Showing 9,081 - 9,100 results of 9,720 for search '"security"', query time: 0.09s Refine Results
  1. 9081

    COVID-19 LOCKDOWN AND THE CHALLENGES OF FOOD INSECURITY AMONG HOUSEHOLDS IN SELECTED COMMUNITIES IN ZARIA AND SABON-GARI LOCAL GOVERNMENT AREAS OF KADUNA STATE, NIGERIA by Mu’azu Ahmed Mohammed

    Published 2023-08-01
    “… The restriction of people’s movement during Covid-19 lockdown has affected the abilities of many families in securing, either from their own production or through purchases, adequate food for meeting the dietary needs of their members in Zaria and Sabon-gari Local Government Areas of Kaduna State, Nigeria. …”
    Get full text
    Article
  2. 9082

    Le foisonnement éolien : les limites d’un mix électrique à forte proportion d’énergies renouvelables intermittentes by Grand, Dominique, Fontecave, Marc

    Published 2023-05-01
    “…The 50–50 renewable and nuclear scenario is given for comparison, showing that the solution lies in providing adequate secured power plant capacity.…”
    Get full text
    Article
  3. 9083

    Debt sustainability of state-owned enterprises in Indonesia by Esther Sri Astuti Soeyaningrum Agustin, Eko Listiyanto, Nur Komaria

    Published 2025-12-01
    “…The findings reveal considerable risks to SOE debt sustainability across industries, with no sector being consistently secure or unstable. However, SOEs in the mining sector demonstrate better debt sustainability performance than those in the construction sector. …”
    Get full text
    Article
  4. 9084

    Suture Repair and Suspensory Button Fixation of Avulsion Fracture of the Fibular Styloid (Arcuate Fracture) by Surasak Srimongkolpitak, M.D., Pratchaya Manop, M.D., Bancha Chernchujit, M.D.

    Published 2025-01-01
    “…If the fixation system is not sufficient to secure the various stabilities of the knee, it will fail and cause significant knee instability. …”
    Get full text
    Article
  5. 9085

    Nonexposure Accurate Location K-Anonymity Algorithm in LBS by Jinying Jia, Fengli Zhang

    Published 2014-01-01
    “…Experimental results show that our algorithms are more secure than the existent cloaking algorithms, need not have all the users reporting their locations all the time, and can generate smaller ASR.…”
    Get full text
    Article
  6. 9086

    AFM-DViT: A framework for IoT-driven medical image analysis by Jiacheng Yang

    Published 2025-02-01
    “…The AFM-DViT model offers an effective solution for secure and efficient medical image analysis in IoT-enabled environments.…”
    Get full text
    Article
  7. 9087

    Application of edge-cloud collaborative intelligence technologies in power grids by Qing HAN, Kunlun GAO, Ting ZHAO, Jiangqi CHEN, Xinyu YANG, Shusen YANG

    Published 2021-03-01
    “…With the continuous development of the Internet of things on electricity (IoTE) and large-scale deployment of intelligent edge devices, an explosively increasing amount of data are being generated at the network edge.The efficient, fast and secure processing and analysis of the massive edge located data brings great challenges for the traditional cloud computing-based intelligence technologies.Instead, edge-cloud collaborative intelligence (ECCI) technologies can significantly outperform the cloud computing-based intelligence in terms of the network bandwidth saving, delay reduction and privacy protection, and therefore have shown a great potential in boosting the development of power grids.To investigate the application of ECCI in power grids, the concept and research progress of ECCI were firstly introduced.The characteristics and advantages of ECCI were summarized and its applicability in the power grids were discussed.Secondly, the key technologies of ECCI applications for power grids were discussed and the solutions based on ECCI technologies for two typical scenes were proposed respectively.Finally, a brief discussion of future work was given.…”
    Get full text
    Article
  8. 9088

    Linear gate bounds against natural functions for position-verification by Vahid Asadi, Richard Cleve, Eric Culf, Alex May

    Published 2025-01-01
    “…The scheme is feasible for a prover with linear classical resources and $O(1)$ quantum resources, and secure against sub-linear quantum resources.…”
    Get full text
    Article
  9. 9089

    Design of an Uninterrupted Power Supply with Li-Ion Battery Pack: A Proposal for a Cost-Efficient Design with High Protection Features by Thealfaqar A. Abdul-jabbar, Adel A. Obed, Ahmed J. Abid

    Published 2021-06-01
    “…Besides, li-ion batteries require a safe and secure ground to reach the best performance and decrease the explosion risk. …”
    Get full text
    Article
  10. 9090

    Exploring the relationship between learning emotion and cognitive behaviors in a digital game by Li Chen, Zehui Zhan, Han Chen, Linlin Zheng

    Published 2024-09-01
    “…The study demonstrates that high‐level learners maintained a high level of insightful emotion throughout the game, excelled at constructing strategic formations to control more significant chessboard areas, and preferred to reserve powerful pieces until the end to secure a winning advantage. Conversely, low‐level learners exhibit a predominant level of neutral emotion, especially during unrelated behaviors, and struggle to maintain a strategic overview, focusing instead on smaller, immediate gains, which hamper the application of deeper strategies.…”
    Get full text
    Article
  11. 9091

    Adaptive Coordinated Variable Speed Limit between Highway Mainline and On-Ramp with Deep Reinforcement Learning by Ming Cheng, Chenghao Zhang, Hui Jin, Ziming Wang, Xiaoguang Yang

