Showing 4,321 - 4,340 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 4321

    Impacts of Soil and Water Management Measures on Crop Production and Farm Income of Rural Households in the Damota Area Districts, Southern Ethiopia by Mamush Masha, Teshome Yirgu, Mulugeta Debele

    Published 2021-01-01
    “…Improving crop productivity and farm income of rural households and ensuring food security through soil and water conservation (SWC) measures are one of the integral parts of sustainable livelihood approaches. …”
    Get full text
    Article
  2. 4322

    A Method for Trust Quantification in Cloud Computing Environments by Xiaohui Li, Jingsha He, Bin Zhao, Jing Fang, Yixuan Zhang, Hongxing Liang

    Published 2016-02-01
    “…In such environments, ownership and control over the data may lead to potential conflict between the protection of data and the provision of services. Thus, cloud security has received a great deal of attention in recent years. …”
    Get full text
    Article
  3. 4323
  4. 4324

    Simultaneous Classification of Objects with Unknown Rejection (SCOUR) Using Infra-Red Sensor Imagery by Adam Cuellar, Daniel Brignac, Abhijit Mahalanobis, Wasfy Mikhael

    Published 2025-01-01
    “…Recognizing targets in infra-red images is an important problem for defense and security applications. A deployed network must not only recognize the known classes, but it must also reject any new or <i>unknown</i> objects without confusing them to be one of the known classes. …”
    Get full text
    Article
  5. 4325

    Public Perception of Genetically Modified Organisms and the Implementation of Biosafety Measures in Kenya by Kunyanga Nkirote Catherine, B. Roy Mugiira, N. Josephat Muchiri

    Published 2024-01-01
    “…Fifty-seven percent of the respondents indicated GMOs and genetically modified (GM) foods are a solution to food security in Africa. A majority believe that the introduction of GMO technology and the use of GM food is beneficial (52.3%). …”
    Get full text
    Article
  6. 4326
  7. 4327

    Generative AI, IoT, and blockchain in healthcare: application, issues, and solutions by Tehseen Mazhar, Sunawar khan, Tariq Shahzad, Muhammad Amir khan, Mamoon M. Saeed, Joseph Bamidele Awotunde, Habib Hamam

    Published 2025-01-01
    “…Blockchain verifies and secures IoT data, improving medical care and treatment, according to case studies. …”
    Get full text
    Article
  8. 4328

    Philosophical Ideas of Arne Næss in the Humanitarian Diplomacy of Norway by M. G. Zubov

    Published 2015-06-01
    “…The author of the arcticle makes it a point to show on separate examples to what extend the ideas of Næss A. are compatible with the basic principles of Norway's contemporary humanitarian diplomacy - humanity, neutrality, impartiality and independence, - as well as with the aims put forward by Norway in this respect which are to encure the needed with the necessery security and assistance; to finance humanitarian actions based on the international principles of humanity, neutrality, impartiality and independence; to prepare international community to responses to global humanitarian challenges of the future; to prevent and respond to humanitarian crises and participate in eleminating their aftermath. …”
    Get full text
    Article
  9. 4329
  10. 4330

    Business Process Modeling Patterns for Blockchain Application Development by Fouzia Alzhrani, Kawther Saeedi, Liping Zhao

    Published 2025-01-01
    “…To address this gap, this study proposes a comprehensive collection of data-driven patterns for business process modeling, comprising nine patterns that capture various blockchain-specific aspects, including token circulation, supply, and authorization, as well as smart contract security and authorization. Through a trend analysis of real-world blockchain applications, we identified recurring business processes across domains and validated our patterns by comparing them to existing literature and a proof-of-concept application. …”
    Get full text
    Article
  11. 4331
  12. 4332

    Neural Networks Application for the Data of PID Controller for Acrobot by Nguyen Cong Danh

    Published 2022-01-01
    “…The purpose of this method is to increase the security of the system against the attack of hackers on facilities of the automatic control system. …”
    Get full text
    Article
  13. 4333

    The concept and significance of forensic characteristics of the unlawful seizure of enterprise, institution or organisation property by S. V. Stetsenko

    Published 2023-12-01
    “…This criminal offence causes economic losses to both business entities and the state as a whole, reduces the level of economic security and, as a result, the level of investment, discredits the work of government agencies, undermines the authority of the state at the international level, etc. …”
    Get full text
    Article
  14. 4334

    Mediterranean refugee traffic: main routes and problems of control by Vasily D. Ostanin-Golovnya, Anna A. Pavliukova

    Published 2024-11-01
    “…The authors also cited forecasts from the European Union Agency for the Security of its External Borders for 2023–2024, which say that the pandemic and the economic crisis have affected migration flows, which will grow in the near future. …”
    Get full text
    Article
  15. 4335

    The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key by Ilham Firman Ashari, Eko Dwi Nugroho, Dodi Devrian Andrianto, M. Asyroful Nur Maulana Yusuf, Makruf Alkarkhi

    Published 2024-03-01
    “… Information security is paramount for individuals, companies, and governments. …”
    Get full text
    Article
  16. 4336

    A Fuzzy Multi-Criteria Approach for Selecting Open-Source ERP Systems in SMEs Using Fuzzy AHP and TOPSIS by Dana Marsetiya Utama, Muhammad Faisal Ibrahim, Ahmed Nedal Abid Al Kareem Jabari

    Published 2025-01-01
    “…System quality has been identified as a critical factor in the selection of an open-source ERP system, with particular emphasis on aspects such as security and reliability. These sub-criteria are considered the most influential in determining the suitability of a system. …”
    Get full text
    Article
  17. 4337
  18. 4338

    Determinants of food insecurity among Syrian refugee women and their coping strategies by Kübra Esin, Feride Ayyıldız

    Published 2024-11-01
    “…Results It was found that 28% of the women who participated in the study had food security, 35% had mild, 24% had moderate, and 13% had severe food insecurity. …”
    Get full text
    Article
  19. 4339

    Blasting Vibration Generated by Breaking-Blasting Large Barriers with EBBLB by Wang Zhen-xiong, Gu Wen-bin, Liang Ting, Liu Jian-qing, Xu Jing-lin, Liu Xin

    Published 2016-01-01
    “…The study can predict ground vibration generated by EBBLB and assess its damaging effects of blasting vibration for security and protection.…”
    Get full text
    Article
  20. 4340

    Sistem Keamanan Multi Mail Server dengan Teknik Enkripsi OPENPGP pada Zimbra Exchange Open Source Software by Amrul Faruq, Khaeruddin Khaeruddin, Merinda Lestandy

    Published 2020-05-01
    “…The test results show that the OpenPGP  method works well for the security of the email sending/receiving system on a multi-mail server. …”
    Get full text
    Article