Showing 7,401 - 7,420 results of 9,720 for search '"security"', query time: 0.09s Refine Results
  1. 7401

    MODELING OF POWER SYSTEMS AND TESTING OF RELAY PROTECTION DEVICES IN REAL AND MODEL TIME by I. V. Novash

    Published 2017-05-01
    “…Examples are given of the use of RTDS systems by foreign energy companies to test relay protection systems and control, to test the equipment and devices of automatic control, analysis of cyber security and evaluation of the operation of energy systems under different scenarios of occurrence of emergency situations. …”
    Get full text
    Article
  2. 7402

    Rehabilomics Strategies Enabled by Cloud-Based Rehabilitation: Scoping Review by Sejun Oh, SangHeon Lee

    Published 2025-01-01
    “…In particular, a comprehensive analysis was conducted on 28 studies, including 16 (57%) focused on personalized rehabilitation and 12 (43%) on data security and privacy. The distribution of articles among the 28 studies based on specific keywords included 3 (11%) on the cloud, 4 (14%) on platforms, 4 (14%) on hospitals and rehabilitation centers, 5 (18%) on telehealth, 5 (18%) on home and community, and 7 (25%) on disease and disability. …”
    Get full text
    Article
  3. 7403

    Counteraction to Political Terrorism in the Russian empire on the Example of Ukrainian provinces in Late ХІХ – Early ХХ Century by S. Yu. Ivanov, R. Yu. Kazankov

    Published 2021-07-01
    “…Among them were: the palace guard, the police department, the palace agency, security departments of the Ministry of Internal Affairs, the corps of gendarmes. …”
    Get full text
    Article
  4. 7404
  5. 7405

    Hydroclimatic Variability, Characterization, and Long Term Spacio-Temporal Trend Analysis of the Ghba River Subbasin, Ethiopia by Mehari Gebreyohannes Hiben, Admasu Gebeyehu Awoke, Abraha Adugna Ashenafi

    Published 2022-01-01
    “…Despite its importance for improved and sustainable water allocation for water supply-demand and food security, varying patterns of streamflow and their association with climate change are not well understood in the basin. …”
    Get full text
    Article
  6. 7406

    PRAPD: A novel received signal strength–based approach for practical rogue access point detection by Wenjia Wu, Xiaolin Gu, Kai Dong, Xiaomin Shi, Ming Yang

    Published 2018-08-01
    “…Rogue access point attack is one of the most important security threats for wireless local networks and has attracted great attention from both academia and industry. …”
    Get full text
    Article
  7. 7407
  8. 7408

    Service Quality (Servqual) Toward Rawa Bebek’s Rusunawa Residents in Dki Jakarta by Retnowati WD Tuti

    Published 2023-08-01
    “…Fiscal Responsibility, and 8). Security. While Methods used are Descriptive methods with a qualitative approach. …”
    Get full text
    Article
  9. 7409

    Trends in urban edible landscapes: a comprehensive bibliometric analysis by Huihua Yang, Mohd Kher Bin Hussein, Roziya Binti Ibrahim, Ran Lyu

    Published 2025-01-01
    “…In response to the dual challenges of urbanization and population growth, urban edible landscapes have emerged as innovative green infrastructure with the potential to address ecological, social, economic, and food security issues. This study systematically analyzes 3,089 publications from 2000 to 2024, sourced from the Web of Science database, using keywords such as ‘Edible Landscapes,’ ‘Edible Garden,’ ‘Rooftop Garden,’ ‘Community Garden,’ and ‘Productive Landscape.’ …”
    Get full text
    Article
  10. 7410

    Food insecurity confrontation by pastoralist and agrarian communities in South Omo Zone, Ethiopia: a facility-based qualitative study by Mintesinot Melka Gujo, Lebitsi Maud Modiba

    Published 2025-01-01
    “…Tailored intervention is highly demanding to implement policies to stabilise food supply chains and mitigate food shortages in both agrarian and pastoralist areas, invest in modern agricultural technologies to boost productivity, encourage the adoption of climate-smart agricultural practices to help farmers adapt to changing weather patterns, optimise the productive use of available farmland, promote income-generating activities, and diversify livelihoods to alleviate income constraints and improve food security.…”
    Get full text
    Article
  11. 7411

    A Critical Appraisal of Emergency Medicine Specialty Training and Resignation among Residents in Emergency Medicine in Turkey by Murat Cetin, Sercan Bicakci, Mustafa Emin Canakci, Mevlut Okan Aydin, Basak Bayram

    Published 2019-01-01
    “…Most frequent reasons of resignation were violence/security concerns (63.4%), busy work environment (53.7%), and mobbing (26.8%). …”
    Get full text
    Article
  12. 7412

    Software diversification method based on binary rewriting by Benwei HE, Yunfei GUO, Yawen WANG, Qingfeng WANG, Hongchao HU

