Showing 3,801 - 3,820 results of 5,943 for search '"security"', query time: 0.08s Refine Results
  1. 3801

    Preventing and managing antimicrobial resistance in the African region: A scoping review protocol. by Chinwe Juliana Iwu-Jaja, Anelisa Jaca, Ishmael Festus Jaja, Portia Jordan, Phelele Bhengu, Chidozie Declan Iwu, Joseph Okeibunor, Humphrey Karamagi, Prosper Tumusiime, Walter Fuller, Ali Ahmed Yahaya, Charles Wiysonge, Laetitia Gahimbare

    Published 2021-01-01
    “…<h4>Introduction</h4>Antimicrobial resistance (AMR) constitutes a significant threat to global health and food security, typically associated with high morbidity and mortality rate. …”
    Get full text
    Article
  2. 3802

    Impacts and challenges of industry 4.0 in manufacturing: a systematic literature review by Tamires Fernanda Barbosa Nunes, Roselaine Ruviaro Zanini, Ariane Ferreira Porto Rosa, Lizandra Garcia Lupi Vergara

    Published 2022-12-01
    “…Additionally, six potential challenges faced by manufacturing in adopting digital transformation were found: (i) management, (ii) government, (iii) implementation, (iv) workforce, (v) operation, and (vi) security. The results indicated that accurate understanding of the concepts and scope of Industry 4.0 are under construction and that knowledge sharing will be decisive in shaping the future of the transition from current business models to smart manufacturing. …”
    Get full text
    Article
  3. 3803

    Redefining the Iranian Neighborhood Concept in Newly Developed Urban Contexts Based on Data Theory by mohsen Ilaghi, nima , Jahanbin, Iraj Ghasemi

    Published 2022-03-01
    “…It also interconnects the seven core codes of “diversity and quality of urban services”, “neighborhood edge and boundary”, “safety and security”, “livelihood and economic position of the neighborhood”, “social status”, “social solidarity”, and “sense of belonging and the correlation with the location” with three selective codes “continuity and functional-spatial cohesion”, “socio-economic mobility”, and “socio-institutional cohesion, and dependency”, a new definition of the neighborhood can be found which is presented at the end of this article with the conceptual model.…”
    Get full text
    Article
  4. 3804

    Research of Deicing and Melting Snow on Airport Asphalt Pavement by Carbon Fiber Heating Wire by Xin Su, Yong Lai, Yan Liu, Daoxun Ma, Peng Wang

    Published 2020-01-01
    “…In the paper, the method of deicing and melting snow by the carbon fiber heating wire (CFHW) embedded in the airport asphalt pavement is proposed to improve the security of airport operation. The field experiment of deicing and melting snow on the airport asphalt pavement is conducted. …”
    Get full text
    Article
  5. 3805

    Handling Multiple-Fuel Options in Economic Dispatch of Thermal Power Plants Through a Tight Model Applying Indicator Variables by Hossein Sharifzadeh

    Published 2025-01-01
    “…These thermal units can utilize various fuels, including coal, natural gas, and oil, which enhances both the economic performance and security of the overall energy system. Representing the fuel cost functions of these units with multiple fuels (MFs) as binary decisions involves adding binary variables to the economic dispatch (ED) problem. …”
    Get full text
    Article
  6. 3806

    A Statistical Image Feature-Based Deep Belief Network for Fire Detection by Dali Sheng, Jinlian Deng, Wei Zhang, Jie Cai, Weisheng Zhao, Jiawei Xiang

    Published 2021-01-01
    “…Detecting fires is of significance to guarantee the security of buildings and forests. However, it is difficult to fast and accurately detect fire stages in complex environment because of the large variations of the fire features of color, texture, and shapes for flame and smoke images. …”
    Get full text
    Article
  7. 3807

    Digital divide: how is Indonesian public service affected? by Edy Sutrisno, Mala Sondang Silitonga, Rima Ranintya Yusuf, Alih Aji Nugroho

    Published 2024-08-01
    “…The findings of the research point to a very low level of digital literacy in Indonesia, especially in terms of digital security. Mainly, the digital divide complicates the social exclusion of older generations, yet, in principle, digital technologies can help people in the older generation live better lives. …”
    Get full text
    Article
  8. 3808

    Constructing Core Backbone Grid Based on the Index System of Power Grid Survivability and BBO Algorithm by Feifei Dong, Dichen Liu, Jun Wu, Fei Tang, Chunli Song, Haolei Wang, Lina Ke, Bingcheng Cen, Wentao Sun, Zhenshan Zhu

    Published 2014-01-01
    “…The survivability index of power grid is made up of four indices, namely, the resistibility, recoverability, security, and connectivity. Based on survivability, a method of constructing core backbone grid with the optimal criteria of the minimal total line length and the largest integrated survivability index is put forward. …”
    Get full text
    Article
  9. 3809
  10. 3810

    Application of deep learning for real-time detection, localization, and counting of the malignant invasive weed Solanum rostratum Dunal by Shifeng Du, Yashuai Yang, Hongbo Yuan, Man Cheng

