Showing 4,121 - 4,140 results of 5,943 for search '"security"', query time: 0.05s Refine Results
  1. 4121

    AFD and chaotic map‐based integrated approach for ECG compression, steganography and encryption in E‐healthcare paradigm by Neetika Soni, Indu Saini, Butta Singh

    Published 2021-07-01
    “…Later, chaotic map‐based steganography and encryption are proposed on the AFD coefficients to secure the confidential information and the signal itself. …”
    Get full text
    Article
  2. 4122
  3. 4123

    Challenges of environmental and climate change: response of Global South (BRICS) countries by Z.T. Rahman, R. Lal, R. Rena

    Published 2024-12-01
    “…Strict measures such as planting trees, prohibiting the chopping down of trees and clearing jungles, prohibiting the demolition of mountains, creating space for playgrounds, addressing issues with air and water pollution, and addressing noise pollution are necessary to ensure the security of the future, are required to take. As with the growth and development due to urbanization, pollution of various kinds has reached great heights and coping with these challenges has become difficult for every living being, that is, both plants and animal kingdom. …”
    Get full text
    Article
  4. 4124

    The target of a crime under the Article 330 of the Criminal Code of Ukraine by V. Yu. Boichuk

    Published 2018-12-01
    “…They are as follows: 1) this information is obtained by authorized subjects in specific areas of social activity – within operative and search, counterintelligence operations, in the defense field of the country; 2) such information has limited access; 3) its disclosure may harm the public interest in the field of counteracting crime or within intelligence activities to the detriment of the state security of Ukraine and the country’s defense capabilities; 4) the assignment of information to such that constitutes official information, is carried out by the state authorities, which conduct operative and search or counterintelligence operations, as well as state agencies, local self-government agencies, enterprises, institutions and organizations in the defense field of the country; it is approved by their regulatory act; 5) documents or other material carriers containing official information are assigned the stamp “For official use”. …”
    Get full text
    Article
  5. 4125

    WGAN-DL-IDS: An Efficient Framework for Intrusion Detection System Using WGAN, Random Forest, and Deep Learning Approaches by Shehla Gul, Sobia Arshad, Sanay Muhammad Umar Saeed, Adeel Akram, Muhammad Awais Azam

    Published 2024-12-01
    “…The rise in cyber security issues has caused significant harm to tech world and thus society in recent years. …”
    Get full text
    Article
  6. 4126

    A Solar Photovoltaic Performance and Financial Modeling Solution for Grid-Connected Homes in Zambia by Katundu Imasiku

    Published 2021-01-01
    “…This study conducts a solar photovoltaic performance and financial analysis for grid-connected homes in Zambia to investigate the role of solar energy as an enabler for energy security in Zambia using the National Renewable Energy Laboratory (NREL) System Advisor Model (SAM) simulation method. …”
    Get full text
    Article
  7. 4127

    Multivariate analysis of long-term climate data in connection with yield, earliness and the problem of global warming by V. M. Efimov, D. V. Rechkin, N. P. Goncharov

    Published 2024-04-01
    “…Plant breeding can play a key role in solving food security problems connected with climate changes. Possible measures to adapt plant industry to the ongoing and expected climate changes are discussed. …”
    Get full text
    Article
  8. 4128

    CHANGING ASPECTS OF BAMBARA GROUNDNUT EXPLOITATION: 1. LIMITATIONS AND ALLEYWAYS FOR FUTURE EXPANSION by Elias Mjaika Ndifon, Magaret Chiv, Solomon Hemba Chia

    Published 2024-05-01
    “…Bambara groundnut is an under-exploited legume that has the potential to contribute enormously to food security. It can be used to increase the fertility of the soil leading to high yields of other crops during mixed cropping. …”
    Get full text
    Article
  9. 4129

    Cloud-Based License Plate Recognition: A Comparative Approach Using You Only Look Once Versions 5, 7, 8, and 9 Object Detection by Christine Bukola Asaju, Pius Adewale Owolawi, Chuling Tu, Etienne Van Wyk

    Published 2025-01-01
    “…Cloud-based license plate recognition (LPR) systems have emerged as essential tools in modern traffic management and security applications. Determining the best approach remains paramount in the field of computer vision. …”
    Get full text
    Article
  10. 4130

    Geriatric Syndromes and Abandonment by Abel Pérez Pavón, Alejandra Villegas Villegas, Yamileth del Socorro López Franco, Donovan Casas Patiño, Alejandra Rodríguez Torres

