Showing 7,341 - 7,360 results of 9,720 for search '"security"', query time: 0.09s Refine Results
  1. 7341

    The effects of environmental patents on renewable energy consumption by Mihaela Onofrei, Bogdan Narcis Fîrțescu, Florin Oprea, Dana Claudia Cojocaru

    Published 2024-10-01
    “…Environmental degradation and energy security are two of policymakers' most crucial concerns, with an increasing emphasis on renewable energy development. …”
    Get full text
    Article
  2. 7342

    Until you have something to lose! Loss aversion and two-factor authentication adoption by Ahmad R. Pratama, Firman M. Firmansyah

    Published 2025-01-01
    “…While 2FA increases the security level of authentication methods, it also requires extra efforts that can translate to some level of inconvenience on the user's end. …”
    Get full text
    Article
  3. 7343
  4. 7344

    CHALLENGES OF LOCALIZATION OF THE POLICY FRAMEWORK AND NATIONAL ACTION PLAN FOR PREVENTING VIOLENT EXTREMISM IN PLATEAU STATE, NIGERIA by BEJI GOWAL BEKUMA, JOHN UKAWUILULU

    Published 2023-12-01
    “…These threats have gravely undermined economic development, social progress, political stability, national and human security, and peaceful coexistence in the country. …”
    Get full text
    Article
  5. 7345

    Hydrogeochemical characteristics and environmental significance of travertine landscape in Muji area by Rui AN, Miao SUN, Yiwei ZHANG, Bin LI, Wenpeng LI, Kun LIU

    Published 2025-01-01
    “…It is urgent to strengthen the investigation of its environmental status and the assessment of water resources security. This study analyzed the hydrochemical characteristics of groundwater and the distribution of 21 trace heavy metals in a typical travertine landscape in Muji, Xinjiang. …”
    Get full text
    Article
  6. 7346

    Formal Verification of ERC-Based Smart Contracts: A Systematic Literature Review by Rim Ben Fekih, Mariam Lahami, Salma Bradai, Mohamed Jmaiel

    Published 2025-01-01
    “…Despite the trusted implementations that smart contracts offer, including those based on standards, different security problems and vulnerabilities arise during their development and execution. …”
    Get full text
    Article
  7. 7347

    Analysis of Techno–Economic and Social Impacts of Electric Vehicle Charging Ecosystem in the Distribution Network Integrated with Solar DG and DSTATCOM by Ramesh Bonela, Sriparna Roy Ghatak, Sarat Chandra Swain, Fernando Lopes, Sharmistha Nandi, Surajit Sannigrahi, Parimal Acharjee

    Published 2025-01-01
    “…The study aims to maximize the technical, financial, and social benefits while ensuring that all security constraints are met. To assess the financial viability of the proposed model over a 10-year horizon, a detailed economic analysis comprising installation cost, operation, and maintenance cost is conducted. …”
    Get full text
    Article
  8. 7348

    A two-stage flexible scheduling method for power systems with wind power considering the coordination of multiple resources by Aoyu Lei, Ligang Zhao, Yong Mei, Hongyue Zhen, Yongqiang Gao, Tinghui Zhou

    Published 2025-01-01
    “…The intermittency and uncertainty of renewable energy generations, such as wind power, present great challenges to the secure and stable operation of power grids. To accommodate a high penetration of renewable energy, it is vital to coordinate multiple flexible resources to deal with the intermittency and uncertainty of renewable energy and ensure the network security. …”
    Get full text
    Article
  9. 7349

    Improved insulator location and defect detection method based on GhostNet and YOLOv5s networks by Jianjun Huang, Xuhong Huang, Ronghao Kang, Zhihong Chen, Junhan Peng

    Published 2024-09-01
    “…Outdoor, real-time, and accurate detection of insulator defect locations can effectively avoid the occurrence of power grid security accidents. This paper proposes an improved GhostNet-YOLOv5s algorithm based on GhostNet and YOLOv5 models. …”
    Get full text
    Article
  10. 7350

    A voltage weak node identification method considering fault reconstruction in distribution networks by YANG Junwen, SHANG Lei, YE Xinzhi, LIU Chengxi, DONG Xuzhu

    Published 2025-01-01
    “…Finally, the weak node evaluation index system and identification method are proposed according to the relative position relationship between the voltage visible security region of distribution network and the node voltage index trajectory by considering the normal state and N-1+1 fault state operation conditions of the distribution network. …”
    Get full text
    Article
  11. 7351

