Showing 3,841 - 3,860 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 3841

    Lentil plant disease and quality assessment: A detailed dataset of high-resolution images for deep learning researchMendeley Data by Eram Mahamud, Md Assaduzzaman, Shayla Sharmin

    Published 2025-02-01
    “…By leveraging this dataset, researchers can explore innovative approaches to tackle challenges in lentil farming, contributing to sustainable agricultural practices and food security. Moreover, the dataset serves as a valuable resource for training and testing machine learning algorithms tailored to agricultural settings, facilitating advancements in automated agricultural technologies. …”
    Get full text
    Article
  2. 3842

    Spatio-temporal Distribution Characteristics and Future Trend Analysis of Extreme Climate Indices in Nenjiang River Basin over the Past 60 Years by GONG Xiao, DAI Changlei, LI Shuling, XIAO Yue

    Published 2025-01-01
    “…The study of extreme climate change in the Nenjiang River Basin is of great significance for ensuring ecological security and agricultural production. Based on the observation data such as daily temperature and precipitation from 12 meteorological stations in the Nenjiang River Basin between 1960 and 2020, this paper selects 26 extreme climate indices. …”
    Get full text
    Article
  3. 3843

    Virtual Simulation Design Facing Smart Payment Screen on the Background of Artificial Intelligence by Yan Li, Xiao Wang

    Published 2022-01-01
    “…The design of the smart payment screen makes the user’s payment more secure, and the payment risk is greatly reduced.…”
    Get full text
    Article
  4. 3844

    Drought and Wetness Variability and the Respective Contribution of Temperature and Precipitation in the Qinghai-Tibetan Plateau by Lele Zhang, Liming Gao

    Published 2021-01-01
    “…Quantifying drought and wetness fluctuations is of great significance to the regional ecological environment and water resource security, especially in the fragile Qinghai-Tibetan Plateau (QTP). …”
    Get full text
    Article
  5. 3845

    Hybrid Botnet Detection Based on Host and Network Analysis by Suzan Almutairi, Saoucene Mahfoudh, Sultan Almutairi, Jalal S. Alowibdi

    Published 2020-01-01
    “…Botnet is one of the most dangerous cyber-security issues. The botnet infects unprotected machines and keeps track of the communication with the command and control server to send and receive malicious commands. …”
    Get full text
    Article
  6. 3846

    Solu: a cloud platform for real-time genomic pathogen surveillance by Timo Saratto, Kerkko Visuri, Jonatan Lehtinen, Irene Ortega-Sanz, Jacob L. Steenwyk, Samuel Sihvonen

    Published 2025-01-01
    “…Despite advancements in bioinformatics pipelines, there are still significant challenges in terms of infrastructure, expertise, and security when it comes to continuous surveillance. …”
    Get full text
    Article
  7. 3847

    Gender and affiliation differences in topic selection in U.S. congressional speeches by Lenard Dragana Božić, Omazić Marija

    Published 2018-12-01
    “…The analyses showed that there are overall gender and affiliation differences in topic selection by the male and female politicians in the 113th Congress, some confirming the trend of long-standing prevalence of home-related references in women’s speeches, and death and religion references in men’s speeches, others marking a social shift for some of the categories compared to previous studies on the topic, such as the increasing share of references to work, money achievement in women’s speeches, as well as women’s preference for security, and men’s preference for competitiveness, as signaled by their lexical choices. …”
    Get full text
    Article
  8. 3848

    Prevention or Promotion? Predicting Author's Regulatory Focus by Aswathy Velutharambath, Kai Sassenberg, Roman Klinger

    Published 2023-09-01
    “…For instance, some people seek growth and show eagerness, whereas others prefer security and are vigilant. The concept of regulatory focus is employed in psychology, to explain and predict this goal-directed behavior of humans underpinned by two unique motivational systems – the promotion and the prevention system. …”
    Get full text
    Article
  9. 3849

    Effective Combination of Advancing Transplantation Date with High-Yielding Cultivars for Paddy Rice Could Increase the Yield Potential Under Climate Warming in China by He Zhang, Guangsheng Zhou, Qijin He

    Published 2025-01-01
    “…Rice is one of the main grains in the world, the stability of its production and supply is directly related to global food security. Based on field observation data from 2000 to 2012 and a biophysical process-oriented CERES-Rice crop model at three typical sites, we investigated the effects of cultivar improvement, different transplanting dates and their interactions on rice yield potential in the major paddy rice production areas of China. …”
    Get full text
    Article
  10. 3850