    Published 2022-01-01
    “…This research provides insights into the management of highway capacity so as to secure traffic efficiency and reliability for the merging zone.…”
    Get full text
    Article
  12. 9092

    Passive biometric electronic lock via UHF RFID by Xiang ZOU, Jinsong HAN, Yuhang QU, Jian XIAO, Xian XU

    Published 2021-04-01
    “…A biometric lock design method was proposed based on the internal features of human body, namely PBLock.It used the backscattered RF signals to collect the impedance characteristics of human fingertips through the contact between human fingers and tags.The advantage of such authentication method is that the human impedance was not easy to be stolen, and it was fully integrated with the hardware characteristics of the device (RFID tags), which greatly increased the difficulty for the attacker to copy and clone.To ensure the availability and efficiency of the system, an optimization authentication mechanism was proposed by cutting tag antenna, which effectively improved the impedance sensitivity.Moreover, the feasibility of passive drive was discussed by using the electromagnetic energy advantage of RFID system.Through a large number of experimental evaluations, the authentication accuracy of PBLock can reach 96%, and the average time cost of a single authentication is 1.4 seconds.Some attack models were presented based on practical environment.The results show that PBLock can effectively prevent counterfeiting attack, impersonation attack and replay attack, which provides an opportunity for the secure application of new biometric electronic locks.…”
    Get full text
    Article
  13. 9093

    Recent Web Platforms for Multi-Omics Integration Unlocking Biological Complexity by Eugenia Papadaki, Ioannis Kakkos, Panagiotis Vlamos, Ourania Petropoulou, Stavros T. Miloulis, Stergios Palamas, Aristidis G. Vrahatis

    Published 2024-12-01
    “…Finally, the paper proposes directions for future research and development, emphasizing the importance of more advanced, user-friendly, and secure platforms that can better serve comprehensive healthcare needs.…”
    Get full text
    Article
  14. 9094

    Sustainability models in Zone 3 manufacturing SMEs by Karla Morales, Pamela de Los Ángeles Sánchez Rosero, Christian Alberto López Valencia, Freddy Marco Armijos Arcos

    Published 2025-01-01
    “…For the development of the study, 107 medium and small companies that met the requirements of complete information obtained from the Superintendence of Companies, Securities, and Insurance were taken into account. Observation sheets were used to classify the information in the financial statements and allow understanding of their financial situation by applying the solvency prediction models, Z-Altman, Springate, Fulmer, and CA-Score. …”
    Get full text
    Article
  15. 9095

    Synthesis of antifungal imines as inhibitors of ergosterol biosynthesis by Joydeep Karan, Aditi Kundu, Robin Gogoi, Kanchikeri Math Manjaiah, Ashutosh Kumar Singh, Koyel Mondal, Rajesh Kumar, Parshant Kaushik, Priya Saini, Virendra Singh Rana, Najam Akhtar Shakil

    Published 2025-12-01
    “…Ensuring a safe and secure supply of nutritious food for the ever growing global population necessitates the development of new eco-friendly fungicides to increase global food output by minimizing plant disease losses. …”
    Get full text
    Article
  16. 9096

    An examination of the enhanced photocatalytic performance of PEO coatings applied on Mg alloys: A review by Arash Fattah-alhosseini, Stevan Stojadinović, Razieh Chaharmahali, Andrey Gnedenkov

    Published 2024-11-01
    “…Of the various strategies for securing nanoparticles to a substrate, photocatalytic coatings have emerged as a promising solution to overcome the common limitations associated with powdered forms. …”
    Get full text
    Article
  17. 9097

    Source-independent quantum random number generators with integrated silicon photonics by Yongqiang Du, Xin Hua, Zhengeng Zhao, Xiaoran Sun, Zhenrong Zhang, Xi Xiao, Kejin Wei

    Published 2025-01-01
    “…Our research paves the way for integrated SI-QRNGs, providing a cost-effective and robust secure QRNG module for next-generation communications.…”
    Get full text
    Article
  18. 9098

    "CYCLIST ON THE MARSH": LESSONS AND PROSPECTS OF THE LAST EU ENLARGEMENT by A. I. Tevdoy-Bourmouli

    Published 2013-08-01
    “…Specific historic experience of the applicants pre-determined a considerable specialty of west-European fashioned democratic regimes in those countries, weakness of consensus and tolerance culture which has already rooted itself in the West-European society, and which has to a considerable degree secured stable development of Western Europe over the last decades. …”
    Get full text
    Article
  19. 9099

    Trust and Distrust in a Democratic State of Law by Marta Krasoń, Robert Krasoń

    Published 2024-12-01
    “…The key task of public administration, aimed at inspiring and intensifying trust, is to obtain and secure the common good in the state on the basis of, and within the limits of, the applicable legal regulations, which at the same time set out the methods and scope of social protection in the individual spheres of operation of the legislative, executive, and judicial authorities.…”
    Get full text
    Article
  20. 9100

    Development and Validation of the Interpreting Learning Engagement Scale (ILES) by Wenting Yu, Chenggang Wu

    Published 2024-12-01
    “…Additionally, the scale’s scores showed a significant correlation with grit, securing the external validity of the ILES. This study not only contributes a validated instrument for assessing student engagement in interpreting learning but also provides implications for promoting engagement through potential interventions, with the ultimate aim of achieving high levels of interpreting competence.…”
    Get full text
    Article