Showing 4,161 - 4,180 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 4161

    A Framework for Resilient Community Microgrids: Review of Operational Strategies and Performance Metrics by Joy Dalmacio Billanes, Bo Nørregaard Jørgensen, Zheng Ma

    Published 2025-01-01
    “…By addressing the lack of an integrated approach in the existing literature, this study contributes to advancing resilient energy systems, supporting the energy transition, and promoting energy security. Future research should validate the proposed framework through empirical studies and explore scalable, cost-effective solutions to enable widespread adoption.…”
    Get full text
    Article
  2. 4162
  3. 4163

    Factors Influencing Precision Agriculture Technology Adoption Among Small-Scale Farmers in Kentucky and Their Implications for Policy and Practice by Shreesha Pandeya, Buddhi R. Gyawali, Suraj Upadhaya

    Published 2025-01-01
    “…The increasing pressure on food security and environmental sustainability has emphasized the importance of effective farm resource usage. …”
    Get full text
    Article
  4. 4164

    Paradigmatic Discord in US Arctic Policy by L. A. Matiyak

    Published 2015-04-01
    “…This is confirmed by the emergence of new actors (including traditionally non-Arctic players), the change in agenda of multilateral discussions (traditional topics, such as protection of the fragile Arctic environment, indigenous peoples of the North, have been complemented with the new "challenges" of energy security, global warming, and militarization), and the strengthening of the institutional framework (the Arctic Council has been more and more influential). …”
    Get full text
    Article
  5. 4165

    Molecular investigation of how drought stress affects chlorophyll metabolism and photosynthesis in leaves of C3 and C4 plant species: A transcriptome meta-analysis by Shima Karami, Behrouz Shiran, Rudabeh Ravash

    Published 2025-02-01
    “…Understanding the effects of drought stress on photosynthetic pathways, particularly in C3 and C4 plants, is crucial for maximizing agricultural productivity and maintaining food security. In this study, we analyzed RNA-seq data from leaves of common wheat (Triticum aestivum) and sorghum (Sorghum bicolor), as representatives of C3 and C4, using a meta-analysis approach to investigate the photosynthesis-related genes involved in the response to drought stress. …”
    Get full text
    Article
  6. 4166

    HSTCN-NuSVC: A Homogeneous Stacked Deep Ensemble Learner for Classifying Human Actions Using Smartphones by Sarmela Raja Sekaran, Ying Han Pang, Ooi Shih Yin, Lim Zheng You

    Published 2025-02-01
    “…Smartphone-based human activity recognition (HAR) is an important research area due to its wide-ranging applications in health, security, gaming, etc. Existing HAR models face challenges such as tedious manual feature extraction/selection techniques, limited model generalisation, high computational cost, and inability to retain longer-term dependencies. …”
    Get full text
    Article
  7. 4167

    Combating antibiotic resistance: mechanisms, challenges, and innovative approaches in antibacterial drug development by Aiswarya M. Rajesh, Shraddha Subhash Pawar, Kruthi Doriya, Rambabu Dandela

    Published 2025-01-01
    “…This review provides valuable insights for researchers and developers aiming to combat antibiotic resistance and advance the development of robust antibacterial therapies for future health security.…”
    Get full text
    Article
  8. 4168

    A Four-Year Monocentric Study of the Complications of Third Molars Extractions under General Anesthesia: About 2112 Patients by A. Guerrouani, T. Zeinoun, C. Vervaet, W. Legrand

    Published 2013-01-01
    “…One-day hospitalization offers a good balance between comfort, security, and cost. The incidence of complications is in agreement with the literature data, especially regarding pain, edema, and infectious and nervous complications. …”
    Get full text
    Article
  9. 4169

    The Surrogate Safety Appraisal of the Unconventional Elliptical and Turbo Roundabouts by Giovanni Tesoriere, Tiziana Campisi, Antonino Canale, Tedi Zgrablić

    Published 2018-01-01
    “…Therefore this comparative analysis allows reducing, in the preliminary phase, possible security impacts and also economic ones for the community.…”
    Get full text
    Article
  10. 4170

    Review of models for estimating 3D human pose using deep learning by Sani Salisu, Kamaluddeen Usman Danyaro, Maged Nasser, Israa M. Hayder, Hussain A. Younis

