Showing 3,941 - 3,960 results of 5,943 for search '"security"', query time: 0.05s Refine Results
  1. 3941
  2. 3942

    Lactic Acid Bacteria from African Fermented Cereal-Based Products: Potential Biological Control Agents for Mycotoxins in Kenya by Eliud N. Wafula, Christabel N. Muhonja, Josiah O. Kuja, Eddy E. Owaga, Huxley M. Makonde, Julius M. Mathara, Virginia W. Kimani

    Published 2022-01-01
    “…Cereals play an important role in global food security. Data from the UN Food and Agriculture Organization projects increased consumption of cereals from 2.6 billion tonnes in 2017 to approximately 2.9 billion tonnes by 2027. …”
    Get full text
    Article
  3. 3943

    Parish revival in Southern Russia in the context of revolutionary upheavals and the Civil War by Yu. A. Biryukova

    Published 2023-09-01
    “…Its functions were to be extended to the level of a grass-roots zemstvo, to ensure the legal and economic security of the parishioners, and to influence the surrounding society.…”
    Get full text
    Article
  4. 3944

    Protection System Design of Induction Motor for Industries by Shoaib Shaikh, Dileep Kumar, Abdul Hakeem, Arsalan Muhammad Soomar

    Published 2022-01-01
    “…Providing industrial motors, pumps, lift motors, and other similar devices with security is a major motivation behind the emergence of this issue. …”
    Get full text
    Article
  5. 3945

    Legal Regulation of Spreading Opinions and Beliefs through TV Broadcasting by S. A. Kucher

    Published 2021-07-01
    “…It has been stated that the right to information may be limited by law in the interests of national security, territorial integrity or public morality. …”
    Get full text
    Article
  6. 3946

    Authenticity" About Ferdowsi Neighborhoods Of Tehran with Historical Textures with the Phenomenological Approach by Samaneh Dousti, Zohreh Davoudpour, Leila Zare

    Published 2021-09-01
    “…Urban neighborhoods are one of the vital elements of each city and the culture of urban residents is concealed in the texture and sinew of that .The advent of new technologies in urban life and percipitance of designers for construction of buildings led to reduce of fixation sense about their living environment and decrease social interaction. once the historical districts are regarded as symbols of security, comfort and authenticity of the residents, due to inefficiency and interruption of their structures, suffer instability and displacement of their residents.According to this, instability and displacement of inhabitants to districts of historical value are known as the main problem in these neighborhoods. …”
    Get full text
    Article
  7. 3947

    Traffic Anomaly Detection Algorithm for Wireless Sensor Networks Based on Improved Exploitation of the GM(1,1) Model by Qin Yu, Jibin Lyu, Lirui Jiang, Longjiang Li

    Published 2016-07-01
    “…Because worms, attacks, intrusions, and other kinds of malicious behaviors can be recognized by traffic analysis and anomaly detection, WSN traffic anomaly detection provides useful tools for timely reaction and appropriate prevention in network security. In the paper, we improve exploitation of GM(1,1) model to make traffic prediction and judge the traffic anomaly in WSNs. …”
    Get full text
    Article
  8. 3948
  9. 3949

    A Miniature and Low-Power-Consumption Stress Measurement System for Embedded Explosive in Multilayer Target Penetration by Yu Hang, Fei Shang, Shang Gao, Deren Kong, Xuehui Zhang

    Published 2020-01-01
    “…When a penetrator penetrates a target, security issues such as detonation and deflagration sometimes occur in the embedded explosive under an extreme environment with high overload and severe mechanical shock. …”
    Get full text
    Article
  10. 3950

    Acceptability of improved cook stoves-a scoping review of the literature. by Bipin Adhikari, Sophie Suh Young Kang, Aaryan Dahal, Salum Mshamu, Jacqueline Deen, Christopher Pell, Lorenz von Seidlein, Jakob Knudsen, Thomas Chevalier Bøjstrup

    Published 2025-01-01
    “…Sustained use of ICS depended on fuel supply, fuel security and policies promoting its use. Policies offering subsidies in support of supply-chain garnered institutional trust among community members and resulted in the sustained use of ICS. …”
    Get full text
    Article
  11. 3951

