Showing 7,481 - 7,500 results of 9,720 for search '"security"', query time: 0.08s Refine Results
  1. 7481

    A novel deep synthesis-based insider intrusion detection (DS-IID) model for malicious insiders and AI-generated threats by Hazem M. Kotb, Tarek Gaber, Salem AlJanah, Hossam M. Zawbaa, Mohammed Alkhathami

    Published 2025-01-01
    “…Abstract Insider threats pose a significant challenge to IT security, particularly with the rise of generative AI technologies, which can create convincing fake user profiles and mimic legitimate behaviors. …”
    Get full text
    Article
  2. 7482

    Who is Responsible for Instability in the Democratic Republic of Congo? by G. M. Sidorova

    Published 2014-12-01
    “…Due to governmental weakness, economic backwardness, chronical lack of finance resources, interethnic conflicts, all-round and widely spread corruption of the authorities, the Congolese government at the moment is not able to overcome scores of problems including the problem of security. Assistanceprovided to the DRC by itspartnerssuch as, first of all, the former metropolitan country Belgium, as well as the USA, Great Britain, the Europe Union and China works only in favourof these country-donors. …”
    Get full text
    Article
  3. 7483

    LoRaWAN-based smart water management IoT applications: a review by Enas F. Khairullah, Atheer M. Alghamdi, Mohammad M. Al mojamed, Sherali Zeadally

    Published 2025-02-01
    “…We also discuss scalability, simulation, security, and applications of LoRaWAN in water-management systems. …”
    Get full text
    Article
  4. 7484

    Expansion of the buffalo agri-system and industry following the One Health approach by Gabriela M. Carruyo, Ericka Calderon, Armando E. Hoet

    Published 2023-11-01
    “…Risk assessment and traceability during food production and distribution are crucial to ensure food safety, security, and sustainability. As growing food  producers and suppliers, Buffalo Agri-systems and industry have the opportunity to positively impact the development of sustainable economic systems. …”
    Get full text
    Article
  5. 7485
  6. 7486

    An Optimized Hyperparameter Tuning for Improved Hate Speech Detection with Multilayer Perceptron by Muhamad Ridwan, Ema Utami

    Published 2024-08-01
    “…This improvement enables more reliable and efficient automated moderation, which is crucial for the integrity and security of digital communication platforms such as Twitter.…”
    Get full text
    Article
  7. 7487

    THE PROBLEMS OF BRINGING RUSSIAN TRADE POLICY IN LINE WITH WTO REQUIREMENTS by M. A. Petrova

    Published 2013-10-01
    “…The article analyzes the role of trade policy in ensuring the competitiveness of the automotive industry – one of the most sensitive to the changes of economic conditions and important for providing national economic security – and finding a balance between the need to regulate the internal market and the implementation of the commitments under WTO. …”
    Get full text
    Article
  8. 7488

    Relationship of Maternal Hemoglobin and the Intergenic Period with Birth Weight by Carlos Alberto Llerena Gómez, Evelyn Carolina Betancourt Rubio, Karen Aracelly Tobar Almendariz

    Published 2024-01-01
    “…<br /><strong>Method:</strong> a descriptive and cross-sectional study was carried out on pregnant women treated at a hospital of the Ecuadorian Social Security Institute during the first semester of 2023. …”
    Get full text
    Article
  9. 7489

    ‘Health Camp’ model: a unique approach for child vaccination in non-state armed actor controlled, inaccessible geographies in Somalia by Mohamed Hussein Kahow, Salad Ahmed Halane, Asma Ali, Rashed Shah

    Published 2024-12-01
    “…The project underscores the critical role of local community-based organizations and clan elders in reaching inaccessible populations through humanitarian negotiation amidst security challenges. The project has achieved significant milestones aligned with national health strategic plans, including progress towards universal health coverage and improved immunization access in Somalia’s most challenging regions.…”
    Get full text
    Article
  10. 7490

    Detecting shallow subsurface anomalies with airborne and spaceborne remote sensing: A review by Adam M. Morley, Tamsin A. Mather, David M. Pyle, J-Michael Kendall

    Published 2025-06-01
    “…The merits are extensive, with archaeological prospecting, environmental risk mitigation, natural resource exploration, defence and security and speleological research all benefitting from subsurface imaging capabilities over unknown territory, difficult terrain, hazardous environments and inaccessible ground. …”
    Get full text
    Article
  11. 7491

    Physics-Informed Denoising Model for Dynamic Data Recovery of Power Systems by Jian Li, Guoqiang Lu, Yongbin Li, Dongning Zhao, Huaiyuan Wang, Yucheng Ouyang

    Published 2025-01-01
    “…However, the actual data may be corrupted by noise in the process of measurement or transmission, and the accuracy of dynamic security assessment (DSA) will be affected. In light of the poor interpretability exhibited by traditional machine learning (ML) methods in denoising, a physics-informed denoising model (PIDM) for dynamic data recovery is proposed. …”
    Get full text
    Article
  12. 7492

