Showing 3,861 - 3,880 results of 5,943 for search '"security"', query time: 0.10s Refine Results
  1. 3861

    Rural Women’s Cooperatives and Family Standard of Living in Rwanda: A case of Urugero Cooperative in Gatsibo District. by Tharcisse, Maniragena

    Published 2020
    “…The study was guided by three specific objectives namely: to study how women cooperatives’ support to farming has improved food production, family nutrition and food security, to explore the role of family and political education supported by cooperatives in women empowerment, community harmony and more accountability by public and community leaders and to investigate the relationship between increase of family assets and rural women’s cooperatives’ support to agriculture, trading and family education in Gatsibo district. …”
    Get full text
    Thesis
  2. 3862
  3. 3863
  4. 3864

    Advanced Automotive Fault Diagnosis : automotive technology : vehicle maintenance and repair / by Denton, Tom

    Published 2017
    Table of Contents: “…In-car entertainment security and communications - 8.9. Diagnostics - ice, security and communications - 8.10. …”
    View in OPAC
    Book
  5. 3865

    Evaluation of Ecological Resilience of Agricultural Ecosystems in Razavi Khorasan Province: Comparison of Integrated and Non-Integrated Ecosystems by Pegah Naghipour, Alireza Koocheki, Mahdi Nasiri mahalati, Soroor Khorramdel

    Published 2025-12-01
    “…The intensification of climate change caused by global warming and its consequences, including the occurrence of long droughts, floods and other natural disasters, have threatened the food security of subsistence farmers and smallholders in the first place, and the food security of large communities in the long run. …”
    Get full text
    Article
  6. 3866

    A Model for Bank Management Performance Appraisal with the Advanced Technologies Approach (Meta-Synthesis Method) by Ehsan Kiani Ghalehno, Habibollah Salarzehi, Bahareh Naseri, Abdolali Keshtegar

    Published 2024-12-01
    “…The growth of knowledge and information technology security are increasing in developing countries because information and communication technology (ICT) plays a vital role in globalized economic scope. …”
    Get full text
    Article
  7. 3867

    Pengaruh Metode Pendidikan Sebaya terhadap Tingkat Pengetahuan Tentang Pemeriksaan Payudara Sendiri (SADARI) Pada Remaja Putri Di SMA Negeri 1 Kubu by Ni Putu Eka Wijayanti, Made Ririn Sri Wulandari, Luh Putu Widiastini

    Published 2022-10-01
    “…The population of this study were young women who activly members of the Student Union and School Security Patrol namely 41 young women. Taking samples using total sampling, so amounted to 41 young women. …”
    Get full text
    Article
  8. 3868

    Metabolomics profiling reveals p-aminobenzoic acid enhances resistance to Fusarium head blight in wheat by Yiluo Tan, Kangjun Wang, Mingming Guo, Guangxu Zhang, Xiaofeng Li, Yijun Shi, Maosheng He, Dayong Xu, Feng Chen, Jiwei Fan

    Published 2025-02-01
    “…Abstract Fusarium head blight (FHB) not only causes severe yield losses but also mycotoxin contamination in wheat, posing a serious threat to food security and public health. The mechanisms of resistance to FHB in wheat are critical for effective prevention and control of the pathogen. …”
    Get full text
    Article
  9. 3869

    A Review of Multi-Source Data Fusion and Analysis Algorithms in Smart City Construction: Facilitating Real Estate Management and Urban Optimization by Binglin Liu, Qian Li, Zhihua Zheng, Yanjia Huang, Shuguang Deng, Qiongxiu Huang, Weijiang Liu

    Published 2025-01-01
    “…We found that multi-source data, including sensors, social media, citizen feedback, and GIS data, face challenges such as data quality and privacy security when being fused. Data fusion algorithms are diverse and have their own advantages and disadvantages. …”
    Get full text
    Article
  10. 3870

    The Implementation of Unified Application Data Collection and Analysis in Tobacco Enterprise Platform Design by Yong Jin, Weidong Lou

    Published 2022-01-01
    “…Based on the unified mobile application data collection method, this paper analyzed and analyzed the design of application architecture in the tobacco enterprise platform and further described the business functions, security performance, and system characteristics of the platform.…”
    Get full text
    Article
  11. 3871