    Published 2025-01-01
    “…Solanum rostratum Dunal (SrD) is a globally harmful invasive weed that has spread widely across many countries, posing a serious threat to agriculture and ecosystem security. A deep learning network model, TrackSolanum, was designed for real-time detection, location, and counting of SrD in the field. …”
    Get full text
    Article
  11. 3811

    Distributed Denial of Services (DDoS) attack detection in SDN using Optimizer-equipped CNN-MLP. by Sajid Mehmood, Rashid Amin, Jamal Mustafa, Mudassar Hussain, Faisal S Alsubaei, Muhammad D Zakaria

    Published 2025-01-01
    “…The SDN has several security problems because of its intricate design, even with all its amazing features. …”
    Get full text
    Article
  12. 3812

    Evaluation and measurement of urban viability and factors affecting it (case study of Bojnourd city) by Mohammad Saghebi, Ezatollah mafi, Mehdi Watanparast

    Published 2022-12-01
    “…Other findings of this study include the positive effect of citizenschr('39') sense of security and health on urban livability.…”
    Get full text
    Article
  13. 3813

    Analysis of Effective Factors on the way of spending of leisure time in Tehran (Case study: District 12 of Tehran) by Ali Movahed, Ali shamai, Mahnaz Bahmani

    Published 2021-03-01
    “…This study, using inferential statistical methods and SPSS software and statistical analysis such as correlation, regression and t-test, attempted to analyze the relationship between independent research variables (functional, security, aesthetic, transportation, economic, biological). …”
    Get full text
    Article
  14. 3814

    Prediction of Conductive Anomalies Ahead of the Tunnel by the 3D-Resitivity Forward Modeling in the Whole Space by Daiming Hu, Bülent Tezkan, Mingxin Yue, Xiaodong Yang, Xiaoping Wu, Guanqun Zhou

    Published 2021-01-01
    “…The prediction of water hazards before tunnel excavations becomes an urgent task for governments or enterprises to ensure security. The three-dimensional (3D) direct current (DC) resistivity method is widely used in the forward-probing of tunnels because of its low cost and highly sensitive response to water-bearing structures. …”
    Get full text
    Article
  15. 3815

    Shock and adaption: The economic impact of COVID-19 in the Mentawai Islands, West Sumatra, Indonesia by Setiawati Sri, Yonariza Yonariza, Pal Indrajit, Priyono Eko, Agustinus Agustinus, Tasirikeru Aron

    Published 2025-01-01
    “…People responded to the lower-income by intensifying their involvement in the agricultural and fishery sectors to meet their food security needs. This study highlights the importance of strengthening access to local resources to cope with disasters in the island’s region.…”
    Get full text
    Article
  16. 3816

    Digital Cognitive Behavioral Therapy for the Average Person in Developing Countries by Muhammad Abdullah, Muhammad Yahya Saeed

    Published 2024-12-01
    “…The results reveal that only 5% of individuals seek in-person therapy often, with 68% having limited knowledge of online mental health resources. 77% of survey participants have never used online mental health resources and express concerns about privacy and security. Based on the findings and literature review the study guides the development of strategies to enhance access to DCBT resources. …”
    Get full text
    Article
  17. 3817

    Cryo-EM structure of Sudan ebolavirus glycoprotein complexed with its human endosomal receptor NPC1 by Fan Bu, Gang Ye, Hailey Turner-Hubbard, Morgan Herbst, Bin Liu, Fang Li

    Published 2025-02-01
    “…Abstract Sudan ebolavirus (SUDV), like Ebola ebolavirus (EBOV), poses a significant threat to global health and security due to its high lethality. However, unlike EBOV, there are no approved vaccines or treatments for SUDV, and its structural interaction with the endosomal receptor NPC1 remains unclear. …”
    Get full text
    Article
  18. 3818

    Buzzing Guardians Buzzing Guardians: Protecting Pollinators in Agricultural Landscapes by Hunasikote Shamappa Venu, Amala Udayakumar, A.N. Shylesha, Timalapur M. Shivalingaswamy

    Published 2024-11-01
    “…By acclimatizing an integrated, collaborative and convincing approach for pollinator conservation, we can assure and predict the sustainability and productivity of ecosystem, that eventually supports biodiversity and food security. …”
    Get full text
    Article
  19. 3819

    Recent Research Progress on Ground-to-Air Vision-Based Anti-UAV Detection and Tracking Methodologies: A Review by Arowa Yasmeen, Ovidiu Daescu

    Published 2025-01-01
    “…Integrating this novel aerial traffic into existing airspace frameworks presents unique challenges, particularly regarding safety and security. Consequently, there is an urgent need for robust contingency management systems, such as Anti-UAV technologies, to ensure safe air traffic. …”
    Get full text
    Article
  20. 3820

    A Game-Theoretic Response Strategy for Coordinator Attack in Wireless Sensor Networks by Jianhua Liu, Guangxue Yue, Shigen Shen, Huiliang Shang, Hongjie Li

    Published 2014-01-01
    “…It is shown that the proposed scheme can improve reliability and save energy during the network lifetime with respect to security.…”
    Get full text
    Article