Showing 4,701 - 4,720 results of 5,943 for search '"security"', query time: 0.12s Refine Results
  1. 4701

    Personnel Policy Strategy of the National Police of Ukraine in the Context of Updating Administrative and Legal Principles of Protecting Human Rights and Freedoms by A. V. Tanko

    Published 2020-06-01
    “…According to the modern legislation, the National Police, as well as its separate units should be transparent in their actions, open enough for external control, including public control, its staff should be able to meet the needs of all segments of the population and structures of society in legal protection and maintaining security. It is proved that the ethical principles of the police officers’ activities are determined by the priority in serving the needs of individual citizens and society in the whole, by close cooperation and interaction with the population, territorial communities and public associations based on partnership and aimed at satisfying their needs, following the current legislation of Ukraine. …”
    Get full text
    Article
  2. 4702

    Problems of Community Policing in Terms of Quarantine Restrictions by V. S. Seliukov, V. S. Makarenko

    Published 2021-03-01
    “…The constant confrontation between these entities significantly affects the level of security and quality of law enforcement activity. …”
    Get full text
    Article
  3. 4703

    Identification and functional characterization of the RPP13 gene family in potato (Solanum tuberosum L.) for disease resistance by Baoqi Yuan, Chuang Li, Qingfeng Wang, Qi Yao, Xiaowei Guo, Yuhang Zhang, Zhongwei Wang

    Published 2025-01-01
    “….), as the world’s fourth largest food crop, plays a crucial role in ensuring food security through its disease resistance. The RPP13 gene family is known to play a pivotal role in plant disease resistance responses; however, its specific functions in potato remain unclear. …”
    Get full text
    Article
  4. 4704

    Modelo PEF de costes de la calidad como herramienta de gestión en empresas constructoras: una visión actual Quality costs PEF model as a management tool in construction firms: a pr... by Santos Gracia Villar, Luis A Dzul López

    Published 2007-04-01
    “…The objective of a quality costs system is to find the level of quality that minimizes total quality costs; this will give the security that the construction firm is working efficiently in relation to its processes and products…”
    Get full text
    Article
  5. 4705

    Evaluation of EGFR-TKIs and ICIs treatment stratification in non-small cell lung cancer using an encrypted multidimensional radiomics approach by Xingping Zhang, Xingting Qiu, Yue Zhang, Qingwen Lai, Yanchun Zhang, Guijuan Zhang

    Published 2025-01-01
    “…Conclusion The proposed method effectively balances the level of evidence with privacy protection, enhancing the study’s validity and security. Therefore, radiomics biomarkers are expected to complement molecular biology analyses and guide therapeutic strategies for EGFR-TKIs, ICIs, and their combinations.…”
    Get full text
    Article
  6. 4706

    Crop water productivity assessment and planting structure optimization in typical arid irrigation district using dynamic Bayesian network by Yantao Ma, Jie Xue, Xinlong Feng, Jianping Zhao, Junhu Tang, Huaiwei Sun, Jingjing Chang, Longke Yan

    Published 2024-07-01
    “…Maximizing crop water productivity while ensuring food security has led to increased acreage for cotton, Chinese dates and walnuts. …”
    Get full text
    Article
  7. 4707

    Striking the Balance: Evaluating Content Quality and Reward Dynamics in Blockchain Online Social Media by Davide Mancino, Barbara Guidi, Andrea Michienzi, Marco Viviani

    Published 2025-01-01
    “…Various forms of decentralized solutions for social media development have been proposed in the last years to address some of the open problems of centralized ones, which include security issues, micro-targeting, opinion polarization, and various forms of information pollution. …”
    Get full text
    Article
  8. 4708

    Using Attention for Improving Defect Detection in Existing RC Bridges by Sergio Ruggieri, Angelo Cardellicchio, Andrea Nettis, Vito Reno, Giuseppina Uva

    Published 2025-01-01
    “…Overall, the proposal revealed its potential to improve the effectiveness of the survey, lowering the burden on surveyors and engineers and providing a reliable method to improve the overall security in large RC bridges portfolios.…”
    Get full text
    Article
  9. 4709

    Genetic Signatures of Contrasted Outbreak Histories of “Candidatus Liberibacter asiaticus”, the Bacterium That Causes Citrus Huanglongbing, in Three Outermost Regions of the Europe... by Olivier Pruvost, Karine Boyer, Frédéric Labbé, Marine Weishaar, Anaïs Vynisale, Claire Melot, Cécile Hoareau, Gilles Cellier, Virginie Ravigné

    Published 2024-12-01
    “…ABSTRACT In an era of trade globalization and climate change, crop pathogens and pests are a genuine threat to food security. The detailed characterization of emerging pathogen populations is a prerequisite for managing invasive species pathways and designing sustainable disease control strategies. …”
    Get full text
    Article
  10. 4710

    Distributed optimization and scheduling strategy for source load storage distribution grid based on alliance chain by Jinhua Tian, Yueyuan Zhang, Yanan Gao, Yu Qin, Bihan Fan, Cheng Zhang, Qiqi Zang

