Showing 5,181 - 5,200 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 5181

    A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things by Lanka Chris Sejaphala, Vusimuzi Malele, Francis Lugayizi

    Published 2025-01-01
    “…In recent years different defense techniques have been proposed to act against these attacks i.e., Secure-Protocol, conventional Intrusion Detection Systems (IDS), and Machine Learning (ML)-based. …”
    Get full text
    Article
  2. 5182

    Design of a SMS Based Voting System. by Owembabazi Justus

    Published 2023
    “…This system is slow, expensive, less secure, not reliable, cumbersome and not very transparent. …”
    Get full text
    Thesis
  3. 5183
  4. 5184

    Analysis of the existing methods of change of liquid glass properties by D. M. Koukoui, N. V. Andrianov

    Published 2000-11-01
    “…The authors list methods of modification of silicate binding agent with the purpose to secure high quality of castings and ecological cleanliness.…”
    Get full text
    Article
  5. 5185

    Surgical Synechiolysis of Iridocapsular Adhesion and Sulcus Placement of a Rigid Intraocular Lens on an Oversized Residual Capsular Rim by Jiao Lyu, Qi Zhang, Haiying Jin, Tingyi Liang, Jili Chen, Peiquan Zhao

    Published 2018-01-01
    “…A preserved capsulorhexis after sufficient synechiolysis, which can secure the IOL optic intraoperatively, may yield better stability of the IOL position.…”
    Get full text
    Article
  6. 5186

    Rural Households’ Vulnerability to Food Insecurity and Its Determinants in North Shewa Zone of Ethiopia by Debebe Cheber, Fekadu Beyene, Jema Haji, Tesfaye Lemma

    Published 2025-01-01
    “…Accordingly, based on the intensity of their vulnerability, households were grouped as chronic food insecure (43.72%), transient food insecure (12.57%), highly vulnerable-food secure (16.23%), and low vulnerable-food secure (27.49%). …”
    Get full text
    Article
  7. 5187
  8. 5188

    NEGATIVE INTEREST RATES: CENTRAL BANKS INITIATED AN EXPERIMENT by A. N. Burenin

    Published 2016-08-01
    “…Such new tools could be represented by futures contracts on interest rates securities.…”
    Get full text
    Article
  9. 5189

    Pressure and rolling torque in high-speed finishing blocks of wire mills with account of mass forces in deformation zones by A. A. Gorbanev, S. M. Zhuchkov, V. V. Filippov, V. A. Tischenko, A. B. Steblov

    Published 2001-08-01
    “…Tasks of working out of theoretical bases of continuos high-speed rolling of rolled wire are set forth and solved with considerańon of influence of mass forces securing necessary acceleration in deformation zones.…”
    Get full text
    Article
  10. 5190

    Food-Insecure Women Eat a Less Diverse Diet in a More Temporally Variable Way: Evidence from the US National Health and Nutrition Examination Survey, 2013-4 by Daniel Nettle, Melissa Bateson

    Published 2019-01-01
    “…Previous research using food recalls suggests that the total energy intake of food-insecure women is not elevated, though macronutrient composition may differ from that of food-secure women. There is limited evidence on temporal patterns of food consumption. …”
    Get full text
    Article
  11. 5191

    Feasibility and parameter optimization of ground-to-satellite uplink continuous-variable quantum key distribution by Jin Cheng, Yujie Chen, Ao Liu, Xin Sun, Junjie Guo, Bohan Yang, Peng Yin, Wenbo Liu, Lanjian Chen, Chen Dong

    Published 2025-01-01
    “…Driven by the necessitates of wide-area quantum secure communication networks, ground-to-satellite quantum key distribution (QKD) has been highlighted in the field of quantum information. …”
    Get full text
    Article
  12. 5192

    Relationship Between Attachment and Social Skills in Adulthood Education in the Digital Society by Raquel Muñoz-Pradas, María de la Fuente Benítez, Antonio Palacios-Rodríguez, Mª Victoria Fernández Scagliusi

    Published 2025-01-01
    “…After carrying out the analyses, the existence of a statistically significant relationship was detected between the social skills variable and Attachment Scale 3, corresponding to subjects with good abilities to express feelings and comfort with relationships (secure attachment). It is concluded by stating that subjects who have developed a secure attachment will have more satisfactory social relationships.…”
    Get full text
    Article
  13. 5193
  14. 5194

    Staying in Marriage is Not Enough: Influence of Marital Commitment and Adult Attachment Style on Marital Flourishing by Sri Juwita Kusumawardhani, Anggi Mayangsari, Reny Rustyawati, Ilham Phalosa Reswara

    Published 2024-06-01
    “…The results showed that marital commitment (p = .000) and a secure attachment style (p = .000) significantly predict marital flourishing. …”
    Get full text
    Article
  15. 5195

    A Rare Complication of Tracheal Intubation: Tongue Perforation by Loreto Lollo, Tanya K. Meyer, Andreas Grabinsky

    Published 2012-01-01
    “…Laryngoscopy demonstrated the ETT to perforate the base of the tongue. The airway was secured with tracheostomy and the ETT was removed. …”
    Get full text
    Article
  16. 5196

    Parallel remote state preparation for fully device-independent verifiable blind quantum computation by Sean A. Adamson

    Published 2025-01-01
    “…We introduce a device-independent two-prover scheme in which a classical verifier can use a simple untrusted quantum measurement device (the client device) to securely delegate a quantum computation to an untrusted quantum server. …”
    Get full text
    Article
  17. 5197

    A requirement-driven approach for competency-based collaboration in industrial data science projects by Marius Syberg, Nikolai West, Jörn Schwenken, Rebekka Adams, Jochen Deuse

    Published 2024-01-01
    “…Simultaneously, especially manufacturing companies need to gain and secure knowledge in the field of Industrial Data Science (IDS) and to collaborate with partners to form a competitive value chain. …”
    Get full text
    Article
  18. 5198

    La crise de l’oléoduc Edjeleh-Gabès : Au cœur des enjeux de souveraineté du Maghreb (1954-1962) by Sarah Adjel-Debbich

    Published 2018-06-01
    “…While the French-Libyan discussions (1954-1956) were retaining the attention of French oil companies, Paris was focusing on securing the evacuation of oil from the Algerian Sahara during the Algerian War (1954-1962). …”
    Get full text
    Article
  19. 5199

    Sensor Relocation Technique Based Lightweight Integrated Protocol for WSN by J. Joy Winston, B. Balan Paramasivan

    Published 2014-06-01
    “…However, this approach fails to focus on connectivity issue due to node migration and secured communication too, which may compromise our collecting data. …”
    Get full text
    Article
  20. 5200

    An Overview on The Pandemic Coronavirus Disease 2019 (COVID-19) Outbreak by Mariwan Abdulla Hama Salih

    Published 2020-05-01
    “…The other objective of this review was to encourage publics to treat the virus in safe way based on the discovery by researchers toward secure life of million peoples that could be infected by the 2019 new coronavirus. …”
    Get full text
    Article