Showing 3,901 - 3,920 results of 5,943 for search '"security"', query time: 0.08s Refine Results
  1. 3901

    THE FORMATION OF THE ENVIRONMENTAL AGENDA OF THE UNITED NATIONS GENERAL ASSEMBLY (1946-2016) by E. A. Bliznetskaya, E. P. Vasilenko

    Published 2018-11-01
    “…Also, we identified the issues underlying the formation of the environmental agenda of the General Assembly, namely international security issues related to nuclear weapons and economic development. …”
    Get full text
    Article
  2. 3902

    Enhancing urban agriculture networks: A clustering and multicriteria decision-making approach to sustainability indicators and governance by Jiangwei Kong, Mengxi Gao, Hind Alofaysan, Dilafruz Fayziyeva, Zhi Liu

    Published 2025-01-01
    “…This research highlights food security via an urban agricultural network in the larger Miami metropolitan region, which includes Palm Beach, Broward, and Miami-Dade counties. …”
    Get full text
    Article
  3. 3903

    A Multilevel Analysis of Farmers’ Adoption of Water-saving Irrigation Technology: Evidence From the North China Plain by Yibei Guo, Kunpeng Zhang, Xiaohu Jia

    Published 2025-01-01
    “…Agricultural water scarcity poses a significant threat to food security and sustainable development. Farmers’ adoption of agricultural water-saving irrigation technologies (WSIT) is essential for addressing this challenge. …”
    Get full text
    Article
  4. 3904

    A Machine Learning-Based Platform for Monitoring and Prediction of Hazardous Gases in Rural and Remote Areas by Edgar F. Ladeira, Bruno M. C. Silva

    Published 2025-01-01
    “…In these areas, access to security and health services is scarce, and real-time monitoring of citizens and the conditions in which they live is very difficult. …”
    Get full text
    Article
  5. 3905

    Efficiency of Semantic Web Implementation on Cloud Computing: A Review by Kazheen Ismael Taher, Rezgar Hasan Saeed, Rowaida Kh. Ibrahim, Zryan Najat Rashid, Lailan M. Haji, Naaman Omar, Hivi Ismat Dino

    Published 2021-06-01
    “…As a result, issues with portability, interoperability, security, selection, negotiation, discovery, and definition of cloud services and resources may arise. …”
    Get full text
    Article
  6. 3906

    Investigative genetic genealogy practices warranting policy attention: Results of a modified policy Delphi. by Christi J Guerrini, Louiza Kalokairinou, Jill O Robinson, Whitney Bash Brooks, Stephanie M Fullerton, Sara Huston, Jacklyn Dahlquist, Diana Madden, Norah Crossnohere, Nicola Campoamor, John F P Bridges, Amy L McGuire

    Published 2025-01-01
    “…These top priority practices relate to: consent and notification; case eligibility and criteria; data management, privacy, and security; and governance and accountability. Participants expressed a range of opinions, some strongly held, and did not reach complete consensus with respect to any of the practices. …”
    Get full text
    Article
  7. 3907

    ArtDiff: Integrating IoT and AI to enhance precision in ancient mural restoration by Yuhan Yan, Bowen Chai, Jiapeng Li

    Published 2025-01-01
    “…Using real-time environmental and structural health surveillance, in conjunction with security mechanisms, this framework markedly improves precision and efficiency in forecasting and identifying potential risks.Furthermore, in the context of mural restoration, this paper introduces the ArtDiff model. …”
    Get full text
    Article
  8. 3908

    AnomLite: Efficient binary and multiclass video anomaly detection by Anna K. Zvereva, Mariam Kaprielova, Andrey Grabovoy

    Published 2025-03-01
    “…Anomaly detection in video surveillance is critical for ensuring public safety, as manual monitoring of numerous video feeds is often challenging and prone to human error. Security operators can struggle to maintain focus over prolonged periods, leading to missed events or delayed responses. …”
    Get full text
    Article
  9. 3909

    PERGULATAN MAHASISWI BERCADAR DI PERGURUAN TINGGI KEAGAMAAN ISLAM NEGERI DI JAWA TIMUR by Za'imatil Ashfiya

    Published 2022-04-01
    “…Hasil penelitian ini adalah motivasi mahasiswi memakai cadar karena kebutuhan akan rasa aman (need for self-security) dari laki-laki dan kebutuhan untuk dihargai atau dihormati (need for self-esteem). …”
    Get full text
    Article
  10. 3910

    Research on Safety Management Application of Dangerous Sources in Engineering Construction Based on BIM Technology by Langni Deng, Mengjun Zhong, Ling Liao, Lai Peng, Shijin Lai

    Published 2019-01-01
    “…The results show that (1) the security management module created in this paper is highly operational, easy to use, and real-time data update, which has important guiding significance for actual construction safety management; (2) simulation of construction safety accidents through Navisworks software can provide emergency management plans for engineering projects.…”
    Get full text
    Article
  11. 3911

    The Role of Urban Spaces in Improving the Life Quality (A Case Study of Malayer) by Robabeh Rajabi Amirabad, Bijan Rahmani

