-
21
SURVIVING HUMANITARIAN CRISIS IN NIGERIA: COPING STRATEGIES OF INTERNALLY DISPLACED PERSONS (IDP) IN BENUE STATE, NORTHCENTRAL, NIGERIA
Published 2024-07-01“…Findings reveal CSOs and State inadequacies in meeting the basic needs of the IDP; this have made the IDP to resort to street begging, petty stealing in and outside IDP camps; prostitution among aged women, adult ladies, teenagers and even children or minors; the study establishes that inadequate care to the IDP can lead to epidemics breakout, internal insecurity for the IDP and the community hosting them; thereby leading to environmental and community security threats. …”
Get full text
Article -
22
A privacy-enhanced framework with deep learning for botnet detection
Published 2025-01-01“…Therefore, preventing malicious persons from stealing data to infer privacy during the botnet detection process has become an issue worth pondering. …”
Get full text
Article -
23
-
24
Implementasi Algoritma Mickey 2.0 untuk Mengamankan Komunikasi Data pada Perangkat Bluetooth Low Energy
Published 2022-12-01“…By implementing encryption algorithms on Bluetooth Low Energy devices it can guarantee data confidentiality aspects and can prevent hackers from eavesdropping and stealing data. In this research, Mickey 2.0 algorithm is used for encryption. …”
Get full text
Article -
25
Peer support for adult social care in prisons in England and Wales: a mixed-methods rapid evaluation
Published 2025-01-01“…The most frequently reported risks include risks to recipients (e.g. safeguarding concerns or issues, risks of bullying, accusations of stealing, buddies overstepping boundaries, and dishonesty), risks to buddies (e.g. burden and emotional risks) and exploitation of role by staff, buddies and recipients (e.g. facilitating trafficking of contraband or being asked to do things not part of the role). …”
Get full text
Article -
26
Robbing Behavior in Honey Bees
Published 2015-03-01“… Western honey bee workers can invade and steal honey/nectar from other colonies or sugar/corn syrup from feeders used to deliver syrup to other colonies. …”
Get full text
Article -
27
Robbing Behavior in Honey Bees
Published 2015-03-01“… Western honey bee workers can invade and steal honey/nectar from other colonies or sugar/corn syrup from feeders used to deliver syrup to other colonies. …”
Get full text
Article -
28
Canine perspective taking: Anticipating the behavior of an unseen human
Published 2025-02-01“…Here, we investigated canine perspective taking by challenging dogs to decide whether and where to steal food in the absence of a human who had prohibited them from doing so. …”
Get full text
Article -
29
Beelouse, Braula coeca Nitzsch (Insecta: Diptera: Braulidae)
Published 2004-02-01“… The beelouse, Braula coeca Nitzsch 1818, is a tiny commensalate wingless fly found in colonies of the honey bee, Apis mellifera Linnaeus, where it lives on the bodies of the bees and literally steals its food out of the mouth of its host. The beelouse is in the family Braulidae, comprising two genera, Braula and Megabraula, contains eight species (see Papp 1984f; Huttinger 1980; Grimaldi and Underwood 1986). …”
Get full text
Article -
30
Beelouse, Braula coeca Nitzsch (Insecta: Diptera: Braulidae)
Published 2004-02-01“… The beelouse, Braula coeca Nitzsch 1818, is a tiny commensalate wingless fly found in colonies of the honey bee, Apis mellifera Linnaeus, where it lives on the bodies of the bees and literally steals its food out of the mouth of its host. The beelouse is in the family Braulidae, comprising two genera, Braula and Megabraula, contains eight species (see Papp 1984f; Huttinger 1980; Grimaldi and Underwood 1986). …”
Get full text
Article -
31
Clinical Application of Partial Splenic Embolization
Published 2014-01-01“…It is also performed to exclude splenic artery aneurysms from the parent vessel lumen and prevent aneurysm rupture, to treat splenic artery steal syndrome and improve liver perfusion in liver transplant recipients, and to administer targeted treatment to areas of neoplastic disease in the splenic parenchyma. …”
Get full text
Article -
32
Security of Physical Library Materials and Utilisation: A Case Study of National Teachers College Kabale.
Published 2023“…Poor security cannot cope with incessant pressure on the library by students who either steal or mutilate books/ journals without regard for laid down library regulations.…”
Get full text
Thesis -
33
Multiple-Feature Extracting Modules Based Leak Mining System Design
Published 2013-01-01“…There are many possible causes of information leakage, such as inadequate precautions during the programming process, which lead to the leakage of e-mail addresses entered online or insufficient protection of database information, a loophole that enables malicious users to steal online content. In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. …”
Get full text
Article -
34
Mothers and children without bread. Hunger in the Auxilio Social Cocinas de Hermandad and Comedores Infantiles during post-war Francoism (1939-1940)
Published 2025-02-01“…It is also argued that, beyond the food supply problems of those famine years, the ineffectiveness of the Comedores and Cocinas was often due to the staff who worked in them, as they often used to steal food for their own consumption or to sell on the black market. …”
Get full text
Article -
35
The Diagnosis of Vertebrobasilar Insufficiency Using Transcranial Doppler Ultrasound
Published 2012-01-01“…VBI may result from large vessel atherosclerotic disease, dissection, cervical compressive lesions, and subclavian steal phenomenon. Diagnostic transcranial Doppler (TCD) of VBI disease and hemodynamic posterior circulation TCD monitoring in symptomatic positions might prove a useful tool in establishing the diagnosis. …”
Get full text
Article -
36
Electricity Theft Detection in Power Grids with Deep Learning and Random Forests
Published 2019-01-01“…And then, the random forest (RF) is trained based on the obtained features to detect whether the consumer steals electricity. To build the RF in the hybrid model, the grid search algorithm is adopted to determine optimal parameters. …”
Get full text
Article -
37
Lessons of the Great Patriotic War and World War II for Contemporary Russia
Published 2015-08-01“…And, obviously, it is no accident the day before and during the celebration of 70th anniversary of Victory wishing her to steal the peoples of Russia have been particularly active, as they claim - stiff and awkward. …”
Get full text
Article -
38
Cleptobiosis in Social Insects
Published 2012-01-01“…Cleptobiosis occurs when members of a species steal food, or sometimes nesting materials or other items of value, either from members of the same or a different species. …”
Get full text
Article -
39
Relevant SMS Spam Feature Selection Using Wrapper Approach and XGBoost Algorithm
Published 2019-11-01“…And sometimes it can be harmful, by sending SMS messages containing fake web pages in order to steal users’ confidential information. Besides spasm number of hazardous actions, there is a limited number of spam filtering software. …”
Get full text
Article -
40
New Device for the Oral Cavity
Published 2010-02-01“…<strong><br />Methods</strong>: the device which was made of 1,8 mm stainless steal wires is 0,61 meters long . For its construction universal forceps 003-180 for facial arcs and 003-233 heavy corrugated forceps were used. …”
Get full text
Article