    Re-Analyzing of Consequences and Methods of Climatological Changes Managements (Case Study: Iran’s Central Basin) by Sadegh Karami

    Published 2020-12-01
    “…Human beings can only provide security and the community with knowledge and management against its negative consequences. …”
    Get full text
    Article
  11. 3851

    Adversarial detection based on feature invariant in license plate recognition systems by ZHU Xiaoyu, TANG Peng, ZHANG Haochen, QIU Weidong, HUANG Zheng

    Published 2024-12-01
    “…The presence of adversarial samples poses a significant threat to the application of deep neural networks, especially in security-sensitive scenarios like license plate recognition systems. …”
    Get full text
    Article
  12. 3852

    “NEW PERIPHERY” AS A FACTOR FOR STRENGTHENING THE POSITIONS OF ISRAEL IN THE MIDDLE EAST by Y. I. Kostenko

    Published 2016-04-01
    “…The "periphery doctrine" was a grand strategy, meant to attain the major political-security goal of countering Arab hostility through relations with alternative regional powers and potential allies. …”
    Get full text
    Article
  13. 3853

    Europol’s Counter-Terrorism Role: over 25 Years of Partnership by Antonio Ortiz

    Published 2024-10-01
    “…Value: The value of this article lies in its practical insights offering an internal perspective from a seasoned security practitioner focusing on operational and institutional realities as opposed to theoretical frameworks. …”
    Get full text
    Article
  14. 3854

    Interest Rate and Loan Portfolio Performance of Commercial Banks in Uganda: Case of Stanbic Bank. by Mwebesa, Samson

    Published 2023
    “…The findings show that the effect of prime lending on loan portfolio performance is that Central bank rate and collateral security have non-significant effects on loan portfolio performance. …”
    Get full text
    Thesis
  15. 3855

    Is Aquaculture a Success? Evidence from Africa by Okoth, Sharon, Hounsounou, Hilda R.B., Turyasingura, Benson, Moenga, Kelvin O., Mwalughali, Thoko B. S., Lubembi, Sharon Indasi

    Published 2023
    “…Since its introduction in Africa, however, changes have been seen as it has contributed to food security and malnutrition and improved livelihoods by creating jobs and generating income. …”
    Get full text
    Article
  16. 3856

    The Effect of Poverty on The Social Welfare of Households in Kyanamira Sub-County Kabale District. by Natukunda, Barnabas

    Published 2023
    “…The study concluded by recommending a multifaceted approach. including income diversification, improved education 11ccess, healthcare infrastructure enhancement, targeted food security interventions, and vocational training to empower youth and enhance employment opportunities. …”
    Get full text
    Thesis
  17. 3857

    INSTITUTIONAL INNOVATIONS AND FINANCIAL INCLUSION AMONG RURAL HOUSEHOLDS IN UGANDA, by moses Agaba

    Published 2024
    “…As more clients choose mobile banking, the report advises banking institutions to develop measures to improve security in the platform. The report also advises making these platforms straightforward and simple to use in order to attract more users to the business. …”
    Get full text
    Article
  18. 3858

    Motivation and Employee Performance in Local Governments: A Case Study of Kanungu District Local Government Headquarters. by Kukunda, Right

    Published 2024
    “…The research results revealed that the motivation tools in use in Kanungu District Local Government Headquarters are salary and benefits, rewards and motivation, opportunities for growth and development, job security, supportive work environment, valuable feedback, appraisal, and appreciation. …”
    Get full text
    Thesis
  19. 3859

    Design of Coffee Disease Detection Web Application Using Image Processing: A Case Study of Kyabugimbi-Kajunju Cooperative Farms in Bushenyi District. by Asiimwe, Mark, Kakuru, Ambrose

    Published 2024
    “…The significance of this research extends to the broader field of precision agriculture, showcasing the potential of technology to enhance crop health and contribute to global food security.…”
    Get full text
    Thesis
  20. 3860

    An Automated Voice Control Home System Using Arduino and Bluetooth Module Hc-05. by Abamwesiga, Bless, Tumwekwatse, Armson

    Published 2024
    “…Also, it suggests that Google Cloud Messaging be integrated to control our lighting system from the Internet as well as introduce security-sensitive functionality on the voice application.…”
    Get full text
    Thesis