    Published 2020-09-01
    “…In this regard, the purpose of this study was to investigate the role of Malayer urban spaces in improving the citizen’s life quality including variables such as the quality of facilities in the city, social environmental, economic quality and environmental quality, , security and relaxation, and so on. The method used in this study was a combination of analytical and case-oriented methods. …”
    Get full text
    Article
  12. 3912

    The Debate on the Aesthetics of Business Brand Innovation Among the Millennial Generation for the Issuance of Halal Certification by Haryati Haryati, Heri Junaidi, Sheikh Mohammed Rateb

    Published 2024-12-01
    “…From the same side, the obligation of halal certification is carried out as a form of state effort in providing security for its citizens in consuming food. Between the two understandings, literacy is needed for the millennial generation where certification and labeling of halal products based on protection, fair value, definite legal value, responsibility and openness, effective and efficient, and competent have implications for public comfort in consuming food for food that is proven to be halal. …”
    Get full text
    Article
  13. 3913

    North American Integration after 20 Years by G. M. Kostyunina

    Published 2015-04-01
    “…So, in 2000, there was put forward the concept of creating the North American community as an economic and security community by 2010, and in 2005 proposed the idea of a common currency called the Amero. …”
    Get full text
    Article
  14. 3914

    Is It Matters to Have a Higher Education for the Young People Behavior on the Internet? by G. F. Gabdrakhmanova

    Published 2024-10-01
    “…Sources of the study: a sociological survey of young people in 8 federal districts of Russia conducted in 2023, data from analytical companies subjected to secondary assessment, materials from official statistics.Education is the third most important factor influencing the digital inequality of Russian youth, two other reasons are behind – place of residence and material security. Higher education maintains its position in ensuring the digital competence of young people. …”
    Get full text
    Article
  15. 3915

    Utilizing hydrophobic sand to construct an air permeable aquiclude to enhance rice yields by Jing Wu, Xiaoyan Ma, Yuming Su, Shengyi Qin, Francesco Pilla

    Published 2025-01-01
    “…Abstract The Chinese government attaches great importance to the ecological restoration of abandoned open-pit mines, increasing the area of cultivated land, and ensuring food security. Soil reconstruction is a crucial step in ecological restoration of abandoned open-pit mines. …”
    Get full text
    Article
  16. 3916

    JAPANS’S CHINA STRATEGY by A. A. Kireeva

    Published 2013-10-01
    “…The early 2010s have seen Japan’s China strategy increasingly transforming into balancing and containment influenced by Japan’s growing perception of China’s maritime activities in the East China Sea as a threat to its security. However, there is growing possibility of adopting a “dual hedging” strategy, as China is first of all regarded as the key economic partner for Japan’s successful development.…”
    Get full text
    Article
  17. 3917

    Importance Analysis of Causative Nodes for Accident Chains of Railway Locomotive Operation Based on STPA-PageRank Method by Ping WAN, Wei-Lun YANG, Jie-Wen LUO, Xiao-Feng MA

    Published 2025-02-01
    “…For those nodes with high value of PageRank, some targeted security measures should be adopted, so as to save risk management investment and improve the overall safety level of the locomotive operation system.…”
    Get full text
    Article
  18. 3918

    System Design of an Online Marketplace Towards the Standardisation of Sustainable Energy Efficiency Investments in Buildings by Ioanna Andreoulaki, Aikaterini Papapostolou, Daniela Stoian, Konstantinos Kefalas, Vangelis Marinakis

    Published 2025-01-01
    “…The paper focuses on the functional description of the system design of the ENERGATE platform by defining the architecture, components, modules, interfaces, and structured data, as well as highlighting the requirements of potential platform users and design principles to meet the necessary requirements while ensuring security, reliability, and effectiveness.…”
    Get full text
    Article
  19. 3919

    Function of boundary rivers in hydropolitics cooperation:Danube river study by Murad Kaviani Rad, Afshin Motaghi Disfani, Hossein Mokhtari Hashi, Ahmad Rashidinejad

    Published 2022-09-01
    “…The current research is a descriptive-analytical research and by means of library resources and examining the practical status of cooperation in a part of the Danube River as a model, concluded that cooperation was not just for water agreements and factors such as environmental concerns, regional security, regional benefits (such as joining organizations and ::union::s), mediation (governments, international organizations, and institutions), etc., are effective in this process.…”
    Get full text
    Article
  20. 3920

    A Lightweight Anti-Unmanned Aerial Vehicle Detection Method Based on Improved YOLOv11 by Yunlong Gao, Yibing Xin, Huan Yang, Yongjuan Wang

    Published 2024-12-01
    “…Research on anti-UAV (anti-unmanned aerial vehicle) detection techniques is essential, since the widespread use of UAVs, while improving convenience, poses several hidden risks to privacy, security, air control, etc. This paper focuses on the challenges of long-distance UAV identification and proposes a lightweight anti-UAV detection method based on improved YOLOv11. …”
    Get full text
    Article