Showing 9,041 - 9,060 results of 9,720 for search '"security"', query time: 0.09s Refine Results
  1. 9041

    Bitcoin, Libra and Central Bank Digital Currencies — Elements of a New Monetary System? by Jonas Groß, Bernhard Herz, Jonathan Schiller

    Published 2020-09-01
    “…Central bank digital currencies could be viewed as a public sector response to these private projects to secure central banks’ predominant role in the monetary system of the future.…”
    Get full text
    Article
  2. 9042

    Dynamic Stochastic Optimization of Emergent Blood Collection and Distribution from Supply Chain Perspective by Xiangyu Jin, Huajun Tang, Yuxin Huang

    Published 2021-01-01
    “…In response to emergencies, it is critical to investigate how to deliver emergency supplies efficiently and securely to disaster-affected areas and people. There is no doubt that blood is deemed one of the vital relief supplies, and ensuring smooth blood delivery may substantially alleviate subsequent impacts caused by the disaster. …”
    Get full text
    Article
  3. 9043

    ECONOMIC ANALYSIS OF SOIL-BASED AND SOILLESS FARMING SYSTEMS: A CASE STUDY FROM DA LAT CITY by Đặng Đức Huy, Phạm Thị Thuyền, Đàm Thị Hải Âu, Trần Thanh Giang, Nguyễn Thị Trà My

    Published 2020-12-01
    “…Nowadays, to secure production in the case of restricted natural resources requires innovative farming approaches to achieve a balance between agriculture and environmental protection. …”
    Get full text
    Article
  4. 9044

    Nanoformulation: An efficient approach to natural insect repellent formulations by Mehrin Najafzadeh Nansa, Farzaneh Jokarshoorijeh, Nasibeh Tavakoli Hasanaklou, Ramin Hosseni, Massomeh Ghorbanloo, leila Mamani

    Published 2024-08-01
    “…Currently, there is a remarkable interest in the development of eco-friendly, secure, and effective pesticides using intelligent, responsive, biodegradable, and biocompatible materials. …”
    Get full text
    Article
  5. 9045

    A Novel Memductor-Based Chaotic System and Its Applications in Circuit Design and Experimental Validation by Li Xiong, Yanjun Lu, Yongfang Zhang, Xinguo Zhang

    Published 2019-01-01
    “…Further to these, a memductor-based chaotic circuit is designed, realized, and applied to construct a new memductor-based secure communication circuit by employing the basic electronic components and memristor. …”
    Get full text
    Article
  6. 9046

    Dynamic nonlinear control strategies for resilient heterogeneous vehicle platooning and handling Byzantine attacks in communication networks by Ammar Alsinai, José Roberto Castilho Piqueira, Waqar Ul Hassan, Azmat Ullah Khan Niazi, Farida Safder

    Published 2025-01-01
    “…Utilizing a constant time headway spacing policy with gap adjustments, we derive control gains that secure internal platoon stability. A Lyapunov-based stability approach is employed to mitigate the destabilizing effects of Byzantine attacks, ensuring robust performance even in adverse conditions. …”
    Get full text
    Article
  7. 9047

    Artificial intelligence techniques for stability analysis in modern power systems by Jiashu Fang, Chongru Liu

    Published 2024-12-01
    “…Effective stability analysis is essential for the secure operation of modern power systems. As smart grids evolve with increased interconnection, renewable energy integration, and electrification, the large-scale deployment of ultra-high voltage AC/DC networks introduces various operational modes and potential fault points, posing significant challenges to maintaining stability. …”
    Get full text
    Article
  8. 9048

    Good governance based on service information system applications administration population via smartphones by Sitna Hajar Malawat, Dewi Merdayanty, Junaidy Junaidy, Syahrial Shaddiq

    Published 2023-12-01
    “…If applied to an application platform that manages population administration services, the principles of Good Governance can secure the smooth running of these services, in line with the needs of the community. …”
    Get full text
    Article
  9. 9049

    Agricultural support policies and GHG emissions from agriculture in Latin America: relationships and policy implications for climate change by Sara A. Wong, Gonzalo Rondinone, Carmine Paolo De Salvo

