Showing 7,721 - 7,740 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 7721

    Life-history adaptation under climate warming magnifies the agricultural footprint of a cosmopolitan insect pest by Estelle Burc, Camille Girard-Tercieux, Moa Metz, Elise Cazaux, Julian Baur, Mareike Koppik, Alexandre Rêgo, Alex F Hart, David Berger

    Published 2025-01-01
    “…Abstract Climate change is affecting population growth rates of ectothermic pests with potentially dire consequences for agriculture and global food security. However, current projection models of pest impact typically overlook the potential for rapid genetic adaptation, making current forecasts uncertain. …”
    Get full text
    Article
  2. 7722

    Analysis of a No Equilibrium Linear Resistive-Capacitive-Inductance Shunted Junction Model, Dynamics, Synchronization, and Application to Digital Cryptography in Its Fractional-Ord... by Sifeu Takougang Kingni, Gaetan Fautso Kuiate, Romanic Kengne, Robert Tchitnga, Paul Woafo

    Published 2017-01-01
    “…Finally, a cryptographic encryption scheme with the help of the finite-time synchronization of fractional-order chaotic no equilibrium LRCLSJ models is illustrated through a numerical example, showing that a high level security device can be produced using this system.…”
    Get full text
    Article
  3. 7723

    Crop wild relatives conservation in the Chechen Republic by L. V. Bagmet, M. A. Taisumov

    Published 2019-01-01
    “…Plant genetic resources (PGR) conservation is an indispensable condition for ensuring the country's economic and environmental security. The most important component of the PGR status assessment is the study of crop wild relatives in a particular region. …”
    Get full text
    Article
  4. 7724

    Multiplex Community Detection in Social Networks Using a Chaos-Based Hybrid Evolutionary Approach by Bagher Zarei, Bahman Arasteh, Mehdi Asadi, Vahid Majidnezhad, Saeid Taghavi Afshord, Asgarali Bouyer

    Published 2024-01-01
    “…This knowledge is valuable across various disciplines like marketing, management, epidemiology, homeland security, and psychology. An essential task within network analysis is deciphering the structure of complex networks including technological, informational, biological, and social networks. …”
    Get full text
    Article
  5. 7725

    Conceptualizing a model for the use of software as a service to improve the dynamic capabilities of small and medium enterprises in healthcare sector by P. Makelana, R. Kekwaletswe, M. A. Segooa

    Published 2024-06-01
    “…Results: The study results show that customer service (β=0.125, p<0.05), sharing information (β=0.132, p<0.05), internet access (β=0.057, p<0.05), data security (β=0.022, p<0.05), top management support (β=0.427, p<0.05), competitive pressure (β=0.178, p<0.05), viability (β=0.325, p<0.05) and task-technology fit (β=0.032, p<0.05) are highly significant on the use of SaaS to improve the DCs of healthcare SMEs. …”
    Get full text
    Article
  6. 7726

    How Do Climate and Nonclimatic Variables Influence the Production of Agricultural Staple Crops in Vulnerable Rural Communities in the Bawku Municipality of Northern Ghana? by Rashida Ayumah, Felix Asante, Lawrence Guodaar, Gabriel Eshun

    Published 2020-01-01
    “…Also, policy on climate adaptation should take into account the interaction of external drivers of climate and nonclimatic variables to better build farmers’ resilience for food security at the local level.…”
    Get full text
    Article
  7. 7727

    Home care program for high-risk pregnancies: a qualitative study of care providers perspectives from Iran by Masoumeh sayahi, Shahrbanoo Salehin, Mehrnoosh Zakerkish, Afsaneh Keramat, Shahrbanoo Goli

    Published 2025-01-01
    “…The main categories and subcategories were “support dimension (family and community support for high-risk pregnant women),” “education dimension (empowerment of high-risk pregnant women and care providers),” and “infrastructures of the program (acculturalization, provision of program budget and care tariff, means and equipment, security and ethical issues, manpower, and the necessary arrangements for the home care).” …”
    Get full text
    Article
  8. 7728

    Design of an Integrated Model for Video Summarization Using Multimodal Fusion and YOLO for Crime Scene Analysis by Sai Babu Veesam, Aravapalli Rama Satish

    Published 2025-01-01
    “…Real-time learning through RL-HITL ensures model refinement and hereby gives long-term benefits in security and surveillance application, hence analysis at a crime scene for different scenarios.…”
    Get full text
    Article
  9. 7729

    Interactive Influence Analysis of Tunnel Lateral Clearance on Driving Behavior Using Expressway Field Data by Li Wan, Mo Zhou, Ge Liu, Chang-An Zhang, Ying Yan

    Published 2021-01-01
    “…Changes in lateral clearance are prone to drastic changes in the driving environment at the entrance and exit of the tunnel, which can cause a driver to become psychologically stressed and deviate from the center of a lane, thus creating a greater security risk. However, most of the existing regulations and studies only focus on the horizontal and vertical alignment of the tunnel entrances and exits, and there are few studies on the influence of lateral clearance on driving behavior. …”
    Get full text
    Article
  10. 7730

