Showing 3,741 - 3,760 results of 5,943 for search '"security"', query time: 0.08s Refine Results
  1. 3741

    An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud by Hao Li, Lianbing Deng, Cheng Yang, Jianbo Liu

    Published 2020-02-01
    “…To increase the scalability of the proposed algorithm, we discussed the issues of multi-authorization, user revocation, and 1 − n multiple access tree. Security analysis shows that enhanced media ciphertext-policy attribute-based encryption can successfully resist chosen-plaintext attacks under the decisional bilinear Diffie–Hellman assumption. …”
    Get full text
    Article
  2. 3742
  3. 3743

    Oil palm-cattle integration: Farmer perception of Ganoderma infection by Suteky Tatiek, Dwatmadji Dwatmadji, Bustaman Hendri

    Published 2025-01-01
    “…The findings indicated that although farmers perceive several potential benefits from integrating cattle into oil palm plantations, they also confront challenges concerning security, finance, knowledge, feed availability, and disease in the cattle. …”
    Get full text
    Article
  4. 3744

    PROFILES AND PREFERENCES OF ON-LINE MILLENIAL SHOPPERS IN BULGARIA by Patricia R. Loubeau, Robert Jantzen, Elitsa Alexander

    Published 2014-05-01
    “…Like other regions of the world, concern about financial transactions security is a major barrier limiting the willingness to shop on-line in Bulgaria. …”
    Get full text
    Article
  5. 3745
  6. 3746

    The application of grey statistical method and analytic hierarchy process in the evaluation of community park rehabilitation landscapes by Qingtao Cheng, Qiuping Li

    Published 2025-02-01
    “…The results are as follows: (1) Out of the 30 indicator factors, 13 were not selected through the GST method. (2) The weights of the criteria layer, from highest to lowest, are as follows: physical rehabilitation (D1) with a weight of 0.6370, psychological rehabilitation (D2) with a weight of 0.2583, and spiritual rehabilitation (D3) with a weight of 0.1047. (3) The highest and lowest values in the indicator layer are as follows: D1 (P14: illumination duration 0.2359, P17: hydrological conditions 0.0197); D2 (P21: sense of security 0.1433, P23: human-environment interaction 0.0162); D3 (P34: sense of pleasure 0.0400, P36: aesthetic value 0.0045). …”
    Get full text
    Article
  7. 3747

    South Africa: A Growing Embrace of Feminist Foreign Policy? by Jo-Ansie van Wyk

    Published 2023-02-01
    “…A more nuanced foreign policy focus on improving the status of women and gender equality emerged partly due to international developments regarding women, peace, and security. Hence, the contribution explores feminist and/or gendered aspects of South Africa’s foreign policy of ubuntu (human-ness and humanity) and diplomatic practice, and the implications thereof. …”
    Get full text
    Article
  8. 3748

    The voice of people’s perspective on the future of health resilience post pandemic hits: A numerically scaled survey in 19 provinces in Indonesia by Nurlaila Ika, Amalya Dewi Meta

    Published 2025-01-01
    “…The purpose of this study is to investigate the perspective of Indonesians regarding previous pandemics that have impacted the country’s health security. This study was conducted using a cross-sectional design. …”
    Get full text
    Article
  9. 3749

    IoT-Based Real-Time Crop Drying and Storage Monitoring System by Ishimwe Viviane, Emmanuel Masabo, Habiyaremye Joseph, Mitsindo Rene, Elias Bizuru

    Published 2023-01-01
    “…This mostly affects the quality of maize and flour being produced which will finally affect food security. In this research, temperature, humidity, and light sensors are deployed in the grain storage containers for environmental parameter detection purposes to achieve the primary goal of providing practical, secure, and easily accessible storage in inclement weather. …”
    Get full text
    Article
  10. 3750

    Islamic Tourism in Africa by R. I. Bekkin, A. S. Shnyrkova

    Published 2022-03-01
    “…The main problems for the development of Islamic tourism in Africa have also been identified: underdeveloped tourist and Halal infrastructure, lack of security, and poor promotion of tourist services among potential tourists are among the most significant ones. …”
    Get full text
    Article
  11. 3751

