Showing 7,281 - 7,300 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 7281

    Yorùbá Literary Artists on Youths and Parenthood by Olufadekemi Adagbada, Olatunde Adeleye Adeyemo, Ejitoyosi O. Salami

    Published 2022-01-01
    “…The natural psycho-biological development of youths and young adults, living in a nation going through socio-political economic and security challenges, coupled with their being nurtured in some cases through faulty parenting, have manifested in the typology of Nigerian youths. …”
    Get full text
    Article
  2. 7282

    Evaluation of the effect of physical-environmental factors of public spaces on the mental health of citizens (Case study: Ardabil city) by Elmira Azimi, Dariush Sattarzadeh, Lida Bolillan, Akbar Abdollahzadeh Tarf, Mahsa Faramarzi Asli

    Published 2020-12-01
    “…The results of this study showed that legibility and visual quality, access to urban green space, security of urban space, quality of urban furniture, mixing and variety of uses have a positive and significant effect on the mental health of citizens. …”
    Get full text
    Article
  3. 7283

    Improving Super-Resolution in Face Images by Modeling Image Degradation Using Pairs of High-Quality and Low-Quality Images by Ahmad Dolatkhah

    Published 2025-01-01
    “…<p><span style="font-size: 10.0pt; line-height: 125%; font-family: 'Georgia',serif; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Georgia; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi; mso-ansi-language: EN-US; mso-fareast-language: JA; mso-bidi-language: AR-SA;">&nbsp;</span><span style="font-size: 11pt; line-height: 125%; font-family: Calibri, sans-serif;">Improving image quality for identification and authentication in security and surveillance systems is of particular importance, and today, using artificial intelligence, the quality of images can be significantly improved. …”
    Get full text
    Article
  4. 7284

    Problems of proving in criminal proceedings based on violations of war laws and customs by A. V. Shulzhenko

    Published 2022-06-01
    “…It is proposed to establish operational cooperation between investigators and the Security Service of Ukraine, to develop a unified methodology for investigating crimes related to violations of the laws and customs of war. …”
    Get full text
    Article
  5. 7285

    Next-gen agriculture: integrating AI and XAI for precision crop yield predictions by R. N. V. Jagan Mohan, Pravallika Sree Rayanoothala, R. Praneetha Sree

    Published 2025-01-01
    “…Climate change poses significant challenges to global food security by altering precipitation patterns and increasing the frequency of extreme weather events such as droughts, heatwaves, and floods. …”
    Get full text
    Article
  6. 7286
  7. 7287
  8. 7288

    The icon of Ukrainian Nazis: on the question of the historical assessment of the «heroes» under the Protection of the Virgin Mary and their modern admirers by A. V. Sushko

    Published 2024-05-01
    “…In addition to the image itself, which became the reason for writing this article, the source for the study is the forensic investigative documentation of the Soviet state security agencies, during and after the end of the Great Patriotic War, interrogating captured employees of the German special services, Ukrainian nationalists and witnesses to their war crimes. …”
    Get full text
    Article
  9. 7289

    An Efficient FPGA Implementation of Optimized Anisotropic Diffusion Filtering of Images by Chandrajit Pal, Avik Kotal, Asit Samanta, Amlan Chakrabarti, Ranjan Ghosh

    Published 2016-01-01
    “…Digital image processing is an exciting area of research with a variety of applications including medical, surveillance security systems, defence, and space applications. …”
    Get full text
    Article
  10. 7290

    Encrypted traffic identification method based on deep residual capsule network with attention mechanism by Guozhen SHI, Kunyang LI, Yao LIU, Yongjian YANG

    Published 2023-02-01
    “…With the improvement of users’ security awareness and the development of encryption technology, encrypted traffic has become an important part of network traffic, and identifying encrypted traffic has become an important part of network traffic supervision.The encrypted traffic identification method based on the traditional deep learning model has problems such as poor effect and long model training time.To address these problems, the encrypted traffic identification method based on a deep residual capsule network (DRCN) was proposed.However, the original capsule network was stacked in the form of full connection, which lead to a small model coupling coefficient and it was impossible to build a deep network model.The DRCN model adopted the dynamic routing algorithm based on the three-dimensional convolutional algorithm (3DCNN) instead of the fully-connected dynamic routing algorithm, to reduce the parameters passed between each capsule layer, decrease the complexity of operations, and then build the deep capsule network to improve the accuracy and efficiency of recognition.The channel attention mechanism was introduced to assign different weights to different features, and then the influence of useless features on the recognition results was reduced.The introduction of the residual network into the capsule network layer and the construction of the residual capsule network module alleviated the gradient disappearance problem of the deep capsule network.In terms of data pre-processing, the first 784byte of the intercepted packets was converted into images as input of the DRCN model, to avoid manual feature extraction and reduce the labor cost of encrypted traffic recognition.The experimental results on the ISCXVPN2016 dataset show that the accuracy of the DRCN model is improved by 5.54% and the training time of the model is reduced by 232s compared with the BLSTM model with the best performance.In addition, the accuracy of the DRCN model reaches 94.3% on the small dataset.The above experimental results prove that the proposed recognition scheme has high recognition rate, good performance and applicability.…”
    Get full text
    Article
  11. 7291