    Legal principles of international cooperation of the National Police of Ukraine with foreign law enforcement agencies by V. V. Pylyp

    Published 2023-12-01
    “…Law enforcement activity is no exception, since its effective implementation is a guarantee for ensuring the formation of a security space both on the territory of the state and on its borders. …”
    Get full text
    Article
  12. 3872

    The Dietary Use of Pigeon Pea for Human and Animal Diets by Belete Kuraz Abebe

    Published 2022-01-01
    “…Huth] plays an important role in preserving poor smallholders’ major source of income in the tropics and subtropics by improving food and feed security, particularly protein intake. In the meantime, protein deficiency is frequent in tropical and subtropical regions due to rapidly increasing human populations and the high cost of animal-origin proteins. …”
    Get full text
    Article
  13. 3873

    Blinding HT: Hiding Hardware Trojan signals traced across multiple sequential levels by Ying Zhang, Minghui Ge, Xin Chen, Jiaqi Yao, Zhiming Mao

    Published 2022-01-01
    “…However, there may be Hardware Trojans (HTs) in IP cores, which will cause critical security problem. There are already many HT detection methods which claim to detect all publicly available HT benchmarks. …”
    Get full text
    Article
  14. 3874

    Research Methodology and Management on Transport: Main Issues at the Final Stage of Russian Transport Sector Reforms by V. A. Persianov, A. A. Stepanov, T. M. Gainochenko

    Published 2017-09-01
    “…It includes substantive formulation of scientific problems, the tracking and proactive evaluation of negative trends from the point of view of economic and national security in the transport of modern Russia. banking crises have serious consequences for the economy. …”
    Get full text
    Article
  15. 3875

    Enhancing the Spatial Resolution of Sentinel-2 Images Through Super-Resolution Using Transformer-Based Deep-Learning Models by Alireza Sharifi, Mohammad Mahdi Safari

    Published 2025-01-01
    “…Satellite imagery plays a pivotal role in environmental monitoring, urban planning, and national security. However, spatial resolution limitations of current satellite sensors restrict the clarity and usability of captured images. …”
    Get full text
    Article
  16. 3876
  17. 3877

    MEDIA IN AN ERA OF DIGITAL GLOBALIZATION: THE ETHICAL PERSPECTIVES by GABRIEL T. NYITSE, STEPHEN WANG

    Published 2024-07-01
    “…One of the primary ethical concerns in the digital age is the safeguarding of individual privacy and data security. The collection, storage, and utilization of personal data by corporations, governments, and online platforms have raised significant ethical dilemmas. …”
    Get full text
    Article
  18. 3878

    Conceptual basis of international jurisdiction by N. Yu. Rubanenko

    Published 2024-06-01
    “…These concepts reflect the goal of international criminal justice, which is the inevitability of punishment for serious violations of international law, since their commission threatens the security of all humanity.…”
    Get full text
    Article
  19. 3879

    Research on Public Administration and Resource Allocation Based on Blockchain and Structured Occupational Therapy by Qiyou Zhu

    Published 2022-01-01
    “…On the basis of summarizing and analyzing the previous published literatures, this study expounded the research status and significance of public administration and resource allocations; elaborated the development background, current status and future challenges of blockchain, and structured occupational therapy; introduced the methods and principles of data quality collaboration model and multiparty collaboration standard management; analyzed the case background of public administration and resource allocation in the prevention and control of the COVID-19 epidemic; discussed the public administration mechanism based on blockchain and structured occupational therapy; established a resource allocation method based on blockchain and structured occupational therapy; fathomed the role of the distributed ledger established by blockchain to increase the information symmetry of public administration activities; proposed a blockchain-established special machine trust for resource allocation; and finally, anatomized the data security sharing and access control mechanism based on blockchain and structured occupational therapy. …”
    Get full text
    Article
  20. 3880

    The role of religious brand community support to increase value co-creation in market religio-centric by Ken Sudarti, Hendar Hendar, Nabila Tharrazana

    Published 2024-06-01
    “…This study found that the role of RBCS in forming ethical perceptions regarding online shops can provide a sense of security, keep promises, and provide good service recovery. …”
    Get full text
    Article