Showing 661 - 680 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 661

    Traffic-related air pollutants (TRAP) in relation to respiratory symptoms among security guards by Muniandy Pravin, Abdul Aziz Nurhanim, Zainal Abidin Nur Balqishanis, Mohd Jamil Putri Anis, Ahnan Karthiga

    Published 2025-01-01
    “…Occupational lung disease is a significant health concern in Malaysia, which, relatively little research on respiratory issues among Malaysian security personnel. The objective of this study is to evaluate the exposure level of TRAP PM2.5 and respiratory symptoms among security guards. …”
    Get full text
    Article
  2. 662
  3. 663
  4. 664
  5. 665

    Improve security monitoring knowledge management in IoT applications based on user behavior analysis by Hossein Amoozad-Khalili

    Published 2023-09-01
    “…Using the proposed method, users can transfer their data to IoT storage servers with more security than similar methods without knowing how and where to store it. …”
    Get full text
    Article
  6. 666

    Secure Image Reconstruction using Deep Learning-based Autoencoder with Integrated Encryption Layers by Wurood Abd Ali

    Published 2024-12-01
    “… This study presents an autoencoder model designed for secure image reconstruction through the integration of encryption and decryption layers within its framework. …”
    Get full text
    Article
  7. 667

    The politics of gating (A response to Private Security and Public Space by Manzi and Smith-Bowers) by Rowland Atkinson

    Published 2008-05-01
    “…Critically then the risk is that ignoring the political and normative aspects of gating, as I believe Manzi and Smith-Bowers do, may lead to further and deeper socio-spatial segregation that itself excludes the voice of social groups least able to challenge or, indeed, reside in gated developments and the additional security that they appear to offer. …”
    Get full text
    Article
  8. 668

    SOCIAL NETS AS A NEW FACTOR OF SYSTEM SECURITY IN RUSSIA IN THE 21ST CENTURY by S. A. Kravchenko, A. I. Podberezkin

    Published 2016-12-01
    “…The article analyzes the interconnection of social aspects of the Internet and security issues in Russia. It shows that contemporary realities acquire global network character that has ambivalent impact on the development of civilizational and social interactions. …”
    Get full text
    Article
  9. 669

    Secured Wireless Network Based on a Novel Dual Integrated Neural Network Architecture by H. V. Ramachandra, Pundalik Chavan, S. Supreeth, H. C. Ramaprasad, K. Chatrapathy, G. Balaraju, S. Rohith, H. S. Mohan

    Published 2023-01-01
    “…Owing to the importance of their users, components, and services to our everyday lives, the network must secure all of these. With such a wide range of devices and service types being present in the 5G ecosystem, security issues are now much more prevalent. …”
    Get full text
    Article
  10. 670

    Asymptotic Distribution of Isolated Nodes in Secure Wireless Sensor Networks under Transmission Constraints by Y. Tang, Q. L. Li

    Published 2016-01-01
    “…The Eschenauer-Gligor (EG) key predistribution is regarded as a typical approach to secure communication in wireless sensor networks (WSNs). …”
    Get full text
    Article
  11. 671
  12. 672

    Toward secure and accountable data transmission in Narrow Band Internet of Things based on blockchain by Hanshu Hong, Bing Hu, Zhixin Sun

    Published 2019-04-01
    “…While Narrow Band Internet of Things is gradually designed for commercial applications, it also confronts with several security concerns such as identification and privacy. …”
    Get full text
    Article
  13. 673
  14. 674
  15. 675

    Risk Prediction Algorithm of Social Security Fund Operation Based on RBF Neural Network by Linxuan Yang

    Published 2021-01-01
    “…In order to ensure the benign operation of the social security fund system, it is necessary to understand the social security fund facing all aspects of the risk, more importantly to know the relationship between different risks. …”
    Get full text
    Article
  16. 676
  17. 677
  18. 678

    Enhancing Intelligent Transport Systems Through Decentralized Security Frameworks in Vehicle-to-Everything Networks by Usman Tariq, Tariq Ahamed Ahanger

    Published 2025-01-01
    “…The result is a substantial advancement in securing vehicular networks.…”
    Get full text
    Article
  19. 679

    Providing a customer satisfaction model of non-attendance services in the social security organization by Hossein Barzgar, Vahid Sanavi Garoosiyan, ali hossein zadeh

    Published 2024-11-01
    “…AbstractThe purpose of this research is to provide a model of customer satisfaction with non-attendance services in the social security organization. The current research is applicable-developmental in terms of purpose; and descriptive-analytical based on the method. …”
    Get full text
    Article
  20. 680

    Diegif: An efficient and secured DICOM to EGIF conversion framework for confidentiality in machine learning training by Abdullah Al Siam, Md Maruf Hassan, Md Atikur Rahaman, Masuk Abdullah

    Published 2025-03-01
    “…Medical imaging plays a critical role in contemporary healthcare, although it confronts issues relating to storage, security, and confidentiality in machine learning-based diagnostic systems. …”
    Get full text
    Article