Showing 4,061 - 4,080 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 4061
  2. 4062

    The Management of Social Phobia Ýn Residual-Type Schizophrenia with Cognitive Behavioral Therapy by Elif Þimþek Kaygusuz, Filiz Civil Arslan, Gizem Güneþ

    Published 2015-04-01
    “…To this end, firstly coping mechanisms are examined through the identification of avoidance and security providers, and then, the patient’s automatic thoughts and false beliefs are discussed depending on the cognitive perspective. …”
    Get full text
    Article
  3. 4063

    Strategic Partnership between India and the United States: Examining Driving and Restraining Forces by O. Leonova, J. Khatri

    Published 2023-07-01
    “…Conversely, factors stimulating the growth of the strategic partnership encompass India's robust economic growth, its potential role as a counterbalance to China's expanding influence in Asia, shared interests in maintaining peace and stability in the Indo-Pacific region, mutual concerns about regional security, recent progress in nuclear policy agreements, and expanding avenues for cooperation in diverse domains. …”
    Get full text
    Article
  4. 4064

    The U.S.-Turkey ‘Model Partnership’: Testing the Limits (2009–2010) by A. I. Aliyeva

    Published 2020-11-01
    “…The conclusion is drawn that a further escalation of tensions was prevented mainly because security factor played a predominant role. The U.S.…”
    Get full text
    Article
  5. 4065

    E-Commerce Fraud Detection Based on Machine Learning Techniques: Systematic Literature Review by Abed Mutemi, Fernando Bacao

    Published 2024-06-01
    “…To establish a healthy e-commerce ecosystem, robust cyber security and anti-fraud measures are crucial. However, research on fraud detection systems has struggled to keep pace due to limited real-world datasets. …”
    Get full text
    Article
  6. 4066

    LKM: A LDA-Based -Means Clustering Algorithm for Data Analysis of Intrusion Detection in Mobile Sensor Networks by Yuhua Zhang, Kun Wang, Min Gao, Zhiyou Ouyang, Siguang Chen

    Published 2015-10-01
    “…Intrusion detection system (IDS) is a kind of active network security technology to protect network from attacks. …”
    Get full text
    Article
  7. 4067

    Changes in Antioxidant and Photosynthetic Capacity in Rice Under Different Substrates by Hang Zhou, Liming Zhao, Yiwen Song, Xiaole Du, Jingxin Huo, Wanqi Mei, Xi Wang, Naijie Feng, Dianfeng Zheng, Zhaohui Wu

    Published 2025-01-01
    “…Against the backdrop of a changing global climate, the soil environment may undergo significant changes, directly affecting agricultural productivity and exacerbating global food security issues. Three different substrates were set up in this study, namely, S (high sand and low nutrient content), T (medium sand and medium nutrient content), and TT (low sand and high nutrient content). …”
    Get full text
    Article
  8. 4068

    Machine Learning-Based Offloading Strategy for Lightweight User Mobile Edge Computing Tasks by Shuchen Zhou, Waqas Jadoon, Junaid Shuja

    Published 2021-01-01
    “…The anomaly detection method based on a decision tree combined with deep learning proposed in this paper, unlike traditional IoT attack detection methods, overcomes the drawbacks of rule-based security detection methods and enables them to adapt to both established and unknown hostile environments. …”
    Get full text
    Article
  9. 4069

    Invisible Scout: A Layer 2 Anomaly System for Detecting Rogue Access Point (RAP) by Diki Arisandi, Nazrul M. Ahmad, Subarmaniam Kannan

    Published 2025-02-01
    “…Rogue Access Points (RAPs) pose a significant security threat by mimicking legitimate Wi-Fi networks and potentially compromising sensitive data. …”
    Get full text
    Article
  10. 4070

    Opportunities to use the EU countries experience in the field of preventive police activities in Ukraine by O. Yu. Prokopenko, D. O. Bulatin, R. O. Kushnirenko

