Showing 261 - 280 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 261

    Application of edge computing technology in smart grid data security by Zhuo Cheng, Jiangxin Li, Jianjun Zhang, Chen Wang, Hui Wang, Juyin Wu

    Published 2025-02-01
    “…Absrtact: In order to solve the problem that the two-way flow of power and information between user nodes and service nodes in the smart grid poses a huge threat to the privacy and security of user data, and at the same time, the limitation of the power bureau's computing resources also brings users response delay, service quality degradation and other problems, the author proposes the application of edge computing technology in smart grid data security. …”
    Get full text
    Article
  2. 262

    Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks by Imanishimwe Jean de Dieu, Nyirabahizi Assouma, Maniraguha Muhamad, Wang Jin, Sungyoung Lee

    Published 2012-04-01
    “…To prolong the network lifetime, sensor nodes need a secure load-balancing route. In this paper, we investigate the facts of ensuring secure sensed data in a balanced energy network backbone, and propose energy-efficient secure path algorithm (ESPA) for WSNs. …”
    Get full text
    Article
  3. 263

    Blockchain-Based Secure Traceable Scheme for Food Supply Chain by S. Thangamayan, Kalyani Pradhan, Ganesh Babu Loganathan, S. Sitender, S. Sivamani, Mulugeta Tesema

    Published 2023-01-01
    “…The typical food traceability system’s data layer is made up of relational databases managed by core businesses, which cannot ensure data security. It is inefficient and requires a lot of upkeep. …”
    Get full text
    Article
  4. 264
  5. 265

    Climate change and agricultural productivity: Economic implications for food security by Riza Murabildayeva, Laila Bimendiyeva, Saltanat Kondybayeva, Zhanna Yermekova

    Published 2024-12-01
    “…Consequently, it is crucial to assess how the negative effects of climate change can be mitigated to ensure food security. This study evaluated the relationship between agriculture, food security, and CO2 emissions. …”
    Get full text
    Article
  6. 266
  7. 267
  8. 268

    Women’s Role in Violence and UN Women, Peace, and Security Agenda by Çağlayan Başer

    Published 2024-02-01
    Subjects: “…the women peace and security agenda…”
    Get full text
    Article
  9. 269
  10. 270

    State Participation in Energy Security Provision of the People’s Republic of China by I. F. Rakhimyanova

    Published 2015-08-01
    “…The article outlines the contours of energy security of China, the role of major players, including public authorities, government energy corporations, private businesses and the population. …”
    Get full text
    Article
  11. 271
  12. 272

    A statistical approach to the water scarcity implications on food security by J. AlBtoosh, A. Abu-Awwad, N. Obeidat

    Published 2024-11-01
    “…BACKGROUND AND OBJECTIVES: Jordan faces significant food security challenges due to population growth, climate change, and urbanization, straining limited water resources. …”
    Get full text
    Article
  13. 273

    FSAS: An IoT-Based Security System for Crop Field Storage by Chandra Prakash, Anurag Barthwal, Shwetank Avikal, Gyanendra Kumar Singh

    Published 2023-01-01
    “…In this study, we present a remote security management framework for monitoring the crop field storage house, known as the farm security alert system (FSAS). …”
    Get full text
    Article
  14. 274
  15. 275
  16. 276
  17. 277

    Precision Security: Integrating Video Surveillance with Surrounding Environment Changes by Wenfeng Wang, Xi Chen, Guiwei Zhang, Jing Qian, Peng Wei, Boqian Wu, Hongwei Zheng

    Published 2018-01-01
    “…Video surveillance plays a vital role in maintaining the social security although, until now, large uncertainty still exists in danger understanding and recognition, which can be partly attributed to intractable environment changes in the backgrounds. …”
    Get full text
    Article
  18. 278
  19. 279
  20. 280

    Application of convolutional neural networks in the intelligence security system subsystem by V. S. Demeshko, A. I. Фёдоров

    Published 2020-08-01
    “…The article proposes the structure of an integrated security system for areal facilities. The main subsystems included in its composition are considered. …”
    Get full text
    Article