Showing 8,361 - 8,380 results of 9,720 for search '"security"', query time: 0.09s Refine Results
  1. 8361

    Eating "rubbish"? Exploring the herbal secrets of "Laji-He," a traditional herbal rice snack from southern China by Renchuan Hu, Qianyun Wang, Zhongxin Duan, Yunan Hu, Kedao Lai, Xiaohui Cai, Ya Peng, Binsheng Luo

    Published 2025-01-01
    “…Preserving and promoting the culture of Laji-He can contribute to enhancing food security and sovereignty at both the local and national levels.…”
    Get full text
    Article
  2. 8362

    Desain Penilaian Risiko Privasi pada Aplikasi Seluler Melalui Model Machine Learning Berbasis Ensemble Learning dan Multiple Application Attributes by R. Ahmad Imanullah Zakariya, Kalamullah Ramli

    Published 2023-08-01
    “…However, not all developers of applications supply detailed information about the app's security aspects, making it difficult for users to assess and understand the risk of privacy breaches they confront. …”
    Get full text
    Article
  3. 8363

    How prepared is Nigeria digital payment for health workers? A landscape analysis by Folashayo Peter Adeniji, David Ayobami Adewole, Segun Bello, Elizabeth Ekirapa, Juliet Aweko, Vincent Michael Kiberu, Charles Opio, Peter Waiswa, Olufunmilayo Ibitola Fawole

    Published 2025-02-01
    “…Challenges of digital payments included: delayed resolution of problems associated with digital payment such as failed transactions, cyber security, double payments, and unfriendly bank policies. …”
    Get full text
    Article
  4. 8364

    Characteristics of water supply and demand in an agroforestry ecosystem under long-term continuous cropping assessed using the RZWQM2 model by Jing Zhang, Li Wang, Gong Cheng, Liangliang Jia

    Published 2025-02-01
    “…Sustainable agricultural management is one of the important factors for ensuring food security. In recent years, many wheat and maize fields on the Loess Plateau of China have been transformed into apple orchards for better economic returns. …”
    Get full text
    Article
  5. 8365

    The Ethical Challenges of Gamification in Iran: Uncovering the Dark Side by Mona Jami Pour, Hamideh Binaei

    Published 2024-06-01
    “…The extracted categories, in order of priority, include negative mental and physical consequences, access-related challenges, security and privacy challenges, content-related challenges, challenges related to the quality and accuracy of information (information pollution), challenges related to intellectual property rights, and challenges of responsibility and accountability. …”
    Get full text
    Article
  6. 8366

    Personality characteristics of students in the regulation of network activity by S. E. Panshina, N. L. Sungurova, N. B. Karabushchenko

    Published 2021-03-01
    “…The Internet for students is above all a comfortable environment, where it is possible to feel calm and security, to expand social contacts, to find a new experience. …”
    Get full text
    Article
  7. 8367

    Examining future spatiotemporal changes in blue and green water using an enhanced SWAT model: A Jialing River basin case study by Mingyan Wu, Fuquan Ni, Yu Deng, Nan Jiang, Mengyu Zhu, Huazhun Ren, Ziying Yue, Yuxuan Wang

    Published 2025-01-01
    “…Despite the suppression of vegetation activity due to elevated CO2 and high temperatures in future scenarios, increased vegetation growth demands in agricultural areas exacerbate soil water shortages and elevate future risks to water and food security. The findings provide scientific support for comprehensive water resource management of the Jialing River Basin and offer scientific references for water resource allocation and drought response under climate change in the basin.…”
    Get full text
    Article
  8. 8368

    Lithuanian exile press during five decades of soviet ban by Silvija Vėlavičienė

    Published 2024-08-01
    “…The community, established by Soviet institutions for relations with nationals abroad, was under the strict control of national security organizations and was commanded from Moscow. …”
    Get full text
    Article
  9. 8369

    Utilizing the Ethereum blockchain for retrieving and archiving augmented reality surgical navigation data by Sai Batchu, Michael J. Diaz, Lauren Ladehoff, Kevin Root, Brandon Lucke-Wold

    Published 2023-02-01
    “…Aim: Conventional techniques to share and archive spinal imaging data raise issues with trust and security, with novel approaches being more greatly considered. …”
    Get full text
    Article
  10. 8370
  11. 8371