    Published 2021-12-01
    “…Focusing on the European experience of preventive activity, the author emphasizes that there are three models of internal security in the European Union, and then reveals the content of each model. …”
    Get full text
    Article
  11. 4071

    Analysis of the influence factors of cultivated land transfer in Guangdong coastal important agricultural areas based on geodetectors by Zhaogang Fu, Zhaogang Fu, Qingyi Xue

    Published 2025-02-01
    “…IntroductionsAs a key link in the development of modern agriculture, the transfer of arable land is regarded as a strategic measure to improve agricultural production efficiency and ensure national food security. Although the transfer of arable land has been widely implemented nationwide, its specific impact on agricultural production and farmers’ income varies in different regions. …”
    Get full text
    Article
  12. 4072

    Climate change-driven shifts in the global distribution of tomato and potato crops and their associated bacterial pathogens by Muhammad Hubab, Niloufar Lorestani, Rogayah Akram Mheisin Al-Awabdeh, Farzin Shabani

    Published 2025-01-01
    “…Future efforts should focus on vulnerable areas to prevent significant economic losses and ensure food security.…”
    Get full text
    Article
  13. 4073

    Strategies for Mainstreaming Edible Cities with Focus on the City of Lincoln: A Critical Cross-Case Study Analysis of Community Growing Groups in the UK by Hannah Williams, Amira Elnokaly

    Published 2025-01-01
    “…This paper examines the role of edible city (EC) initiatives in addressing these challenges by enhancing food security, fostering social resilience and supporting community wellbeing. …”
    Get full text
    Article
  14. 4074
  15. 4075

    Folie a Deux: Shared Psychotic Disorder in a Medical Unit by Saumya Bhutani, Damir Huremovic

    Published 2021-01-01
    “…The patient was seen making statements that she needed security and the FBI to escort her as she left the hospital. …”
    Get full text
    Article
  16. 4076

    Research and Implementation of SVDU Simulator Based on Emulation Technology by Yanqun Wu, Mingxing Liu, Qi Chen, Xu Zhang, Xufeng Tian, Yu Zhang, Meiyuan Chen

    Published 2021-01-01
    “…With the development of multiple engineering application requirements, such as configuration verification and operator training, this stimulator has been applied in several virtual security level DCS projects.…”
    Get full text
    Article
  17. 4077

    Dimensions of Poverty and the Internal Relationship of Its Components with an Interpretive Structural Approach in the Imam Khomeini Relief Committee of Tabriz Metropolis by mehrdad Mohamadpour shatery, hoshang taghizadeh, sahar Khoshfetrat

    Published 2024-09-01
    “…These 14 factors are important in order of importance: 1- Economic; 2- Social; 3- Individual; 4- Legal; 5- Family; 6; Environment; 7; Political; 8; Management; 9; Cultural; 10- Overseas; 11. Security; 12. Scientific; 13. Organizational; 14. Geographical. …”
    Get full text
    Article
  18. 4078

    Comparison of breastfeeding self-efficacy between exclusive and non-exclusive breastfeeding in postpartum women by Parvaneh Sarparastrazmju

    Published 2024-08-01
    “…Methods: This descriptive comparative study was conducted on 228 women hospitalized in the Social Security Hospital of Zahedan who had given birth 24 hours earlier. …”
    Get full text
    Article
  19. 4079

    Future Studies of Tourism Development Planning (Case study: Ardabil province) by hossein nazmfar, ameneh alibakhshi

    Published 2021-12-01
    “…In the second step, using the Micmac method, 14 key Factors, including the comprehensive tourism plan, the media, stimulus policies, macro policies of the state, distribution of facilities, infrastructure, recreational centers, increased private incentive to invest in the region, the region's susceptibility to Investment in tourism, planning, security facilities, budget, the existence of hot and mineral water springs, improvement of information systems, such as site and blog, have been identified as key to the development of Ardebil province. …”
    Get full text
    Article
  20. 4080