Showing 1,741 - 1,760 results of 9,720 for search '"security"', query time: 0.08s Refine Results
  1. 1741

    Systematic Review of Usability Factors, Models, and Frameworks with Blockchain Integration for Secure Mobile Health (mHealth) Applications by Irum Feroz, Nadeem Ahmad

    Published 2024-12-01
    “…Blockchain integration emerged as a promising approach to improve data security, interoperability, and user trust, particularly for older adults who engage with complex, multimodal health data. …”
    Get full text
    Article
  2. 1742
  3. 1743
  4. 1744
  5. 1745

    Systems resource allocation algorithm for RIS-assisted D2D secure communication based on parallel CNN by Zhengyu ZHU, Gengwang HOU, Chongwen HUANG, Gangcan SUN, Wanming HAO, Jing LIANG

    Published 2022-03-01
    “…To meet the requirements of intelligent signal processing and physical layer security, aiming at the shortage of spectrum resources, a resource allocation algorithm for reconfigurable intelligent surface (RIS)-assisted the device to device (D2D) communication was proposed.D2D users communicated by multiplexing the spectrum resources of cellular users.Considering the constraints of D2D transmission rate, base station transmission power and RIS transmission phase shift, the problem of maximizing user security rate was formulated.To solve the nonlinear programming problem, a parallel convolutional neural network (CNN) algorithm was proposed to obtain the optimal resource allocation scheme.Simulation results show that the parallel CNN algorithm can effectively improve the secrecy rate and it is significantly better than other benchmark algorithms.…”
    Get full text
    Article
  6. 1746

    Harnessing the potential of shared data in a secure, inclusive, and resilient manner via multi-key homomorphic encryption by David Ha Eun Kang, Duhyeong Kim, Yongsoo Song, Dongwon Lee, Hyesun Kwak, Brian W. Anthony

    Published 2024-06-01
    “…Using the AI4I public predictive maintenance dataset, we demonstrate the MK-HELR algorithm, setting the stage for further research in secure, dynamic, and collaborative multi-party learning scenarios.…”
    Get full text
    Article
  7. 1747
  8. 1748

    Optimal Information Hiding: Advanced Bitstream-Based Watermarking for Secure and Efficient Integration of Image Data in Digital Videos by null Ramyashree, Venugopala P. S., Raghavendra S., null Sarojadevi

    Published 2024-01-01
    “…The outcomes underscore its practical viability for copyright protection, contributing to a more secure digital media landscape.…”
    Get full text
    Article
  9. 1749
  10. 1750

    EMPOWERMENT STRATEGY THROUGH THE ROLE OF THE TERRITORIAL TASK FORCE IN HANDLING SOCIAL AND SECURITY CONFLICT IN PUNCAK JAYA DISTRICT by Agustina Setiawan, Mamat Sonjaya, Dicky Febriansyah Rokhmat

    Published 2024-12-01
    “…This research aims to analyze the strategy for empowering the Papua defense region through the role of the Territorial Task Force in handling social and security conflicts in Puncak Jaya Regency. This research uses Strategy theory according to Thomas Schelling, namely management instruments for survival and winning competition. …”
    Get full text
    Article
  11. 1751

    EFFECT OF TRAINING ON CAREER PERFORMANCE OF NIGERIA SECURITY AND CIVIL DEFENSE CORPS (NSCDC) PERSONNEL IN KADUNA STATE COMMAND by LEKSHUM SUNDAY AMOS

    Published 2022-12-01
    “…It recommended among others that the NSCDC as a security organization should organize training on regular basis to improve the career performance of personnel of their organization in view of the current security challenges facing the country. …”
    Get full text
    Article
  12. 1752
  13. 1753

    A Federated Learning Framework for Enhanced Data Security and Cyber Intrusion Detection in Distributed Network of Underwater Drones by Mansahaj Singh Popli, Rudra Pratap Singh, Navneet Kaur Popli, Mohammad Mamun

    Published 2025-01-01
    “…This approach significantly improves data security by ensuring that sensitive information never leaves the local devices, reducing the risk of interception or compromise during transmission. …”
    Get full text
    Article
  14. 1754

    EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks by Sakshi Patni, Joohyung Lee

    Published 2024-12-01
    “…We also create an access control system based on smart contracts and a secure multi-party computing protocol for model updates. …”
    Get full text
    Article
  15. 1755

    Optimal Connection of Offshore Wind Farm with Maximization of Wind Capacity to Power Systems considering Losses and Security Constraints by Leandro A. Vasconcelos, João A. Passos Filho, Leonardo W. de Oliveira, Othon F. Avila

    Published 2019-01-01
    “…The objective of this work is to present a methodology to determine the optimal OWF connection point in a power system, with maximum penetration of firm wind power and minimum loss, considering security constraints related to the “N−1” contingency criterion, exchange limits between areas, and a strategy to reduce the number of constraints in the optimization problem. …”
    Get full text
    Article
  16. 1756
  17. 1757
  18. 1758
  19. 1759
  20. 1760