    Published 2023-04-01
    “…Software diversity is an effective defense against code-reuse attacks, but most existing software diversification technologies are based on source code.Obtaining program source code may be difficult, while binary files are challenging to disassemble accurately and distinguish between code pointers and data constants.This makes binary file diversification difficult to generate high levels of randomization entropy, and easily compromised by attackers.To overcome these challenges, a binary file oriented software diversification method was proposed based on static binary rewriting technology, namely instruction offset randomization.This method inserted NOP instructions of varying byte lengths before program instructions with a certain probability, reducing the number of unintended gadgets in the program and randomly offsetting the original instruction address.This disrupts the program’s original memory layout and increases the cost of code-reuse attacks.At the same time, an optimization strategy based on hot code was designed for this method.The execution times of basic blocks in binary files were obtained by dynamic pile insertion, so as to adjust the NOP instruction insertion probability in each basic block.The higher the execution frequency, the fewer NOP instructions were inserted into the basic block, which can ensure lower performance overhead and produce higher randomization entropy.In the experimental part, the SPEC benchmark program was used to test the optimized method from the aspects of performance overhead, gadget survival rate and file size.The results show that a 15% insertion probability achieves the best effect, with an average gadget survival rate of less than 1.49%, increasing attackers’ difficulty in reusing the same gadget attack chain.Furthermore, only a 4.1% operation overhead and 7.7% space overhead are added, maintaining high levels of security.…”
    Get full text
    Article
  13. 7413

    Research on Spread Spectrum Codes Optimized by Sparrow Search Algorithm and Extreme Gradient Boosting by LIANG Zhiru, BIAN Dongming, ZHANG Gengxin

    Published 2024-12-01
    “…【Objective】Direct Sequence Spread Spectrum (DSSS) has been widely used in military and civilian communications due to its strong resistance to various common interferences, high security, and ease of implementation. It has been widely used in Code Division Multiple Access (CDMA) system. …”
    Get full text
    Article
  14. 7414

    The <i>OsGATA</i> gene family as a promising candidate for applying the CRISPR/Cas genome editing technology to improve the nutritional and yield qualities of rice (<i>Oryza sativa... by E. A. Nesterova, N. A. Shvachko

    Published 2025-01-01
    “…Molecular breeding of rice (Oryza sativa L.) for yield is of great importance for ensuring food security of the population. Living organisms manifest genetically determined responses to environmental factors, including stressors. …”
    Get full text
    Article
  15. 7415

    Integrative multi-omics analysis reveals the translational landscape of the plant-parasitic nematode Meloidogyne incognita by Zhaolu Zhu, Dexin Bo, Chuanshuai Xie, Dadong Dai, Donghai Peng, Ming Sun, Jinshui Zheng

    Published 2025-01-01
    “…Abstract Root-knot nematodes (RKNs) of the genus Meloidogyne pose the most significant threats to global food security due to their destructive nature as plant-parasitic nematodes. …”
    Get full text
    Article
  16. 7416

    Features of law enforcement practice in the collection and evaluation of evidence to protect the social rights of police officers by M. A. Sambor

    Published 2022-03-01
    “…The peculiarities of the sources of evidence in the construction of the legal position of protection of social rights of police officers, including the receipt of additional surcharges to the financial security during quarantine, are formulated. Proposals on the use of documents, as well as high-quality motivation of the actual circumstances of the performance of police duties in quarantine, related to the livelihood of the population, the provision of services and law enforcement are analyzed and provided. …”
    Get full text
    Article
  17. 7417

    CHIEF OBAFEMI AWOLOWO’S POLITICAL PHILOSOPHY AND WELFARIST APPROACH TO STATECRAFT IN NIGERIA’S FIRST AND SECOND REPUBLIC by FRIDAY JOHN OGALEYE, GODWIN A. VAASEH

    Published 2024-07-01
    “…He made sure that effective governance includes the following: transparency, accountability, social justice, fairness, and equity, and selflessness, critical observation of the rule of law, purposeful leadership, effective institutions, and legitimacy of political economic and administrative authority, security and order. Awolowo believed the intellectual capacity of people is crucial. …”
    Get full text
    Article
  18. 7418

    Smart In-Cabin Air Monitoring System using IoT Technologies by Falah Y H Ahmed, Jabar H. Yousif, Marwan Alshar’e, Maram El Sheikh, Ehsan Al-Ajmi, Mahmood Al-Bahri

    Published 2024-01-01
    “…This step allows the owner to resolve the situation without compromising the security of the vehicle. If the readings continue to depreciate, the Arduino will roll down the windows slightly allowing fresh air into the cabin, message the driver again to inform them of the action taken and alert the authorities to act immediately in case medical assistance is required. …”
    Get full text
    Article
  19. 7419
  20. 7420

    IMPACT OF AUDIT QUALITY ON EARNINGS MANAGEMENT OF CONSUMER GOODS FIRMS IN NIGERIA by Sirajo Bappah, Awwal Saad, Saidu Adamu, Shehu Usman Hassan

    Published 2024-09-01
    “…Based on findings and conclusion, it is therefore, recommends that the regulatory bodies such as Financial Reporting Council of Nigeria and Security and Exchange Commission in Nigeria should ensure that audited reports for private companies are release within a regulated period, this is because prolonged audit lagged increase earnings management by giving management of the companies enough time to manipulate earnings. …”
    Get full text
    Article