Showing 21 - 40 results of 45 for search '"stealing"', query time: 0.07s Refine Results
  1. 21

    SURVIVING HUMANITARIAN CRISIS IN NIGERIA: COPING STRATEGIES OF INTERNALLY DISPLACED PERSONS (IDP) IN BENUE STATE, NORTHCENTRAL, NIGERIA by ISAAC OLAWALE ALBERT, JOEL ABAH

    Published 2024-07-01
    “…Findings reveal CSOs and State inadequacies in meeting the basic needs of the IDP; this have made the IDP to resort to street begging, petty stealing in and outside IDP camps; prostitution among aged women, adult ladies, teenagers and even children or minors; the study establishes that inadequate care to the IDP can lead to epidemics breakout, internal insecurity for the IDP and the community hosting them; thereby leading to environmental and community security threats. …”
    Get full text
    Article
  2. 22

    A privacy-enhanced framework with deep learning for botnet detection by Guangli Wu, Xingyue Wang

    Published 2025-01-01
    “…Therefore, preventing malicious persons from stealing data to infer privacy during the botnet detection process has become an issue worth pondering. …”
    Get full text
    Article
  3. 23
  4. 24

    Implementasi Algoritma Mickey 2.0 untuk Mengamankan Komunikasi Data pada Perangkat Bluetooth Low Energy by Amelia Dwi Rochani, Ari Kusyanti, Fariz Andri Bakhtiar

    Published 2022-12-01
    “…By implementing encryption algorithms on Bluetooth Low Energy devices it can guarantee data confidentiality aspects and can prevent hackers from eavesdropping and stealing data. In this research, Mickey 2.0 algorithm is used for encryption. …”
    Get full text
    Article
  5. 25

    Peer support for adult social care in prisons in England and Wales: a mixed-methods rapid evaluation by Holly Walton, Efthalia Massou, Chris Sherlaw-Johnson, Donna Gipson, Lucy Wainwright, Paula Harriott, Pei Li Ng, Stephen Riley, Stephen Morris, Naomi J Fulop

    Published 2025-01-01
    “…The most frequently reported risks include risks to recipients (e.g. safeguarding concerns or issues, risks of bullying, accusations of stealing, buddies overstepping boundaries, and dishonesty), risks to buddies (e.g. burden and emotional risks) and exploitation of role by staff, buddies and recipients (e.g. facilitating trafficking of contraband or being asked to do things not part of the role). …”
    Get full text
    Article
  6. 26

    Robbing Behavior in Honey Bees by Ryan Willingham, Jeanette Klopchin, James D. Ellis

    Published 2015-03-01
    “… Western honey bee workers can invade and steal honey/nectar from other colonies or sugar/corn syrup from feeders used to deliver syrup to other colonies. …”
    Get full text
    Article
  7. 27

    Robbing Behavior in Honey Bees by Ryan Willingham, Jeanette Klopchin, James D. Ellis

    Published 2015-03-01
    “… Western honey bee workers can invade and steal honey/nectar from other colonies or sugar/corn syrup from feeders used to deliver syrup to other colonies. …”
    Get full text
    Article
  8. 28

    Canine perspective taking: Anticipating the behavior of an unseen human by Ludwig Huber, Pauline van der Wolf, Machteld Menkveld, Stefanie Riemer, Christoph J. Völter

    Published 2025-02-01
    “…Here, we investigated canine perspective taking by challenging dogs to decide whether and where to steal food in the absence of a human who had prohibited them from doing so. …”
    Get full text
    Article
  9. 29

    Beelouse, Braula coeca Nitzsch (Insecta: Diptera: Braulidae) by Howard V. Weems, Jr., Malcolm T. Sanford

    Published 2004-02-01
    “… The beelouse, Braula coeca Nitzsch 1818, is a tiny commensalate wingless fly found in colonies of the honey bee, Apis mellifera Linnaeus, where it lives on the bodies of the bees and literally steals its food out of the mouth of its host. The beelouse is in the family Braulidae, comprising two genera, Braula and Megabraula, contains eight species (see Papp 1984f; Huttinger 1980; Grimaldi and Underwood 1986). …”
    Get full text
    Article
  10. 30

    Beelouse, Braula coeca Nitzsch (Insecta: Diptera: Braulidae) by Howard V. Weems, Jr., Malcolm T. Sanford

