Showing 4,041 - 4,060 results of 5,943 for search '"security"', query time: 0.11s Refine Results
  1. 4041
  2. 4042

    Multifeature Fusion Detection Method for Fake Face Attack in Identity Authentication by Haiqing Liu, Shiqiang Zheng, Shuhua Hao, Yuancheng Li

    Published 2018-01-01
    “…However, facial recognition has also been subjected to criticism due to security concerns. The main attack methods include photo, video, and three-dimensional model attacks. …”
    Get full text
    Article
  3. 4043

    Un hito jurídico sobre Internet de las Cosas: la Ley de California n° 327 del año 2018 vigente a partir del 1 enero del 2020 by Adriana Margarita Porcelli

    Published 2020-04-01
    “…Resumen El objetivo de este artículo consiste en definir el ecosistema denominado Internet de las Cosas y analizar la Ley de California n° 327 Information privacy: connected devices, publicada el 28 de septiembre de 2018 y agregada a la Sección 1, Parte 4 de la División 3 del Código Civil californiano, bajo el título Title 1.81.26. Security of Connected Devices, y que entró vigencia recién el 1 de enero de 2020. …”
    Get full text
    Article
  4. 4044

    An Anonymous User Authentication with Key Agreement Scheme without Pairings for Multiserver Architecture Using SCPKs by Peng Jiang, Qiaoyan Wen, Wenmin Li, Zhengping Jin, Hua Zhang

    Published 2013-01-01
    “…However, these schemes suffered from certain security problems or their cost consumption exceeded users’ own constrained ability. …”
    Get full text
    Article
  5. 4045

    Forecasting power generation of wind turbine with real-time data using machine learning algorithms by Asiye Bilgili, Kerem Gül

    Published 2024-12-01
    “…The significance of wind energy generation lies in its abundance, environmental benefits, cost-effectiveness and contribution to energy security. Accurate forecasting of wind energy generation is crucial for managing its intermittent nature and ensuring effective integration into the electricity grid. …”
    Get full text
    Article
  6. 4046

    Conceptos para el estudio del agro latinoamericano: campesinos y agricultores familiares by Eloy Gómez-Pellón

    Published 2025-01-01
    “…Family farming plays a crucial role in surplus production, food security, environmental sustainability, and rural employment generation in Latin America, making it an essential area for continued attention and support.…”
    Get full text
    Article
  7. 4047

    Primordial Cause of Armament, Disarmament, Weaponry and Weapons of Mass Destruction by Effiong Ekpo

    Published 2022-11-01
    “… The entirety of humanity has been confronted with a serious threat to security, especially since after the cold war. To this fact, the concept of conflict and peace situate themselves in the heart of the contemporary man. …”
    Get full text
    Article
  8. 4048

    Research on the driving paths of bilateral renewable energy trade between neighboring countries and China from the perspective of behavioral attribution by Zijie Yang

    Published 2025-01-01
    “…Additionally, favorable bilateral political ties, a lower level of nationalism and increased energy security within surrounding nations are critical factors in fostering extensive renewable energy trade with China. …”
    Get full text
    Article
  9. 4049

    Blockchain enabled traceability in the jewel supply chain by Aman Patel, Siva Sai, Ankit Daiya, Harshal Akolekar, Vinay Chamola

    Published 2025-01-01
    “…The system incorporates robust security measures, addressing vulnerabilities such as reentrancy attacks and unauthorized access. …”
    Get full text
    Article
  10. 4050

    Assessment of Record Keeping Practices in Nursing Schools: A Case of Uganda Nursing School-Bwindi. by Gambamazima, Ruth

    Published 2023
    “…Also, at Uganda Nursing School-Bwindi it was revealed that there were numerous instances where important documents and notes were not kept in secure conditions.…”
    Get full text
    Thesis
  11. 4051

    Role of Savings and Credit Cooperatives on Economic Transformation of Societies: A Case Study of Unique SACCO in Kabale Municipality. by Niwamanya, Isaac

