Showing 941 - 960 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 941
  2. 942
  3. 943
  4. 944
  5. 945

    A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices by Metin Varan, Akif Akgul, Fatih Kurugollu, Ahmet Sansli, Kim Smith

    Published 2021-01-01
    “…In this study, a two-way secure communication methodology underpinned by a chaos-based encryption algorithm for PMU devices is proposed. …”
    Get full text
    Article
  6. 946

    “An Endless Cycle of Worry and Hardship”: The Impact of COVID-19 on the Food Security of Somali Migrants and Refugees in Nairobi, Kenya by Zack Ahmed, Jonathan Crush, Bernard Owusu

    Published 2025-01-01
    “…Based on the results of a household survey and in-depth interviews with Somali migrants in Nairobi, Kenya in August 2022, this study documents the pandemic-related experience of these migrants in food access and consumption and assesses the overall impacts of COVID-19 on their food security. This study seeks to contribute to the emerging body of case study evidence that assesses the food security outcomes of the pandemic in vulnerable populations. …”
    Get full text
    Article
  7. 947
  8. 948
  9. 949

    Changing Diets, Varying Food Consumption Patterns, and Food Security among Recent Zimbabwean Migrants in Windhoek, Namibia by Godfrey Tawodzera

    Published 2025-01-01
    Subjects: “…migration, poverty, food security, dietary changes, food consumption patterns…”
    Get full text
    Article
  10. 950

    Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS) by Pi-Yun Chen, Yu-Cheng Cheng, Zi-Heng Zhong, Feng-Zhou Zhang, Neng-Sheng Pai, Chien-Ming Li, Chia-Hung Lin

    Published 2024-01-01
    “…Then, a machine learning - based model was employed to train the encryptor and decryptor for both biosignals and image infosecurity. After secure - data transmission, a case study is conducted for classifying medical images. …”
    Get full text
    Article
  11. 951

    Criminological examination of law acts and their drafts in the system of measures to combat corruption crime in the security and defense sector of Ukraine by I. S. Polyakov

    Published 2024-12-01
    “…The article is devoted to the study of the essence, purpose of criminological examination of regulatory legal acts and their drafts as a tool for combating corruption crime in the security and defense sector of Ukraine. A narrow and broad understanding of the specified examination is proposed. …”
    Get full text
    Article
  12. 952

    Secured DICOM medical image transition with optimized chaos method for encryption and customized deep learning model for watermarking by R. Abirami, C. Malathy

    Published 2025-04-01
    “…For healthcare professionals to view patient medical images, a secure online transmitting technique is essential. …”
    Get full text
    Article
  13. 953
  14. 954

    Blockchain-Powered Secure and Scalable Threat Intelligence System With Graph Convolutional Autoencoder and Reinforcement Learning Feedback Loop by Mohamad Khayat, Ezedin Barka, Mohamed Adel Serhani, Farag Sallabi, Khaled Shuaib, Heba M. Khater

    Published 2025-01-01
    “…This paper proposes an approach that integrates secure blockchain technology with data preprocessing, deep learning, and reinforcement learning to enhance threat detection and response capabilities. …”
    Get full text
    Article
  15. 955
  16. 956

    Crayfish optimization based pixel selection using block scrambling based encryption for secure cloud computing environment by Vikas K. Soman, V. Natarajan

    Published 2025-01-01
    “…However, ensuring a high level of security in CC environments remains a significant challenge. …”
    Get full text
    Article
  17. 957
  18. 958
  19. 959
  20. 960