    Effects of tropical cyclone Freddy on the social determinants of health: the narrative review of the experience in Malawi by Joseph Okeibunor, Otim Patrick Cossy Ramadan, Ishata Nannie Conteh, Abdou Salam Gueye, Jayne Byakika-Tusiime, Annie Chauma-Mwale, Ebenezer Obi Daniel, Dick Chamla, Fiona Braka, Neema Kimambo Rusibamayila, Chol Thabo Yur, Emmanuel Maurice Ochien, Mathew Kagoli

    Published 2024-07-01
    “…Areas of TCF’s main effects included health, shelter, education, nutrition, water sanitation and hygiene, agriculture and livelihood, transport and logistics including food security. The notable immediate humanitarian responses are donations, camp creation for accommodations, emergency life-saving response and essential healthcare services. …”
    Get full text
    Article
  12. 8372

    An Assessment of Microfinance Institution Services and Performance of Small and Medium Enterprises in Kabale Municipality. by Mugarura, Elijah

    Published 2023
    “…SME Clubs and marketing associations offered personal liability protection, business security, access to capital and resources, created a less competitive business environment, contributed to business networking and offered a collective voice for small business owners. …”
    Get full text
    Thesis
  13. 8373

    Loan Monitoring Costs and Loan Payment in SACCOs: A Case Study of Mitooma People's SACCO in Mitooma Town Council Mitooma District. by Mugarura, Adison

    Published 2024
    “…The study findings revealed that physical verification of the borrower's workplace, physical verification of the borrower's mortgaged property or hypothecated, presentation of collateral security to the SACCO, giving early notifications to the borrower, pledging for the collaterals is another feature of the interest rate in most semi-formal financial institutions and internal auditing were some of loan monitoring techniques used by Mitooma People's SACCO. …”
    Get full text
    Thesis
  14. 8374

    Utilizing A Multi-Stage Transition Model for Analysing Child Stunting in Two Urban Slum Settlements of Nairobi: A Longitudinal Analysis, 2011-2014. by Oduro, Michael S., IddiI, Samuel, Asiedu, Louis, Asiki, Gershim, Kadengye, DamazoT.

    Published 2024
    “…Context-specific interventions targeting the groups of children identified by the socio-demographic factors are needed. Improving food security and exclusive breastfeeding could potentially reduce stunting in the slums.…”
    Get full text
    Article
  15. 8375

    Use of Garden Design to Enhance Mental Health Among the Selected Health Facilities in Kabale Town: A Case Study of Makanga Health Facility. by Nayebare, Maria

    Published 2024
    “…Healing gardens should provide a sense of security and safety, incorporating elements like trees, flowers, fragrant plants, and shrubs to evoke a feeling of hope and relaxation. …”
    Get full text
    Thesis
  16. 8376
  17. 8377

    Presenting the model of social entrepreneurship in the development of rural tourism in the target villages of Gilan province by Fatemeh Doozandeh Ziabari, hamed fallah tafti, Mir Mohammad Asadi, Mahdi Basouli

    Published 2025-02-01
    “…The obtained results showed that the nine main factors affecting the formation of higher education tourism in Iran in order of influence are: dynamic political exchanges with the world at the national level, the existence of macro-national policies in the field of academic interaction, facilitating the process of acceptance in political and administrative dimensions, the existence of economic and technical infrastructures for foreign students, the international language level of faculty members and staff as well as the structure of dynamic and accepting higher education, the existence of a sense of security in social, security and political dimensions for foreign students, and branding factors of universities and introducing historical, cultural and religious attractions to the world.Ratten (2020) in a research comprehensively examined researches in the field of entrepreneurship in tourism and it is noted that it focused on lifestyle and sustainable forms of tourism entrepreneurship without considering emerging technologies and other forms of entrepreneurship like digital and social.Research methodologyThe research method is qualitative and applicable. …”
    Get full text
    Article
  18. 8378
  19. 8379

    A Hybrid Model for Soybean Yield Prediction Integrating Convolutional Neural Networks, Recurrent Neural Networks, and Graph Convolutional Networks by Vikram S. Ingole, Ujwala A. Kshirsagar, Vikash Singh, Manish Varun Yadav, Bipin Krishna, Roshan Kumar

    Published 2024-12-01
    “…Soybean yield prediction is one of the most critical activities for increasing agricultural productivity and ensuring food security. Traditional models often underestimate yields because of limitations associated with single data sources and simplistic model architectures. …”
    Get full text
    Article
  20. 8380