    Published 2024
    “…In terms of socio-economic transformation, the study revealed that Unique SACCO contributed to increased income, empowerment of women, food security, enhanced productivity, job creation, improved living standards through loans, community cohesion, and financial advisory services on resource allocation. …”
    Get full text
    Thesis
  12. 4052

    A Bee Farm Records Management System: A Case Study of Kanyabugunga Kashambya Sub-County. by Maanige, Barnet, Tayebwa, Onesmas

    Published 2024
    “…In conclusion, the BFMS has the potential to drive positive change in Uganda's beekeeping sector, contributing to economic development, environmental conservation, and food security. Success hinges on collaboration, user training, and responsiveness to evolving beekeeping needs. …”
    Get full text
    Thesis
  13. 4053

    Design and Simulation of a Solar Thermal Dryer for Fruits. by Amanya, Sylus

    Published 2024
    “…The designed dryer aims to improve food security and reduce waste since there will be reduced post-harvest losses allowing people to preserve fruits for longer periods. …”
    Get full text
    Thesis
  14. 4054

    Effect of Internal Control System on Financial Performance of Savings and Credit Co-Operatives in Kabale Municipality A Case Study of Lyamujungu SACCO Kabale Branch. by Aheisibwe, Joanita

    Published 2024
    “…The study recommended that Lyamujungu SACCO’s management establish robust internal control systems, including comprehensive asset listings, approval processes for capital asset purchases, and asset numbering to facilitate location and security. Management should also enforce adequate organizational controls, clarify staff responsibilities, and maintain effective segregation of duties. …”
    Get full text
    Thesis
  15. 4055
  16. 4056

    Internal Control Systems and service delivery in Kabale Municipal Council, Kabale District, Uganda. by Boaz, Abomugisha

    Published 2020
    “…It is therefore recommended that all stakeholders should follow internal controls put in place for effective and efficient delivery of services, the division of work and segregation of duties should be upheld, Each department should be represented on the procurement committee for transparency purposes; the control environment should be improved by management to allow any stakeholder to access documents, and culprits that breach norms and regulations are found, they should be punished accordingly, Finally the management of the Council should prioritize services which are critical to the public, like Road construction, Waste disposal, Education, Security and Health.…”
    Get full text
    Thesis
  17. 4057

    Financial inclusion: Is it a precursor to agricultural commercialization amongst smallholder farmers in Uganda? A comparative analysis between Lango and Buganda sub-regions by Eton, Marus, Fabian, Mwosi, Mary, Ejang, Sammy, Godfrey Poro

    Published 2021
    “…This paper recommends that, financial service providers should revise their lending terms downwards to reach smallholder farmers, some of whom lack collateral security to pledge for credit. While the government takes credit for improving infrastructure, government, through her policy organs like ministry of agriculture, should provide buffer prices against price fluctuations.…”
    Get full text
    Article
  18. 4058

    Pesticide use in vegetable production in rural Uganda - A case study of Kabale District, South western Uganda by Hannington, Ngabirano, Grace, Birungi

    Published 2021
    “…Therefore, there is need to address the identified knowledge gaps on safer pesticide application in order to attain safe agricultural productivity for sustainable food security, safeguarding human health and community development in Kabale District, Uganda.…”
    Get full text
    Article
  19. 4059

    Googling Patients by Emily Beer

    Published 2022-11-01
    “…Federal Trade Commission, https://www.ftc.gov/business-guidance/privacy-security/health-privacy. [14] “Complying with FTC's Health Breach Notification Rule.” …”
    Get full text
    Article
  20. 4060

    Investigating and prioritizing the factors affecting the success of e-commerce using the best and worst (BWM) technique. by shayan mohammadpour mir, shiba masoumi, seyed mojtaba kavoosi davoodi

    Published 2024-05-01
    “…Effective factors include the components of 1- infrastructure (access to the Internet network, electronic storage of information, security systems and electronic payments), 2- payment system (payment authorization, various customer payment methods, settlement operations), 3- Knowledge and awareness (customer notification system, customer privacy consideration, company's response to customers' frequent questions), 4- Customer satisfaction (variety of products and advertisements, company's seasonal auctions, timely delivery of goods, building trust). …”
    Get full text
    Article