    Published 2025-02-01
    “…The review identifies key applications of HPE in industries like healthcare, security, and entertainment. Our findings suggest that while deep learning models have made significant strides, challenges in handling occlusion, real-time estimation, and generalization remain. …”
    Get full text
    Article
  11. 4171

    Government crisis communication tools in the light of the extreme drought of 2022 by Ágnes Kovács, Edina Kriskó, Tamás Pálvölgyi, László Balatonyi

    Published 2024-11-01
    “…According to satellite gravimetric measurements, the water security of the Carpathian Basin is changing in a negative direction. …”
    Get full text
    Article
  12. 4172

    A Collaborative Privacy Preserved Federated Learning Framework for Pneumonia Detection using Diverse Chest X-ray Data Silos by Shagun Sharma, Kalpna Guleria

    Published 2025-04-01
    “…Pneumonia detection from chest X-rays remains one of the most challenging tasks in the traditional centralized framework due to the requirement of data consolidation at the central location raising data privacy and security concerns. The amalgamation of healthcare data at the centralized storage leads to regulatory concerns passed by the governments of various countries. …”
    Get full text
    Article
  13. 4173

    An inquary on how to apply the approach of of Residents in Codification of conceptual concepts of the Persistent Iranian Neighbourhood updated with uses the Grounded theory meth... by Ensie Goharinasab, Hossein Zabihi, Shirin Toghyani

    Published 2019-09-01
    “…By means of position analysis, the final criteria were fixed. The parameters of security, sense of place, social status, spirituality and modern technology are one of the most important criteria for the survival of residents. …”
    Get full text
    Article
  14. 4174

    Some Basic Aspects of Militia Activities in Ukrainian SSR in 1933 by V. A. Grechenko, V. V. Rossikhin

    Published 2019-03-01
    “…The introduction of the passport system positively affected the organization of combating crime and ensuring state security, the registration of receptees was established. …”
    Get full text
    Article
  15. 4175

    Factors influencing street-vended foods quality and safety in developing countries: a review by O. A. Bassitou Koumassa, Romaric Ouétchéhou, Mathias Hounsou, Oscar Zannou, D. Sylvain Dabadé

    Published 2025-01-01
    “…Abstract Street foods are an economic activity and source of income for the poor while contributing to the population’s food and nutritional security. However, they are among the main transmission routes for foodborne diseases. …”
    Get full text
    Article
  16. 4176

    Increasing Neural-Based Pedestrian Detectors’ Robustness to Adversarial Patch Attacks Using Anomaly Localization by Olga Ilina, Maxim Tereshonok, Vadim Ziyadinov

    Published 2025-01-01
    “…The results of the research demonstrate that the proposed method is promising for improvement of object detection systems security.…”
    Get full text
    Article
  17. 4177

    Transforming healthcare: Saudi Arabia's vision 2030 healthcare model by Amal K. Suleiman, Long Chiau Ming

    Published 2025-12-01
    “…Additionally, we addressed the challenges associated with it, such as the imperative to address the digital divide and ensure data security. Vision 2030 in Saudi Arabia brought about a significant transformation in the provision of healthcare. …”
    Get full text
    Article
  18. 4178

    Internet communications of military personnel and their families in social networks as an object of digital sociology’s study by N. V. Il’ina, Yu. Yu. Sukhovskaya

    Published 2020-02-01
    “…At the same time, ensuring military security involves protecting the minds of their military personnel from negative impact, including in the case of their use of services in the Internet space. …”
    Get full text
    Article
  19. 4179

    The effects of environmental patents on renewable energy consumption by Mihaela Onofrei, Bogdan Narcis Fîrțescu, Florin Oprea, Dana Claudia Cojocaru

    Published 2024-10-01
    “…Environmental degradation and energy security are two of policymakers' most crucial concerns, with an increasing emphasis on renewable energy development. …”
    Get full text
    Article
  20. 4180

    Until you have something to lose! Loss aversion and two-factor authentication adoption by Ahmad R. Pratama, Firman M. Firmansyah

    Published 2025-01-01
    “…While 2FA increases the security level of authentication methods, it also requires extra efforts that can translate to some level of inconvenience on the user's end. …”
    Get full text
    Article