    A Survey on True Random Number Generators Based on Chaos by Fei Yu, Lixiang Li, Qiang Tang, Shuo Cai, Yun Song, Quan Xu

    Published 2019-01-01
    “…With the rapid development of communication technology and the popularization of network, information security has been highly valued by all walks of life. …”
    Get full text
    Article
  12. 7352

    Study of Multi-Service Networks and Communication Systems Using Distributed Network Technology in Mountain Areas by Rustamova D. F., Mehdiyeva A. M., Mahmudova Z. A., Abdullaev J., Sapaev B.

    Published 2025-01-01
    “…It was found that the integrated performance indicators of multiservice corporate networks are largely determined by the reliability, information security and quality of service of IP / MPLS switching nodes and the IMS-Internet Protocol Multimedia Subsystem multimedia communication system using the signaling system and protocols for providing multimedia services and establishing session sessions. …”
    Get full text
    Article
  13. 7353

    Structural Characterization of Functional Ingredient Levan Synthesized by Bacillus siamensis Isolated from Traditional Fermented Food in Thailand by Nattapong Thakham, Supphasin Thaweesak, Nuttinee Teerakulkittipong, Natthiwut Traiosot, Autaipohn Kaikaew, Gary Antonio Lirio, Witawat Jangiam

    Published 2020-01-01
    “…The rising global population continues to threaten the world’s food security. The discovery of new technologies to produce food of nutritional and functional properties is urgently needed. …”
    Get full text
    Article
  14. 7354

    Assessment of Heavy Metal Contamination in Paddy Field Soils: A Case Study in Ranau Valley, Sabah, Malaysia by Ahmad Damanhuri Nadrah, Harun Siti Norliyana, Abd Rahim Sahibin

    Published 2024-01-01
    “…Regular monitoring and sustainable soil management practices will be essential to safeguard soil health, ensure food security, and reduce environmental risks in the Ranau Valley.…”
    Get full text
    Article
  15. 7355

    Transforming Education Through Blockchain: A Systematic Review of Applications, Projects, and Challenges by Xianxian Wang, Muhammad Younas, Yicun Jiang, Muhammad Imran, Norah Almusharraf

    Published 2025-01-01
    “…The unique features of blockchain, notably decentralization, trustworthiness, and security, have attracted considerable attention from researchers investigating its application in education. …”
    Get full text
    Article
  16. 7356
  17. 7357

    Single-Cell protein for feed and food by Ledbetter Fred

    Published 2025-01-01
    “…As global demand for protein sources continues to rise due to increasing populations and changing dietary preferences, the shortage of conventional protein for feed and food poses significant challenges for food security. Single-cell protein (SCP), derived from microorganisms such as yeasts and bacteria, represents a promising alternative to traditional protein sources. …”
    Get full text
    Article
  18. 7358

    Digitalisation factors influencing the dynamic capabilities of small and medium enterprises in the healthcare sector by P. Makelana, R. Kekwaletswe, M. A. Segooa

    Published 2024-06-01
    “…Results: The empirical results show that SME performance (β=0.132, p<0.05), task-technology fit (β=0.052, p<0.05), internet access (β=0.235, p<0.05), customer service (β=0.057, p<0.05), information sharing (β=0.022, p<0.05), innovation (β=0.125, p<0.05), and data security (β=0.427, p<0.05) are highly significant in the digitalisation of DC of SMEs. …”
    Get full text
    Article
  19. 7359

    UJI SITOTOKSITAS DAN ANTIPROLIFERATIF SEL KANKER PAYUDARA T47D DAN SEL VERO BIJI Nigella sativa, L. by Laela Hayu Nurani

    Published 2012-05-01
    “…Ethanol extract of cumin seeds have a higher potential due to the highest security index compared to ether extract and infusa. …”
    Get full text
    Article
  20. 7360

    Generative adversarial synthetic neighbors-based unsupervised anomaly detection by Lan Chen, Hong Jiang, Lizhong Wang, Jun Li, Manhua Yu, Yong Shen, Xusheng Du

    Published 2025-01-01
    “…Abstract Anomaly detection is crucial for the stable operation of mechanical systems, securing financial transactions, and ensuring network security, among other critical areas. …”
    Get full text
    Article