    SHADOW GLOBALIZATION by L. M. Kapitsa

    Published 2014-06-01
    “…Some of the world development trends been observed over the past years raise serious concerns about the security and welfare of the peoples of the world. One of such trends has been the globalization of shadow economic activities. …”
    Get full text
    Article
  12. 3952

    Detection of network intelligence features with the decision tree model by N. P. Sharaev, S. N. Petrov

    Published 2022-03-01
    “…Early detection of network intelligence allows to reduce the risks of information security of organizations. The study was carried out to develop software module for detecting the features of network intelligence by machine learning methods.M e t h o d s . …”
    Get full text
    Article
  13. 3953

    Condition Recognition of High-Speed Train Bogie Based on Multi-View Kernel FCM by Qi Rao, Yan Yang, Yongquan Jiang

    Published 2019-03-01
    “…Monitoring the operating status of a High-Speed Train (HST) at any moment is necessary to ensure its security. Multi-channel vibration signals are collected by sensors installed on bogies and beneficial information are extracted to determine the running condition. …”
    Get full text
    Article
  14. 3954
  15. 3955

    Effect of Moisture on the Macro Failure Characteristics of Weakly Consolidated Mudstone: Mesomechanism by Jiahui Xu, Guichen Li, Haoyu Rong, Mohamed Elgharib Gomah, Changlun Sun, Jinghua Li, Suhui Zhang

    Published 2022-01-01
    “…Mudstone, whose significant characteristic is water-weakening, widely exists in all kinds of geotechnical engineering, which brings great security risks to engineering safety. In this paper, through a series of macro and meso test methods, the macro and meso action mechanism of water on the weakly consolidated plane of mudstone was studied. …”
    Get full text
    Article
  16. 3956

    Russian-тajik cooperation as a factor of stability in Central Asia (1992– 2022) by T. K. Tursunov, S. V. Novikov

    Published 2022-12-01
    “…This position meets the national interests not only of both countries, but also of the Central Asian states, guaranteeing their security and stability.…”
    Get full text
    Article
  17. 3957

    Leveraging Social Engineering Techniques for Ethical Purposes:  An Approach to Develop Fake Android App for Collecting Valuable Data Discreetly by Hussein Abdulkhaleq Saleh alsharya

    Published 2024-09-01
    “…However, these techniques can also be utilized ethically, as many cybersecurity professionals do, particularly when evaluating vulnerabilities and testing security defenses. This paper presents EDC (Ethical Data Collector), an Android application that utilizes social engineering techniques to discreetly collect valuable data from an Android device for ethical purposes. …”
    Get full text
    Article
  18. 3958

    The interplay of perceived benefit, perceived risk, and trust in Fintech adoption: Insights from Sub-Saharan Africa by Thomas Appiah, Veronica Venyo Agblewornu

    Published 2025-01-01
    “…Conversely, perceived legal risk, security risk, and privacy concerns act as significant inhibitors of Fintech adoption. …”
    Get full text
    Article
  19. 3959

    Hydrological drought in the lower reaches of the Yangtze River (China): a 70-year data analysis by Hua Ge, Hua Ge, Lingling Zhu, Bing Mao, Bing Mao

    Published 2025-02-01
    “…The combined impact of climate change and human activity has brought uncertainty regarding hydrological drought in the lower reaches of the Yangtze River (LYR), thereby threatening the security of regional water resources. To address this uncertainty, based on data from over 70 years, the trends, mutations, and causes of hydrological drought in the LYR were analyzed using the Mann–Kendall test method. …”
    Get full text
    Article
  20. 3960

    Operating Thermal Power Plants Efficiency Improvement under Current Conditions by V. V. Yanchuk, V. N. Romaniuk

    Published 2022-12-01
    “…In the limit, the share of natural gas in the incoming part of the energy balance should be reduced to values not exceeding 50 %, in accordance with the requirements of energy security. The article considers examples of utilization of low-temperature secondary energy flows occurring at thermal power plants: the heat of the cooling processes of the generator, lubrication systems, as well as the heat of condensation of turbine exhaust steam and deeper cooling of flue gases. …”
    Get full text
    Article