Showing 981 - 1,000 results of 5,943 for search '"security"', query time: 0.09s Refine Results
  1. 981
  2. 982

    SD‐SHO: Security‐dominated finite state machine state assignment technique with a satisfactory level of hardware optimization by Nitish Das, Aruna Priya Panchanathan

    Published 2021-09-01
    “…A state encoding approach is applied for FSM security and optimization. This article proposes the security‐dominated FSM state assignment technique (SD‐SHO), which obtains a satisfactory level of FSM optimization as well. …”
    Get full text
    Article
  3. 983

    Rotation Correction Algorithm Based on Polar Harmonic Fourier Moments and Optimization of Color Image Security Quantization Watermarking Scheme by Yuli Yang, Meiru Jiang, Xiufang Feng, Chenchen Lu, Yongle Chen, Shuang Zhou, Hao Zhang

    Published 2024-01-01
    “…Furthermore, the modulated chaotic system heightens the security of the watermark algorithm, the key space up to 10<sup>15</sup>, while also improving the quality of extracted watermarks.…”
    Get full text
    Article
  4. 984

    Socioeconomic Assessment and Impact of Social Security on Outcome in Patients Admitted with Suspected Coronary Chest Pain in the City of Salta, Argentina by Ricardo A. León de la Fuente, Patrycja A. Naesgaard, Stein Tore Nilsen, Leik Woie, Torbjoern Aarsland, Harry Staines, Dennis W. T. Nilsen

    Published 2013-01-01
    “…In conclusion, survival was mainly tied to socioeconomic inequalities in this population, and the impact of a social security program needs further attention.…”
    Get full text
    Article
  5. 985

    Palmeras utilizadas por los indígenas Yuracaré del Territorio Indígena Parque Nacional Isiboro-Sécure (Cochabamba, Bolivia) by Fabiola Montoya M., Mónica Moraes R.

    Published 2014-06-01
    “…The Indigenous Territory National Park Isiboro Secure (TIPNIS in Spanish) is rich in biological diversity, and is inhabited by native groups, among them the Yuracaré. …”
    Get full text
    Article
  6. 986

    Trade-offs involved in the choice of cloud service configurations when building secure, scalable, and efficient Internet-of-Things networks by Amitabh Mishra, Thomas Reichherzer, Ezhil Kalaimannan, Norman Wilde, Ruben Ramirez

    Published 2020-02-01
    “…This article focuses on results obtained from two cloud-based models that examine trade-offs between security, scalability, and efficiency of data collection for Internet-of-Things sensor networks. …”
    Get full text
    Article
  7. 987

    Social assistance and non-agriculture employment in rural China: evidence from the Rural Minimum Living Security (Rural Dibao) by Dian Chen, Xiangming Fang

    Published 2025-02-01
    “…Abstract The Rural Minimum Living Security (Rural Dibao) is a crucial social assistance program designed to alleviate poverty in rural China. …”
    Get full text
    Article
  8. 988
  9. 989

    A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network security by Kashi Sai Prasad, P Udayakumar, E. Laxmi Lydia, Mohammed Altaf Ahmed, Mohamad Khairi Ishak, Faten Khalid Karim, Samih M. Mostafa

    Published 2025-01-01
    “…Abstract Adversarial attacks were commonly considered in computer vision (CV), but their effect on network security apps rests in the field of open investigation. …”
    Get full text
    Article
  10. 990

    Cost-Effective and Energy-Efficient Photonics-Based Frequency Hopping by Single Wavelength-Tunable Laser for Secure THz Communication by Naoto Masutomi, Shenghong Ye, Bo Li, Ryota Kaide, Ming Che, Yuya Mikami, Yuta Ueda, Kazutoshi Kato

    Published 2025-01-01
    “…A photomixing-based frequency-hopping spread spectrum (FHSS) system is effective for future secure terahertz (THz) wireless communications. Conventional photomixing systems are typically composed of two lasers, which result in an increased system size and power consumption. …”
    Get full text
    Article
  11. 991

    Environmental Contribution to the Effectiveness of Food Security Policy Implementation as A Rehabilitation Effort for Stunting Treatment in Rokan Hilir Regency by Yuliani Febri, Sulistyani Andri, Yusrizal Firdaus

    Published 2025-01-01
    “…According to SDGs 2030, food security must have 3 principles, namely; Availability, Affordability; and Benefits, hereinafter referred to as food security aspects. …”
    Get full text
    Article
  12. 992
  13. 993
  14. 994
  15. 995

    A Secure Application for Information Sharing i n Organizations: A Case Study of Kabale District Local Government by Ivan, Niyonzima, Godfrey, Omoda Onyait

    Published 2019
    Subjects: “…A secure Application; Information Sharing; organizations; Crypto-graphical Methods…”
    Get full text
    Article
  16. 996
  17. 997

    Legal bases for counteracting financial terrorism by I. V. Kyrieieva, А. І. Denysov

    Published 2021-09-01
    Subjects: “…economic security…”
    Get full text
    Article
  18. 998
  19. 999
  20. 1000