01
    “…Experimental results indicate that the proposed model achieved a high accuracy of 99.79% in detecting GPS spoofing attacks, demonstrating its potential effectiveness in enhancing UAV security.…”
    Get full text
    Article
  19. 3719

    Advantages of Combining Factorization Machine with Elman Neural Network for Volatility Forecasting of Stock Market by Fang Wang, Sai Tang, Menggang Li

    Published 2021-01-01
    “…In this paper, the Standard & Poor’s 500 Composite Stock Price (S&P 500) index, the Dow Jones industrial average (DJIA) index, the Shanghai Stock Exchange Composite (SSEC) index, and the Shenzhen Securities Component Index (SZI) were used to demonstrate the validity of our proposed FM-Elman model in time-series prediction. …”
    Get full text
    Article
  20. 3720