    Published 2023-11-01
    “…Domestic support policies for farmers and agriculture, through their price effect, have been deemed potentially environmentally harmful; for example, in developing countries, agricultural prices have been set- below the world market prices, aiming to secure low retail prices for urban consumers. This practice has lowered producer prices, and thereby prevented farmers from adopting ecofriendly production techniques. …”
    Get full text
    Article
  10. 9050

    Simplified Technique for Sealing Corneal Perforations Using a Fibrin Glue-Assisted Amniotic Membrane Transplant-Plug by Selcuk Kara, Sedat Arikan, Ismail Ersan, Arzu Taskiran Comez

    Published 2014-01-01
    “…An amniotic membrane patch was placed over the plug, which was then secured by a bandage contact lens. Result. Surgery to restore corneal stromal thickness without recurrence of perforation. …”
    Get full text
    Article
  11. 9051

    An Image Encryption Algorithm Based on the Improved Sine-Tent Map by Zijing Gao, Zeyu Liu, Lichan Wang

    Published 2021-01-01
    “…The correlation of the ciphertext image pixels is very low, and the algorithm is highly secure as a conclusion.…”
    Get full text
    Article
  12. 9052

    Stretchable and body conformable electronics for emerging wearable therapies by Benzhao Huang, Qian Wang, Wei Li, Desheng Kong

    Published 2025-01-01
    “…Furthermore, the article delineates the crucial characteristics of wearable therapeutic devices, such as biocompatibility, secure skin attachment, and effective moisture management. …”
    Get full text
    Article
  13. 9053

    Exploring the possibilities of using cryptocurrencies in production in creative industries by A. R. Akopyan, Yu. V. Vorontsova, V. V. Krysov

    Published 2024-06-01
    “…One of the advantages of applying this type of currency is the ability to conduct fast and secure financial transactions without the involvement of intermediaries. …”
    Get full text
    Article
  14. 9054

    An Enhanced Sine Cosine Algorithm for Feature Selection in Network Intrusion Detection by zahra asgari varzaneh, soodeh hosseini

    Published 2024-12-01
    “…For computer networks to remain secure, intrusion detection is essential. Analyzing network traffic data is part of this activity to spot possible cyber threats. …”
    Get full text
    Article
  15. 9055

    Challenges to patients’ rights during the COVID-19 pandemic: survey of public perceptions in North Macedonia by Katerina Kuzmanova, Aleksandar Dimkovski, Evgenija Mihajloska, Aleksandra Grozdanova, Katerina Anchevska Netkovska

    Published 2024-12-01
    “…Although 72.4% felt adequately informed about their care throughout all phases, just under half (47.6%) were aware of their healthcare and insurance rights and the procedures to secure them. Two-thirds (67.6%) reported that their autonomy was respected despite restrictive measures, and over 70% believed their privacy was maintained. …”
    Get full text
    Article
  16. 9056
  17. 9057

    Perspectives of Mediation as a Consensual Dispute Resolution Tool under the Convention on the Civil Aspects of International Child Abduction by A. P. Klementiev, A. A. Ilkevich

    Published 2024-01-01
    “…The authors justify the advantages of mediation with a view to secure the best interests of a child. In particular, mediation may facilitate more expedited return of a child when compared to court procedures as well as exert a positive impact on its emotional status. …”
    Get full text
    Article
  18. 9058

    The potential of the municipality of Trstenik for the development of the wine tourism by Stojković Jelena, Milićević Snežana

    Published 2024-01-01
    “…The results of the research are significant as they can assist tourism organization as well as municipal officials to make up a strategy for the development of wine tourism which would secure a significant position on the Serbian wine tourism map for the Trstenik wine district.…”
    Get full text
    Article
  19. 9059

    Time-and-ID-Based Proxy Reencryption Scheme by Kambombo Mtonga, Anand Paul, Seungmin Rho

    Published 2014-01-01
    “…We prove that our scheme is semantically secure in the standard model.…”
    Get full text
    Article
  20. 9060