    Published 2023-12-01
    “…<br /><strong>Methods:</strong> a cross-sectional, descriptive, analytical and correlational study was carried out in the Family Medicine Unit No. 33 of the Mexican Social Security Institute of Tabasco. The sample was made up of 203 patients aged 60 and over, who attended Family Medicine and Continuing Medical Care consultations. …”
    Get full text
    Article
  11. 4131

    Surrogate Safety Analysis of Pedestrian-Vehicle Conflict at Intersections Using Unmanned Aerial Vehicle Videos by Peng Chen, Weiliang Zeng, Guizhen Yu, Yunpeng Wang

    Published 2017-01-01
    “…However, it suffers from heavy labor work, high cost of maintenance, and even security restrictions. Data collection and processing remains a common challenge to traffic conflict analysis. …”
    Get full text
    Article
  12. 4132

    Chaotic Puma Optimizer Algorithm for controlling wheeled mobile robots by Mohamed Kmich, Nawal El Ghouate, Ahmed Bencharqui, Hicham Karmouni, Mhamed Sayyouri, S.S. Askar, Mohamed Abouhawwash

    Published 2025-03-01
    “…The control of wheeled mobile robots plays a crucial role in many fields, including automation, logistics, security, and even space exploration. This paper presents a significant improvement in the control of wheeled mobile robots based on an enhanced version of the Puma optimization algorithm by integrating chaotic maps in both optimization phases, exploration and exploitation. …”
    Get full text
    Article
  13. 4133
  14. 4134

    Managing online crisis-communication response in a South African bank by Rachel Barker

    Published 2022-10-01
    “…However, very little research has examined the management of online crisis-communication response messages in the online-security sphere. The knowledge management paradigm constitutes a way in which the acquisition, transfer and assimilation of information can be effectively used to manage and control messages in an online crisiscommunication response situation, in particular through maximising consumers’ motivation and capability to act in response to perceived online-transaction risks. …”
    Get full text
    Article
  15. 4135

    A Comprehensive Exploration of 6G Wireless Communication Technologies by Md Nurul Absar Siddiky, Muhammad Enayetur Rahman, Md Shahriar Uzzal, H. M. Dipu Kabir

    Published 2025-01-01
    “…This paper not only lays out a comprehensive 6G vision accentuated by high security, affordability, and intelligence but also charts the course for addressing the pivotal challenges of spectrum efficiency, energy consumption, and the seamless integration of emerging technologies. …”
    Get full text
    Article
  16. 4136

    Yorùbá Literary Artists on Youths and Parenthood by Olufadekemi Adagbada, Olatunde Adeleye Adeyemo, Ejitoyosi O. Salami

    Published 2022-01-01
    “…The natural psycho-biological development of youths and young adults, living in a nation going through socio-political economic and security challenges, coupled with their being nurtured in some cases through faulty parenting, have manifested in the typology of Nigerian youths. …”
    Get full text
    Article
  17. 4137

    Evaluation of the effect of physical-environmental factors of public spaces on the mental health of citizens (Case study: Ardabil city) by Elmira Azimi, Dariush Sattarzadeh, Lida Bolillan, Akbar Abdollahzadeh Tarf, Mahsa Faramarzi Asli

    Published 2020-12-01
    “…The results of this study showed that legibility and visual quality, access to urban green space, security of urban space, quality of urban furniture, mixing and variety of uses have a positive and significant effect on the mental health of citizens. …”
    Get full text
    Article
  18. 4138

    Problems of proving in criminal proceedings based on violations of war laws and customs by A. V. Shulzhenko

    Published 2022-06-01
    “…It is proposed to establish operational cooperation between investigators and the Security Service of Ukraine, to develop a unified methodology for investigating crimes related to violations of the laws and customs of war. …”
    Get full text
    Article
  19. 4139
  20. 4140

    The icon of Ukrainian Nazis: on the question of the historical assessment of the «heroes» under the Protection of the Virgin Mary and their modern admirers by A. V. Sushko

    Published 2024-05-01
    “…In addition to the image itself, which became the reason for writing this article, the source for the study is the forensic investigative documentation of the Soviet state security agencies, during and after the end of the Great Patriotic War, interrogating captured employees of the German special services, Ukrainian nationalists and witnesses to their war crimes. …”
    Get full text
    Article