    Published 2024-08-01
    “…In response to issues as difficult global information acquisition, less consideration of flexible load and energy storage unit access, individual deception, and insufficient security in the optimization scheduling process of active distribution networks, this paper constructed a distribution network optimization scheduling model that includes sources, loads, and storage. …”
    Get full text
    Article
  11. 4711

    Boosting Cyberattack Detection Using Binary Metaheuristics With Deep Learning on Cyber-Physical System Environment by Alanoud Al Mazroa, Fahad R. Albogamy, Mohamad Khairi Ishak, Samih M. Mostafa

    Published 2025-01-01
    “…The ACAD-BMDL method mainly focuses on enhancing security in the CPS environment via the cyberattack detection process. …”
    Get full text
    Article
  12. 4712

    Farmer perceptions toward the adoption of agroforestry practices: a case study of northwestern Ethiopia by Mulunesh Yayehrad Gashu, Demamu Mesfin, Tadsual Asfaw Dessie

    Published 2025-01-01
    “…The study employed a quantitative and qualitative approach, with multi-stage sampling technique results employed to select sample households using a binary logit model.Result and discussionsThe study found that 59% of respondents perceived agroforestry as advantageous, with 91.57, 75, and 60.5% recognizing its benefits for farm productivity, household income, and food security, respectively. The remaining 41% of sample households were not perceived. …”
    Get full text
    Article
  13. 4713

    Advanced Learning Technologies for Intelligent Transportation Systems: Prospects and Challenges by Ruhul Amin Khalil, Ziad Safelnasr, Naod Yemane, Mebruk Kedir, Atawulrahman Shafiqurrahman, NASIR SAEED

    Published 2024-01-01
    “…Besides, we identify several future challenges and research directions that can push the boundaries of ITS, including the critical aspects, including transfer learning, hybrid models, privacy and security, and ultra-reliable low-latency communication. …”
    Get full text
    Article
  14. 4714

    Serological Survey and Factors Associated with Toxoplasma gondii Infection in Domestic Goats in Myanmar by Saw Bawm, Wint Yi Maung, Myat Yee Win, May June Thu, Hla Myet Chel, Tin Aye Khaing, Soe Soe Wai, Lat Lat Htun, Tin Tin Myaing, Saruda Tiwananthagorn, Makoto Igarashi, Ken Katakura

    Published 2016-01-01
    “…Goat farming is important for the livelihood of millions of rural people because it contributes to food security and creation of assets. However, infection of goats with Toxoplasma gondii could be a source of parasite transmission to humans. …”
    Get full text
    Article
  15. 4715

    Моделі самоорганізації колективу однорідних безпілотних літальних апаратів при рішенні слабоформалізованих завдань... by А.В. Тристан, Д.І. Жуков

    Published 2024-09-01
    “…A number of problems and shortcomings related to the organization of the control system, route planning, role assignment, speed and completeness of information receipt, processing and transmission are being addressed, which in turn improves the security and performance of the system. …”
    Get full text
    Article
  16. 4716

    Moral grounds and social norms of safe prosocial behaviour of young people by P. A. Kislyakov, E. A. Shmeleva, M. O. Aleksandrovich

    Published 2020-12-01
    “…The current research is based on the theory of moral grounds, the theory of social norms of prosocial behaviour, and the theory of social and psychological security. The following psychodiagnostic methods were applied: “Diagnostics of the Level of Moral and Ethical Responsibility of the Individual” (by I. …”
    Get full text
    Article
  17. 4717

    Crop wild relatives in the protected areas of the Republic of Bashkortostan by S. R. Miftakhova, L. M. Abramova, N. M. Saifullina, O. V. Yusupova

    Published 2022-12-01
    “…Comprehensive research into crop wild relatives (CWR) is essential to ensure food security. Protected areas serve as the main reserves for CWR in situ conservation and their population genetics studies. …”
    Get full text
    Article
  18. 4718
  19. 4719

    Prevalence and correlates of facemask usage during the second wave of COVID-19 pandemic in Uganda. by Nelson Onira Alema, Christopher Okot, Emmanuel Olal, Eric Nzirakaindi Ikoona, Freddy Wathum Drinkwater Oyat, Steven Baguma, Denish Omoya Ochula, Patrick Odong Olwedo, Johnson Nyeko Oloya, Francis Pebalo Pebolo, Pamela Okot Atim, Godfrey Smart Okot, Ritah Nantale, Judith Aloyo, David Lagoro Kitara

    Published 2025-01-01
    “…Although this prevalence is within acceptable rates, the strict enforcement of the practice by security forces has raised concerns among many community members and human rights advocates. …”
    Get full text
    Article
  20. 4720

    Land Use Modeling and Predicted Ecosystem Service Value Under Different Development Scenarios: A Case Study of the Upper–Middle Yellow River Basin, China by Mingwei Ma, Yuhuai He, Yanwei Sun, Huijuan Cui, Hongfei Zang

    Published 2025-01-01
    “…Exploring the future ecosystem service value (<i>ESV</i>) of the upper–middle Yellow River Basin is of great significance to enhancing its ecological security and capacity. This is in response to the strategy for the ecological protection and high-quality development of the Yellow River Basin. …”
    Get full text
    Article