    Blockchain technology in healthcare strengthening: The Nigerian case by Godsave Binlak Wazhi, Nengak Precious Danladi, Sesugh Daniel Terver, Stephen Ebuka Ukaobasi

    Published 2024-12-01
    “…Blockchain technology has many practical applications in the healthcare sector, including precision medicine and interoperability, supply chain management, authorization exchange of health information, security, and authorization, all of which are pivotal for effective health systems and quality health services. …”
    Get full text
    Article
  12. 7292
  13. 7293

    Trends and constraints of utilization of preserved cowpea leaves among households in arid and semi-arid lands in Kenya: a convergent mixed method study by J. O. Owade, G. O. Abong’, M. W. Okoth, A. W. Mwang’ombe

    Published 2021-11-01
    “…Abstract Background As much as local communities have employed traditional techniques of preservation to enhance availability and utilization of cowpea leaves, the efficiency of these techniques in achieving food security need to be established. The current study sought to document trends and constraints of utilization of preserved cowpea leaves in the arid and semi-arid lands (ASALs) in order to overcome of seasonal availability of the vegetable. …”
    Get full text
    Article
  14. 7294

    Anti‐freezing electrolyte modification strategies toward low‐temperature aqueous zinc‐ion batteries by Xinyao Yuan, Di Zhang, Hongfei Lu, Chenxu Duan, Yang Jin

    Published 2024-12-01
    “…Abstract Due to the availability of zinc resources, and reduced security risks, aqueous zinc‐ion batteries (AZIBs) are potential contenders for next‐generation energy storage systems. …”
    Get full text
    Article
  15. 7295

    Social risks of e-learning in a digital society by E. V. Chmykhova

    Published 2020-05-01
    “…The characteristic of risk types has been made in relation to such characteristics of modern society as the complexity of self-organization processes, the open nature and non-linearity of transformation processes.The understanding of various types of risks has been explained, that are associated with the problems of implementing the goals of humanistic educational policy; incomplete integration of methodological tools for e-learning; the break in educational traditions; conflicts between subjects of educational relations; the lack of adaptability of digital technologies to the content of social interaction; the complexity of the nature of distance learning technologies in the modern supercomplex socio-global system; impact on the formalization of learning new types of rationality; objectively inherent in modern society’s global social risks; conflicts of social movements with the interests of the subjects realizing the functions of education; with the indivisibility of the security of complex society in different spheres and levels of social interaction. …”
    Get full text
    Article
  16. 7296

    Assessment and Modelling of Walk Trips in Akure, Nigeria by Yinka Benjamin Oluwadiya, Arafat Ayodeji Adeowu, Emmanuel Femi Adebayo, Adekunle Isaac Omole, Musa Odunayo Sabit, Olatunji Akhigbe Akinyeye

    Published 2024-09-01
    “…Generally, the factors that motivated respondents to choose walking as a travel mode included its relative affordability, the lack of personal vehicles, awareness of health benefits, safety and security concerns, avoidance of motorized traffic congestion, and favorable weather conditions. …”
    Get full text
    Article
  17. 7297

    Effects of Elevated CO<sub>2</sub> on Maize Physiological and Biochemical Processes by Pirzada Khan, Tariq Aziz, Rahmatullah Jan, Kyung-Min Kim

    Published 2025-01-01
    “…This balance is essential for optimizing maize cultivation for food security, biofuel production, and environmental sustainability.…”
    Get full text
    Article
  18. 7298

    Interdependency classification: a framework for infrastructure resilience by Negin Shamsi, Alysha Helmrich

    Published 2025-01-01
    “…Critical Infrastructure Systems (CISs) provide essential services for nation-wide security, economy, and social well-being, and these systems are becoming increasingly interdependent to maintain those services. …”
    Get full text
    Article
  19. 7299
  20. 7300

    Impact of the COVID-19 Crisis on the Regulation to Tourism in the Czech Republic by Lukáš Novotný, Pavlína Pellešová

    Published 2021-05-01
    “…On the basis of the research, the most important aid factors were identified: financial aid, greater support from the State and municipalities, exemption of social security and health insurance payments, promotion of tourism and guide services, support in the form of upgrading skills and retraining. …”
    Get full text
    Article