Showing 3,821 - 3,840 results of 5,943 for search '"security"', query time: 0.05s Refine Results
  1. 3821

    Analysis of Changes in Intercity Highway Traffic Travel Patterns under the Impact of COVID-19 by Mingchen Gu, Shuo Sun, Feng Jian, Xiaohan Liu

    Published 2021-01-01
    “…The unprecedented COVID-19 pandemic impacts negatively on the security and development of human society. Comparison and analysis of intercity highway travel patterns before and during the COVID-19 pandemic can bring vital insights for the prevention and control of the pandemic. …”
    Get full text
    Article
  2. 3822
  3. 3823

    Issues of arms control in transatlantic relations (1963–1975) by V. A. Veselov

    Published 2024-07-01
    “…Against the backdrop of the rapid degradation and destruction of the international security architecture dating back to the Cold War, the problems of arms control in general and the proliferation of nuclear weapons in particular assume new significance. …”
    Get full text
    Article
  4. 3824

    Theoretical and numerical study of profit in agricultural sector model using wavelet method by Yeshwanth R., Kumbinarasaiah S.

    Published 2025-03-01
    “…Agriculture is crucial in India’s economy and society, supporting rural livelihood and national food security. India is one of the world’s largest agricultural producers, with diverse crops and farming practices. …”
    Get full text
    Article
  5. 3825
  6. 3826

    Machine Learning-Based Anomaly Prediction for Proactive Monitoring in Data Centers: A Case Study on INFN-CNAF by Andrea Asperti, Gabriele Raciti, Elisabetta Ronchieri, Daniele Cesini

    Published 2025-01-01
    “…Anomaly prediction in time series is crucial for ensuring the stability and security of data centers, especially in scientific contexts such as INFN-CNAF, the National Center for Research and Development in Information and Communication Technology of the National Institute for Nuclear Physics. …”
    Get full text
    Article
  7. 3827

    Comparative Analysis of Nextcloud and Owncloud Performance as Infrastructure as a Service (IaaS) Based Cloud Storage by Prita Haryani, Renna Yanwastika Ariyana, Iqbal Abdul Majid, Fx. Guntur Putra Susanto

    Published 2024-12-01
    “…Numerous cloud storage applications now feature advanced functionalities; however, each cloud storage company varies regarding access speed, storage capacity, security, and costs. This study aims to analyze the performance of two cloud storage applications, Nextcloud and Owncloud, using throughput as a parameter. …”
    Get full text
    Article
  8. 3828

    Signal Processing Techniques for Through-Wall Object Imaging Using UWB Antipodal Vivaldi Antenna by Sajjad Ahmed, Arslan Ahmed Sohoo, Fawad Salam Khan, Imran Khan Keerio, Sarfraz Ahmed

    Published 2024-12-01
    “…Through-wall imaging (TWI) is a critical application in various domains, including security, surveillance, search and rescue, and structural assessment. …”
    Get full text
    Article
  9. 3829

    Development of problem-based learning practicum modules for the dangerous goods course by Dwi Candra Yuniar, Herlina Febiyanti, Shabrina Ramadhani, R.R. Retno Sawitri Wulandari

    Published 2023-12-01
    “…Providing Dangerous Goods material aims to discover how to handle and pack dangerous goods under predetermined regulations, not to endanger flight safety and security. However, the cadets felt that the Dangerous Goods course was challenging due to the lack of modules and difficulty understanding the very thick Dangerous Goods book. …”
    Get full text
    Article
  10. 3830

    Revenue policy features as an important direction of social policy by M. A. Biganova

    Published 2020-01-01
    “…The author rightly notes, that the income policy is aimed at solving such important tasks as helping vulnerable groups of the population by resorting to the use of the social security system and leveling the inflationary processes that affect the income and savings of citizens. …”
    Get full text
    Article
  11. 3831

    Active frequency support capability evaluation of photovoltaic stations based on bi-level evaluation method by Zhengxi Li, Libin Yang, Wanpeng Zhou, Chunlai Li

    Published 2025-02-01
    “…Abstract With the increasing penetration of photovoltaic (PV) in power grid, to cope with the deteriorating frequency security of the system, PV stations are required to participate in frequency regulation by grid codes. …”
    Get full text
    Article
  12. 3832

    Family Green Financial Education Based on Local Wisdom: Exploring the Values of Coastal Communities’ Local Wisdom in Promoting Green Financial Literacy by Kurniadi Romi, Dwijayanti Novia Sri, Sari Nurmala