    On a New Sustainable Energy Policy: Exploring a Macro-Meso-Micro Synthesis by Dimos Chatzinikolaou, Charis Michael Vlados

    Published 2025-01-01
    “…Traditional concerns, such as energy security, self-sufficiency, and market liberalization, are increasingly giving way to a focus on rapid, sustainable energy transitions and development at the macrolevel. …”
    Get full text
    Article
  12. 3752

    Cuando negocian los rebeldes colombianos: indicadores estratégicos del acuerdo de paz con las FARC* by Luis Roberto Rangel-Álvarez, Eddgar Alfonso Vera-Gómez

    Published 2023-01-01
    “…La respuesta a este interrogante está ligada al concepto de punto de inflexión, que es el momento crucial en el que los acontecimientos giran hacia su resultado final. National Security Research Division (RAND) ha determinado indicadores comunes a los puntos de inflexión de ochenta y nueve conflictos contrainsurgentes, con el fin de promover e identificar la llegada de esta fase final del conflicto. …”
    Get full text
    Article
  13. 3753

    Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model by Basim Mahbooba, Mohan Timilsina, Radhya Sahal, Martin Serrano

    Published 2021-01-01
    “…Despite the growing popularity of machine learning models in the cyber-security applications (e.g., an intrusion detection system (IDS)), most of these models are perceived as a black-box. …”
    Get full text
    Article
  14. 3754

    Constructing Multiple-Objective Portfolio Selection for Green Innovation and Dominating Green Innovation Indexes by Meng Li, Kezhi Liao, Yue Qi, Tongyang Liu

    Published 2022-01-01
    “…However, Nobel Laureate Markowitz emphasizes portfolio selection instead of security selection and accentuates that “A good portfolio is more than a long list of good stocks.” …”
    Get full text
    Article
  15. 3755

    Industry 4.0: digital twins characteristics, applications, and challenges in-built environments by Heni Zribi, Taycir Ben Abid, Abdelkarim Elloumi, Yasmina Hani, Besma Bechir Graba, Aderrahman Elmhamedi

    Published 2025-12-01
    “…Despite these potential benefits, several challenges prevent the widespread adoption of DT technology such as data security and ownership concerns, the lack of common data standards and interoperability, and difficulties in managing diverse source systems.…”
    Get full text
    Article
  16. 3756

    BEHAVIOUR AMONG FEMALE MIGRANTS IN MAKURDI, BENUE STATE by ONYEMA ANGELA ABEL

    Published 2023-06-01
    “…This paper advocates the need to mitigate incidence of risky sexual behavior and provide policies that will ensure human security and economic empowerment …”
    Get full text
    Article
  17. 3757

    Determining the factors affecting the happiness levels of divorced individuals by ordered logistics regression analysis by Burak Uyar, Cevdet Büyüksu

    Published 2022-12-01
    “…It has been determined that divorced individuals are registered with the Social Security Institution and their happiness levels are higher than those who are not registered.…”
    Get full text
    Article
  18. 3758

    Real-Time Optimization of RISC-V Processors Based on Branch Prediction and Division Data Dependency by Zhiwei Jin, Hesong Di, Tingpeng Hu, Peng Wang

    Published 2025-01-01
    “…Whether a processor can meet the real-time requirements of a system is a crucial factor affecting the security of real-time systems. Currently, the methods for evaluating hardware real-time performance and the quality of real-time performance are not comprehensive. …”
    Get full text
    Article
  19. 3759

    Portable solutions for plant pathogen diagnostics: development, usage, and future potential by Anurag Yadav, Kusum Yadav

    Published 2025-01-01
    “…The increasing prevalence of plant pathogens presents a critical challenge to global food security and agricultural sustainability. While accurate, traditional diagnostic methods are often time-consuming, resource-intensive, and unsuitable for real-time field applications. …”
    Get full text
    Article
  20. 3760

    Cloud-Based Software Development Lifecycle: A Simplified Algorithm for Cloud Service Provider Evaluation with Metric Analysis by Santhosh S, Narayana Swamy Ramaiah

    Published 2023-06-01
    “…All cloud vendors are not the same in terms of the number of services, infrastructure availability, security strategies, cost per customer, and reputation in the market. …”
    Get full text
    Article