    Current practices and key challenges associated with the adoption of resilient, circular, and sustainable food supply chain for smallholder farmers to mitigate food loss by Jessika Milagros Vásquez Neyra, Jessika Milagros Vásquez Neyra, Mirza Marvel Cequea, Valentina Gomes Haensel Schmitt

    Published 2025-01-01
    “…This approach addresses identified gaps and contributes to food security, environmental sustainability, and the achievement of Sustainable Development Goals 1 (No Poverty), 2 (Zero Hunger), and 12 (Responsible Consumption and Production).…”
    Get full text
    Article
  11. 7731

    Genotyping Genebank Collections: Strategic Approaches and Considerations for Optimal Collection Management by Noelle L. Anglin, Peter Wenzl, Vania Azevedo, Charlotte Lusty, David Ellis, Dongying Gao

    Published 2025-01-01
    “…The maintenance of plant germplasm and its genetic diversity is critical to preserving and making it available for food security, so this invaluable diversity is not permanently lost due to population growth and development, climate change, or changing needs from the growers and/or the marketplace. …”
    Get full text
    Article
  12. 7732
  13. 7733

    Chemical Profiling of the White and Brown Teff (Eragrostis tef (Zuccagni) Trotter) Injera and Their Nutritional Properties by Hagos Yisak, Estifanos Ele Yaya, Mesfin Redi-Abshiro, Bhagwan Singh Chandravanshi

    Published 2024-01-01
    “…Teff (Eragrostis tef (Zuccagni) Trotter) is one of the underutilized crops that can contribute to food security with distinct nutritional values. The present study was aimed to determine the total phenolic content, total fat content, and fatty acid profiles and evaluate the nutritional values of the white and brown Injera (ready-to-eat food) using UV-Vis and GC-MS methods. …”
    Get full text
    Article
  14. 7734

    Long-Term Monitoring of Individuals With Chronic Obstructive Pulmonary Disease Using Digital Health Technology: Qualitative Study by Shih-Ying Chien, Han-Chung Hu, Hsiu-Ying Cho

    Published 2025-02-01
    “…By addressing identified barriers and capitalizing on facilitators, advancements can be made in the development and use of DHT, especially in overcoming challenges such as information security and operational methods. The implementation of the recommended strategies will likely lead to improved COPD care outcomes.…”
    Get full text
    Article
  15. 7735
  16. 7736
  17. 7737

    Lip forgery detection via spatial-frequency domain combination by Jiaying LIN, Wenbo ZHOU, Weiming ZHANG, Nenghai YU

    Published 2022-12-01
    “…In recent years, numerous “face-swapping” videos have emerged in social networks, one of the representatives is the lip forgery with speakers.While making life more entertaining for the public, it poses a significant crisis for personal privacy and property security in cyberspace.Currently, under non-destructive conditions, most of the lip forgery detection methods achieve good performance.However, the compression operations are widely used in practice especially in social media platforms, face recognition and other scenarios.While saving pixel and time redundancy, the compression operations affect the video quality and destroy the coherent integrity of pixel-to-pixel and frame-to-frame in the spatial domain, and then the degradation of its detection performance and even misjudgment of the real video will be caused.When the information in the spatial domain cannot provide sufficiently effective features, the information in the frequency domain naturally becomes a priority research object because it can resist compression interference.Aiming at this problem, the advantages of frequency information in image structure and gradient feedback were analyzed.Then the lip forgery detection via spatial-frequency domain combination was proposed, which effectively utilized the corresponding characteristics of information in spatial and frequency domains.For lip features in the spatial domain, an adaptive extraction network and a light-weight attention module were designed.For frequency features in the frequency domain, separate extraction and fusion modules for different components were designed.Subsequently, by conducting a weighted fusion of lip features in spatial domain and frequency features in frequency domain, more texture information was preserved.In addition, fine-grained constraints were designed during the training to separate the inter-class distance of real and fake lip features while closing the intra-class distance.Experimental results show that, benefiting from the frequency information, the proposed method can enhance the detection accuracy under compression situation with certain transferability.On the other hand, in the ablation study conducted on the core modules, the results verify the effectiveness of the frequency component for anti-compression and the constraint of the dual loss function in training.…”
    Get full text
    Article
  18. 7738
  19. 7739

    Estimating the Need for Hospital Beds in Bushehr Province, Focusing on Treatment Poles: a Prospective Study to 2032 by Habib Omranikhoo, Alireza Raeisi, Amir hossein Darabi, Mahdi Rezaee

    Published 2025-01-01
    “…Also, the participation of medical service providers in the province, including public sector (university), non-government public sector (social security), non-academic government sector (oil/armed forces), charity and private sector will be distributed as 65.66, 12.39, 3.92, 6.81 and 10.23 percent, respectively. …”
    Get full text
    Article
  20. 7740

    The growth–environment nexus amid geopolitical risks: cointegration and machine learning algorithm approaches by Md. Idris Ali, Md. Atikur Rahaman, Mohammed Julfikar Ali, Md. Ferdausur Rahman

    Published 2025-02-01
    “…These risks disrupt economic growth, destabilize energy supply chains, and foster economic uncertainty, often prioritizing energy security over environmental sustainability. Existing literature inadequately addresses how geopolitical risks interact with environmental sustainability, particularly within developed economies like Canada. …”
    Get full text
    Article