    Published 2025-01-01
    “…The findings reveal that the coastal communities of the Batang Hari River integrate local wisdom into their financial and resource management, prioritizing long-term security and sustainability. They view saving and asset ownership as essential for future stability and employ eco-friendly practices such as using durable goods, organic fertilizers, and sustainable fishing methods. …”
    Get full text
    Article
  13. 3833

    Model-Based Design, HIL Testing, and Rapid Control Prototyping of a Low-Cost POC Quadcopter with Stability Analysis and Control by Abdullah Irfan, Muhammad Gufran Khan, Arslan Ahmed Amin, Syed Ali Mohsin, Muhammad Adnan, Adil Zulfiqar

    Published 2022-01-01
    “…Unmanned aerial vehicles (UAVs), particularly quadcopters, have several medical, agriculture, surveillance, and security applications. However, the use of this innovative technology for civilian applications is still very limited in low-income countries due to the high cost, whereas low-cost controllers available in the market are often tuned using the hit and trial approach and are limited for specific applications. …”
    Get full text
    Article
  14. 3834
  15. 3835

    Evaluating the investment performance of Japanese households: A comparison between professional financial advice and free financial advice by Yoshihiko Kadoya, Sumeet Lal, Jin Shinohara, Mostafa Saidur Rahim Khan

    Published 2025-02-01
    “…This study, analyzing data from Rakuten Securities, a leading online-based security company in Japan, finds that investors prefer free financial advice from sources such as social media, mass media, personal networks, and individual decision-making. …”
    Get full text
    Article
  16. 3836

    Review of Digital Construction of UHV Projects Based on Building Information Modeling Technology by QI Lizhong, LIU Ding, ZHANG Zhuoqun, XIE Rongzhen, RONG Jingguo, ZHANG Su, YUAN Bo, SUN Yi

    Published 2025-02-01
    “…As major national infrastructure projects, UHV projects are key to ensuring power grid security, promoting energy consumption, and optimizing resource allocation. …”
    Get full text
    Article
  17. 3837

    واقع استخدام شبکة التواصل الاجتماعى الفیسبوک فى الأرشیفات الوطنیة العربیة والأجنبیة : دراسة تحلیلیة مقارنة... by د. تفیدة سمیر محمود

    Published 2018-04-01
    “…The study found that the existence of Arabarchives on internet is almost weak, and that some Arab archives do not use themeans of social communication in general due to lack of financial and humanresources and legal risks and security risks.The foreign archives update their face book pages almost daily ,whichmakes it logical to users to visit these pages on a regular basis ,and thecontinuity and updating of the update shows the importance given by the nationalarchives of its presence on face book unlike Arabic archives.The study also found that the Arab archives method is linked to web 1,and that the presence of Arab archives on the social networking site face book isan important presence of existence only on face book and does not reflect thehistorical value found in the Arab national archives.…”
    Get full text
    Article
  18. 3838

    Efficient information exchange approach for medical IoT based on AI and DAG-enabled blockchain by Shanqin Wang, Gangxin Du, Shufan Dai, Mengjun Miao, Miao Zhang

    Published 2025-01-01
    “…The development of artificial intelligence (AI) based medical Internet of Things (IoT) technology plays a crucial role in making the collection and exchange of medical information more convenient. However, security, privacy, and efficiency issues during information exchange have become pressing challenges. …”
    Get full text
    Article
  19. 3839

    analysis the effective factors on the formation of women\'s ideal territory in urban parks (Case study: El Goli, shams , valiasr of Tabriz) by sara ghahri lalaklou, rasool darskhan, mahsa faramarzi asli, morteza mirgholami, samad sabbagh dehkharghani

    Published 2023-09-01
    “…At first at the descriptive level were investigated with subject statistics indicators and then at the inferential level used of exploratory factor analysis to determine the model.the results include 5 influential components.these components are landscape-functional-security-morphology-psychological.…”
    Get full text
    Article
  20. 3840

    La politique nationale de réconciliation et de relocalisation des populations déplacées dans le Liban d’après-guerre by Dima de Clerck

    Published 2022-01-01
    “…Such a policy on a nation-wide scale could only be elaborated and implemented by the state, since it required important financial resources, specific legislation and even security measures. A ministry and a fund for the displaced were created in 1992 to ensure the return of all displaced people in Lebanon. …”
    Get full text
    Article