Showing 1,021 - 1,040 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 1021

    Secure Communication Scheme Based on a New 5D Multistable Four-Wing Memristive Hyperchaotic System with Disturbance Inputs by Fei Yu, Zinan Zhang, Li Liu, Hui Shen, Yuanyuan Huang, Changqiong Shi, Shuo Cai, Yun Song, Sichun Du, Quan Xu

    Published 2020-01-01
    “…In addition, the circuit implementation scheme is also proposed. Then, a secure communication scheme based on the proposed 5D multistable FWMHS with disturbance inputs is designed. …”
    Get full text
    Article
  2. 1022

    Enhancing aviation control security through ADS-B injection detection using ensemble meta-learning models with Explainable AI by Vajratiya Vajrobol, Geetika Jain Saxena, Sanjeev Singh, Amit Pundir, Brij B. Gupta, Akshat Gaurav, Kwok Tai Chui

    Published 2025-01-01
    “…The increasing use of Automatic Dependent Surveillance-Broadcast (ADS-B) technology in flight control systems has created many serious concerns.These weaknesses threaten the security and safety of our aviation industry. Therefore, to enhance aviation control security and better deal with these problems, this research focuses on developing a strong ADS-B injection detection system. …”
    Get full text
    Article
  3. 1023

    Research on optimization of emergency supplies customs clearance strategy from the perspective of public health security based on Chinese trade data by Xia Zheng, Quan Cao, Xin Zhou

    Published 2025-01-01
    “…BackgroundThis study is significant for improving the accuracy of Customs’ cross-border supervision of emergency supplies and ensuring the timely clearance of these essential goods.MethodsTo ensure both the convenience and security of Customs oversight regarding emergency supplies, this study first systematically collects and organizes representative data on the import and export trade of these supplies. …”
    Get full text
    Article
  4. 1024

    “Sustainable security” through river enlargements: A political ecology of nature-based solutions and flood control in the Rhone Valley, Switzerland by Alexis Metzger, René Véron

    Published 2023-10-01
    “…The largest ongoing river training project in Switzerland, the so-called Third Correction of the Rhone in the Valais, builds on nature-based solutions (river enlargements and renaturation) while official documents and discourses also refer to an ill-defined notion of “sustainable security” and the goal of controlling floods. Drawing on qualitative data from stakeholder interviews and analysis of official documents, this paper examines the concept of sustainable security, as it is applied to the river project in terms of a balance between security and environmental concerns, the relationship between the three pillars of sustainability, and the opportunities of the population to debate the spatial development of the Rhone Valley. …”
    Get full text
    Article
  5. 1025
  6. 1026

    An Intelligent Big Data Security Framework Based on AEFS-KENN Algorithms for the Detection of Cyber-Attacks from Smart Grid Systems by Sankaramoorthy Muthubalaji, Naresh Kumar Muniyaraj, Sarvade Pedda Venkata Subba Rao, Kavitha Thandapani, Pasupuleti Rama Mohan, Thangam Somasundaram, Yousef Farhaoui

    Published 2024-06-01
    “…Here, an AdaBelief Exponential Feature Selection (AEFS) technique is used to efficiently handle the input huge datasets from the smart grid for boosting security. Then, a Kernel based Extreme Neural Network (KENN) technique is used to anticipate security vulnerabilities more effectively. …”
    Get full text
    Article
  7. 1027
  8. 1028
  9. 1029

    DEMOCRATIC PRINCIPLES AND THE ROLES OF TRADITIONAL POLITICAL INSTITUTIONS IN PROMOTING PEACE AND SECURITY IN NORTHERN NIGERIA: A CASE STUDY OF GOMBE STATE. by AHMED MUSA, BASHIR ABDULLAHI, MOHAMMED AUWAL, UMAR MUHAMMAD JUNGUDO

    Published 2024-06-01
    “… The adoption of Western Democracy after independence has come with a lot of changes to the hitherto roles and powers of traditional political institutions of building peace and security generally inNorthern Nigeria and Gombe in particular. …”
    Get full text
    Article
  10. 1030
  11. 1031
  12. 1032
  13. 1033
  14. 1034
  15. 1035
  16. 1036
  17. 1037

    An Extended Interval Type-2 Fuzzy VIKOR Technique with Equitable Linguistic Scales and Z-Numbers for Solving Water Security Problems in Malaysia by Wan Nur Amira Wan Azman, Nurnadiah Zamri, Siti Sabariah Abas, Azimah Ismail, Zamali Tarmudi, Syibrah Naim, Lazim Abdullah

    Published 2023-01-01
    “…The obtained solutions would help decision makers (DMs) identify the best solution to enhance water security projects in terms of finding the best strategies for water supply security in Malaysia.…”
    Get full text
    Article
  18. 1038

    Three Mediating Pathways of Anxiety and Security in the Relationship between Coping Style and Disordered Eating Behaviors among Chinese Female College Students by Wenyue Han, Zheng Zheng, Ning Zhang

    Published 2021-01-01
    “…According to previous studies, eating disorders and disordered eating behaviors are associated with coping style, anxiety, and sense of security. However, the specific mechanism between them has not been elucidated. …”
    Get full text
    Article
  19. 1039
  20. 1040