    Published 2004-02-01
    “… The beelouse, Braula coeca Nitzsch 1818, is a tiny commensalate wingless fly found in colonies of the honey bee, Apis mellifera Linnaeus, where it lives on the bodies of the bees and literally steals its food out of the mouth of its host. The beelouse is in the family Braulidae, comprising two genera, Braula and Megabraula, contains eight species (see Papp 1984f; Huttinger 1980; Grimaldi and Underwood 1986). …”
    Get full text
    Article
  11. 31

    Clinical Application of Partial Splenic Embolization by Yong-Song Guan, Ying Hu

    Published 2014-01-01
    “…It is also performed to exclude splenic artery aneurysms from the parent vessel lumen and prevent aneurysm rupture, to treat splenic artery steal syndrome and improve liver perfusion in liver transplant recipients, and to administer targeted treatment to areas of neoplastic disease in the splenic parenchyma. …”
    Get full text
    Article
  12. 32

    Security of Physical Library Materials and Utilisation: A Case Study of National Teachers College Kabale. by Arineitwe, Doreen

    Published 2023
    “…Poor security cannot cope with incessant pressure on the library by students who either steal or mutilate books/ journals without regard for laid down library regulations.…”
    Get full text
    Thesis
  13. 33

    Multiple-Feature Extracting Modules Based Leak Mining System Design by Ying-Chiang Cho, Jen-Yi Pan

    Published 2013-01-01
    “…There are many possible causes of information leakage, such as inadequate precautions during the programming process, which lead to the leakage of e-mail addresses entered online or insufficient protection of database information, a loophole that enables malicious users to steal online content. In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. …”
    Get full text
    Article
  14. 34

    Mothers and children without bread. Hunger in the Auxilio Social Cocinas de Hermandad and Comedores Infantiles during post-war Francoism (1939-1940) by Gloria Román Ruiz

    Published 2025-02-01
    “…It is also argued that, beyond the food supply problems of those famine years, the ineffectiveness of the Comedores and Cocinas was often due to the staff who worked in them, as they often used to steal food for their own consumption or to sell on the black market. …”
    Get full text
    Article
  15. 35

    The Diagnosis of Vertebrobasilar Insufficiency Using Transcranial Doppler Ultrasound by Ibrahim Alnaami, Muzaffer Siddiqui, Maher Saqqur

    Published 2012-01-01
    “…VBI may result from large vessel atherosclerotic disease, dissection, cervical compressive lesions, and subclavian steal phenomenon. Diagnostic transcranial Doppler (TCD) of VBI disease and hemodynamic posterior circulation TCD monitoring in symptomatic positions might prove a useful tool in establishing the diagnosis. …”
    Get full text
    Article
  16. 36

    Electricity Theft Detection in Power Grids with Deep Learning and Random Forests by Shuan Li, Yinghua Han, Xu Yao, Song Yingchen, Jinkuan Wang, Qiang Zhao

    Published 2019-01-01
    “…And then, the random forest (RF) is trained based on the obtained features to detect whether the consumer steals electricity. To build the RF in the hybrid model, the grid search algorithm is adopted to determine optimal parameters. …”
    Get full text
    Article
  17. 37

    Lessons of the Great Patriotic War and World War II for Contemporary Russia by I. I. Belousov

    Published 2015-08-01
    “…And, obviously, it is no accident the day before and during the celebration of 70th anniversary of Victory wishing her to steal the peoples of Russia have been particularly active, as they claim - stiff and awkward. …”
    Get full text
    Article
  18. 38

    Cleptobiosis in Social Insects by Michael D. Breed, Chelsea Cook, Michelle O. Krasnec

    Published 2012-01-01
    “…Cleptobiosis occurs when members of a species steal food, or sometimes nesting materials or other items of value, either from members of the same or a different species. …”
    Get full text
    Article
  19. 39

    Relevant SMS Spam Feature Selection Using Wrapper Approach and XGBoost Algorithm by Diyari Jalal Mussa, Noor Ghazi M. Jameel

    Published 2019-11-01
    “…And sometimes it can be harmful, by sending SMS messages containing fake web pages in order to steal users’ confidential information. Besides spasm number of hazardous actions, there is a limited number of spam filtering software. …”
    Get full text
    Article
  20. 40

    New Device for the Oral Cavity by Virginia Pentón García

    Published 2010-02-01
    “…<strong><br />Methods</strong>: the device which was made of 1,8 mm stainless steal wires is 0,61 meters long . For its construction universal forceps 003-180 for facial arcs and 003-233 heavy corrugated forceps were used. …”
    Get full text
    Article