    A Cryptographic Scheme for Construction of Substitution Boxes Using Quantic Fractional Transformation by Abid Mahboob, Muhammad Asif, Muhammad Nadeem, Aysha Saleem, Sayed M. Eldin, Imran Siddique

    Published 2022-01-01
    “…In the new era of cryptography, Substitution Boxes (S-Boxes) are very important to raise confusion in cipher text and the security of encryption directly depends on the algebraic strength of S-box. …”
    Get full text
    Article
  13. 7493

    Application of Sustainable Education Innovation in the Integrated Teaching of Theory and Practice Adopted in the Auto Chassis Course by Tzu-Chia Chen, Jiuqi Yu, Amir-Mohammad Golmohammadi

    Published 2022-01-01
    “…After surveying and collecting the security incidents, which occurred in the integrated teaching of theory and practice adopted in the automobile chassis course, the presented reality that teachers were reluctant to accept the integrated teaching of theory and practice, and the deficiencies sensed in the school-enterprise engagement; the researcher firstly obtained the risk priority number (RPN) of each deficiency above via fuzzy failure mode and effect analysis (FFMEA) and accordingly expounded how TRIZ was applied under this circumstance. …”
    Get full text
    Article
  14. 7494
  15. 7495

    Modifications of the maximum expiratory flow in bronchial asthma treatment using Intal and Ketotifeno. by Belkis M. Vicente Sánchez, Nallelys Villanueva Bravo, Luis M. Padrón Velásquez, Marylin Aroche Quintana

    Published 2003-12-01
    “…<strong><br />Results</strong>: They in our patient prevailed the ages of 15- 24 years and of 25- 34 years and the feminine sex, the Salbutamol was the more utilized in the previous treatments, initially the greater number of asthmatic they were classified like moderates and upon concluding the 12mo month the 72.9% they of the total of the pattern behaved like light; they with both treatments improved the courages of FEM, although the group of patient that you received treatment with Intal you showed an improvement in statements security much more rapid. <strong><br />Conclusions:</strong> That patient that they utilized Intal had a more rapid elevation of the FEM.…”
    Get full text
    Article
  16. 7496

    Designing and Launching a System for Presenting Marine Charts and Spatial Information (Native Marine Web Service) by Ali Hasankhani

    Published 2023-09-01
    “…,Which have sometimes been sanctioned for Iran, by Iranian sailors will bring special security-technical problems. The production and publication of nautical charts is the most important infrastructure of hydrographic knowledge.none of which have achieved the desired result, and at best, they were satisfied with the ability to load grid layers in one system. …”
    Get full text
    Article
  17. 7497

    Identifying and prioritizing cultural factors affecting the physical structure of the city with emphasis on indigenous architecture (Case study: Sarab city) by Mohammad Golmohammadi, Mohammad Adalatkhah, Akbar Abdollahzadeh Tarf

    Published 2020-12-01
    “…The results of the BMW model showed that among the identified factors, the privacy factor with a final score of 0.298 in the first place, the security quality factor with a final score of 0.273 in the second place, the nature connection factor and social interactions with a final score of 220 / 0 is in the third place and the hierarchical factor is in the fourth place with a final score of 0.209.…”
    Get full text
    Article
  18. 7498

    E-Municipality and Public Relations in Digitalized Cities: An Interpretive Content Analysis on TR42 Region Municipalities by İlayda Uzun, Hasan Tutar

    Published 2024-06-01
    “…The websites of the municipalities in question in the research were analyzed with interpretive content analysis techniques regarding Security/Privacy, Citizen and Social Interaction, and operational-formal informational and Strategic Skill variables and various suggestions were made. …”
    Get full text
    Article
  19. 7499

    Modern State and civil society: promising directions and forms of interaction in the field of public administration by O. M. Muzychuk, K. L. Buhaichuk

    Published 2023-10-01
    “…The promising directions of interaction between the modern State and civil society, which are divided into separate forms, include interaction of the State with members of diasporas through various institutions and practices, interaction of the State with civil society institutions formed by higher education students, interaction of the State with civil society in the field of environmental security of the State.…”
    Get full text
    Article
  20. 7500

    Decision making about increased building automation – barriers, drivers and motivation factors by Anna-Lena Lane, Anna-Lena Lane, Andreas Selhammer, Patrik Thollander, Patrik Thollander, Mathias Cehlin

    Published 2025-01-01
    “…An important knowledge barrier was found as knowledge is needed for decisions about investments, use of BMS and decisions regarding IT security, such as handling of data. A key conclusion is the need for a facilitator, as knowledge is needed for decisions about BMS investments and for its use. …”
    Get full text
    Article