Showing 7,821 - 7,840 results of 9,720 for search '"security"', query time: 0.09s Refine Results
  1. 7821

    Efficient Implementation of Mahalanobis Distance on Ferroelectric FinFET Crossbar for Outlier Detection by Musaib Rafiq, Yogesh Singh Chauhan, Shubham Sahay

    Published 2024-01-01
    “…Mahalanobis distance, the multivariate equivalent of the Euclidean distance, is used to detect the outliers in the correlated data accurately and finds widespread application in fault identification, data clustering, singleclass classification, information security, data mining, etc. However, traditional CMOS-based approaches to compute Mahalanobis distance are bulky and consume a huge amount of energy. …”
    Get full text
    Article
  2. 7822

    Annotation of Software Requirements Specification (SRS), Extractions of Nonfunctional Requirements, and Measurement of Their Tradeoff by Muhammad Asif, Ishfaq Ali, Muhamad Sheraz Arshed Malik, Muhammad Hasanain Chaudary, Shahzadi Tayyaba, Muhammad Tariq Mahmood

    Published 2019-01-01
    “…In the next step, we classified NFRs into two classes security triad and performance triad, and the cost is assumed constant for each NFR. …”
    Get full text
    Article
  3. 7823

    Global Transcriptomic Analysis of Inbred Lines Reveal Candidate Genes for Response to Maize Lethal Necrosis by Ann Murithi, Gayathri Panangipalli, Zhengyu Wen, Michael S. Olsen, Thomas Lübberstedt, Kanwarpal S. Dhugga, Mark Jung

    Published 2025-01-01
    “…Maize lethal necrosis (MLN) is a significant threat to food security in Sub-Saharan Africa (SSA), with limited commercial inbred lines displaying tolerance. …”
    Get full text
    Article
  4. 7824

    Payload State Prediction Based on Real-Time IoT Network Traffic Using Hierarchical Clustering with Iterative Optimization by Hao Zhang, Jing Wang, Xuanyuan Wang, Kai Lu, Hao Zhang, Tong Xu, Yan Zhou

    Published 2024-12-01
    “…IoT (Internet of Things) networks are vulnerable to network viruses and botnets, while facing serious network security issues. The prediction of payload states in IoT networks can detect network attacks and achieve early warning and rapid response to prevent potential threats. …”
    Get full text
    Article
  5. 7825

    Opportunities for promoting open data in the Caribbean through biobanks by Sushant Saluja, Simon G. Anderson

    Published 2025-02-01
    “…This article highlights the challenges of developing biobanks, including ensuring sufficient sample storage and data security, and the need for strong governance. It recommends solutions that involve regional collaboration, stakeholder engagement and increased investment in infrastructure. …”
    Get full text
    Article
  6. 7826

    The learning curve for hood‐sparing robotic‐assisted radical prostatectomy: A single‐surgeon experience by Keith R. S. Simpson, Jamie Krishnan, Linda Taylor, Alan McNeill, Daniel W. Good

    Published 2025-01-01
    “…Early continence was defined by patients reporting being ‘dry’ and with 0 pad or 1 confidence/security pad. Data was collected in an Excel spreadsheet, and SPSS was used to assess distribution with non‐parametric data being analysed using a Mann Whitney U test and parametric data with an unpaired t‐test. …”
    Get full text
    Article
  7. 7827

    Genome assembly and population analysis of tetraploid marama bean reveal two distinct genome types by Jin Li, Christopher Cullis

    Published 2025-01-01
    “…Abstract Tylosema esculentum (marama bean), an underutilized orphan legume native to southern Africa, holds significant potential for domestication as a rescue crop to enhance local food security. Well-adapted to harsh desert environments, it offers valuable insights into plant resilience to extreme drought and high temperatures. …”
    Get full text
    Article
  8. 7828

    Detection of SSL/TLS protocol attacks based on flow spectrum theory by Shize GUO, Fan ZHANG, Zhuoxue SONG, Ziming ZHAO, Xinjie ZHAO, Xiaojuan WANG, Xiangyang LUO

    Published 2022-02-01
    “…Network attack detection plays a vital role in network security.Existing detection approaches focus on typical attack behaviors, such as Botnets and SQL injection.The widespread use of the SSL/TLS encryption protocol arises some emerging attack strategies against the SSL/TLS protocol.With the network traffic collection environment that built upon the implements of popular SSL/TLS attacks, a network traffic dataset including four SSL/TLS attacks, as well as benign flows was controlled.Considering the problems that limited observability of existing detection and limited separation of the original-flow spatiotemporal domains, a flow spectrum theory was proposed to map the threat behavior in the cyberspace from the original spatiotemporal domain to the transformed domain through the process of “potential change” and obtain the “potential variation spectrum”.The flow spectrum theory is based on a set of separable and observable feature representations to achieve efficient analysis of network flows.The key to the application of flow spectrum theory in actual cyberspace threat behavior detection is to find the potential basis matrix for a specific threat network flow under the condition of a given transformation operator.Since the SSL/TLS protocol has a strong timing relationship and state transition process in the handshake phase, and there are similarities between some SSL/TLS attacks, the detection of SSL/TLS attacks not only needs to consider timing context information, but also needs to consider the high-separation representation of TLS network flows.Based on the flow spectrum theory, the threat template idea was used to extract the potential basis matrix, and the potential basis mapping based on the long-short-term memory unit was used to map the SSL/TLS attack network flow to the flow spectrum domain space.On the self-built SSL/TLS attack network flow data set, the validity of the flow spectrum theory is verified by means of classification performance comparison, potential variation spectrum dimensionality reduction visualization, threat behavior feature weight evaluation, threat behavior spectrum division assessment, and potential variation base matrix heatmap visualization.…”
    Get full text
    Article
  9. 7829

    The Impact of Logistics and Key Macroeconomic Indicators on the Development of the Startup Ecosystem in Europe by Valentyna Yakubiv, Antonina Tomashevska, Iryna Piatnychuk, Liliia Turovska, Finbarr Carter

    Published 2024-12-01
    “…Blockchain technology, with its transparency and security, fosters trust and efficiency in supply chains, a critical factor for startups seeking cost-effective and reliable logistics frameworks. …”
    Get full text
    Article
  10. 7830

    The European Union’s Policies Towards Iraq (2014–2020) by L. D. Oganisyan

    Published 2020-11-01
    “…The paper consists of three sections: the first one outlines the evolution of the EU strategic priorities in Iraq during 2014–2019, the second covers the major assistance programmes implemented by the European Union, both bilaterally and multilaterally, in Iraq; the third examines the EU reaction to the rising tensions in Iraq at the turn of 2019–2020.The author concludes that the EU’s growing interest in Iraq in recent years stems not only from concerns about transformation of this country into a source of cross-border challenges and threats, but also from the conviction of the EU officials that Iraq might potentially become the cornerstone of a new regional security architecture. On the basis of these considerations, the EU provides a comprehensive support to Iraq, including both humanitarian aid and development assistance aimed primarily at eliminating the fundamental causes of instability and radicalization. …”
    Get full text
    Article
  11. 7831

    The first Lithuanian Archaeological expedition in Afghanistan by Aleksiejus Luchtanas, Ramunė Butrimaitė

    Published 2008-08-01
    “…With the creation of the International Security Assistance Force (ISAF) in Afghanistan and the establishment of the provincial reconstruction team in Ghor province, conducted by Lithuania, civilian projects related to culture, education, and health services are being carried on. …”
    Get full text
    Article
  12. 7832

    ROAD TRANSPORT CRASHES AND SOCIO-ECONOMIC INDICATORS: A CASE OF NIGERIA by Adeyemi OMIDIJI

    Published 2021-07-01
    “…Insufficient funding (34 percent), political challenges/interferences (26 percent), lack of modern equipment and logistics (16 percent), poor training and retraining of road safety personnel (10 percent), and security challenges (8 percent) constituted the challenges of road transport crash related agencies in the reduction of road transport crashes. …”
    Get full text
    Article
  13. 7833

    The European Court of Human Rights as Part of Criminal Procedural Legislation of Ukraine by O. S. Rozumovskyi, O. O. Kochura

    Published 2020-09-01
    “…The author has analyzed the decisions of the European Court of Human Rights in regard to the conducted secret (search) actions by law enforcement agencies with further disclosure ob obtained evidence to the defense party; it has been also pointed out that the right to disclose evidence contained in criminal proceedings is not absolute to the defense and may be limited only in cases when there are the interests of national security, information protection or witness protection concerning the methods and forms of law enforcement agencies’ activity. …”
    Get full text
    Article
  14. 7834

    COVID-19 preparedness and response in rural and remote areas: A scoping review. by Lilian Dudley, Ian Couper, Niluka Wijekoon Kannangarage, Selvan Naidoo, Clara Rodriguez Ribas, Theadora Swift Koller, Taryn Young

    Published 2023-01-01
    “…Rural livelihoods and food security were affected through disruptions to local labour markets, farm produce markets and input supply chains. …”
    Get full text
    Article
  15. 7835

    Experiences of south Asian key workers in COVID-19 lockdowns in the United Kingdom by Rizwana Yousaf, Tipu Sultan

    Published 2025-01-01
    “…Although currently coping with increased debts, economic burdens and long COVID symptoms, comprehensive job security and entitlement to secure contracts with provisions to sick leaves and pays should be made available to address economic vulnerabilities of south Asian key workers.…”
    Get full text
    Article
  16. 7836

    You Only Attack Once: Single-Step DeepFool Algorithm by Jun Li, Yanwei Xu, Yaocun Hu, Yongyong Ma, Xin Yin

    Published 2024-12-01
    “…Adversarial attacks expose the latent vulnerabilities within artificial intelligence systems, necessitating a reassessment and enhancement of model robustness to ensure the reliability and security of deep learning models against malicious attacks. …”
    Get full text
    Article
  17. 7837
  18. 7838

    Habitat collectif « de standing » au cœur de Santiago du Chili : un modèle résidentiel vertical attractif ? by Line Henry

    Published 2013-11-01
    “…This phenomenon, added up to the historical and financial importance of the Eastern district, allow its residents to enjoy a high degree of socio-economical segregation, of security, of prestige and of proximity of high grade services, stores, facilities, jobs and transports. …”
    Get full text
    Article
  19. 7839

    Genetic parameter analysis and evaluation of maize hybrids under local climatic condition of Mymensingh, Bangladesh by Nahid Hasan, Md. Jahid Hasan Jone, Biswajit Das, Md. Nure Adil Siddique, Yousuf Islam, Md. Abul Kashem

    Published 2025-01-01
    “…Maize is a cornerstone of global agriculture, essential for food security, livestock feed, and industrial uses. With the increasing demand for maize due to population growth and changing dietary patterns, there is a pressing need to enhance maize production. …”
    Get full text
    Article
  20. 7840

    Improving the combat capability of small police tactical groups by I. V. Vlasenko, I. P. Lykhyi, Ya. O. Slatin

    Published 2024-12-01
    “…The main attention is paid to the importance of the optimal location of the commander in a small tactical group, which ensures the efficiency of performance of service and combat tasks, prompt decision-making, mobility and security of the group. The paper uses a scientific approach to improving the combat capability and tactics of small tactical groups. …”
    Get full text
    Article