To see the other types of publications on this topic, follow the link: Key Fob Security.

Journal articles on the topic 'Key Fob Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Key Fob Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

IJRAME, Journal. "Vehicle unlocking system using Key Fob with Fingerprint." International Journal of Research in Aeronautical and Mechanical Engineering 13, no. 5 (2025): 34–45. https://doi.org/10.5281/zenodo.15496160.

Full text
Abstract:
The goal of this project is to replace or enhance traditional key remote locking systems with biometric authentication to ensure that only authorized users can access and unlock the vehicle. By integrating a fingerprint sensor into the car key fob, this system will provide a higher level of security. The fingerprint sensor will scan the fingerprint of the user, and the system will authenticate the fingerprint by comparing it with pre-stored authorized patterns in a database. If the scanned fingerprint matches an authorized user's fingerprint, a signal will be sent to the vehicle's locking syst
APA, Harvard, Vancouver, ISO, and other styles
2

Isa, Mohd Anuar Mat, Habibah Hashim, Syed Farid Syed Adnan, Nur Nabila Mohamed, and Yasin Fitri Alias. "Side-Channel Security on Key Exchange Protocol: Timing and Relay Attacks." Indonesian Journal of Electrical Engineering and Computer Science 11, no. 2 (2018): 688. http://dx.doi.org/10.11591/ijeecs.v11.i2.pp688-695.

Full text
Abstract:
The advancing of Key Exchange Protocol (KEP) is compulsory to secure the connected world via Internet of Thing (IoT), cryptocurrency and blockchain, virtual intelligent, smart computing etc. To address the security issues in the Internet based computing systems, this paper explores the side-channel security for KEP, namely timing and relay attacks. Nowadays, various KEP variances are used by internet protocol such as IKEv2/3. The purpose of KEP is to enable a secret key(s) sharing between two or more computing systems on unsecure network. Later, the secret key(s) is used to encrypt all data tr
APA, Harvard, Vancouver, ISO, and other styles
3

Mohd, Anuar Mat Isa, Hashim Habibah, Farid Syed Adnan Syed, Nabila Mohamed Nur, and Fitri Alias Yasin. "Side-Channel Security on Key Exchange Protocol: Timing and Relay Attacks." Indonesian Journal of Electrical Engineering and Computer Science 11, no. 2 (2018): 688–95. https://doi.org/10.11591/ijeecs.v11.i2.pp688-695.

Full text
Abstract:
The advancing of Key Exchange Protocol (KEP) is compulsory to secure the connected world via Internet of Thing (IoT), cryptocurrency and blockchain, virtual intelligent, smart computing etc. To address the security issues in the Internet based computing systems, this paper explores the side-channel security for KEP, namely timing and relay attacks. Nowadays, various KEP variances are used by internet protocol such as IKEv2/3. The purpose of KEP is to enable a secret key(s) sharing between two or more computing systems on unsecure network. Later, the secret key(s) is used to encrypt all data tr
APA, Harvard, Vancouver, ISO, and other styles
4

Ibrahim, Dasam Sunday, and Prof Mutiullah Olasupo. "The Nigerian Military Operation Safe Haven (OPSH) Operation in Internal Security Management in Plateau State: Challenges and Prospects." JOURNAL OF POLITICAL SCIENCE AND LEADERSHIP RESEARCH 9, no. 1 (2023): 10–24. http://dx.doi.org/10.56201/jpslr.v9.no1.2023.pg10.24.

Full text
Abstract:
This study investigated the Nigerian Military Operation Safe Haven (OPSH) in the internal security management in Plateau state, Nigeria from 2010 to 2021. Primary data utilised for this study include a structured set of questionnaires and a key informant interview. The sampling technique adopted for the study was the purposive sampling method, hence only those with adequate knowledge of the subject matter were interviewed. Three senatorial zones were purposively selected for detailed investigation and generalisation. These include the South senatorial zone, Central senatorial zone and North se
APA, Harvard, Vancouver, ISO, and other styles
5

Heatherly, Raymond. "Privacy and Security within Biobanking: The Role of Information Technology." Journal of Law, Medicine & Ethics 44, no. 1 (2016): 156–60. http://dx.doi.org/10.1177/1073110516644206.

Full text
Abstract:
Along with technical issues, biobanking frequently raises important privacy and security issues that must be resolved as biobanks continue to grow in scale and scope. Consent mechanisms currently in use range from fine-grained to very broad, and in some cases participants are offered very few privacy protections. However, developments in information technology are bringing improvements. New programs and systems are being developed to allow researchers to conduct analyses without distributing the data itself offsite, either by allowing the investigator to communicate with a central computer, or
APA, Harvard, Vancouver, ISO, and other styles
6

M J, Pavithra, Poornima M, and Nirmala Nirmala. "Raspberry Pi-based Facial Recognition for Vehicle Access Control." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–9. https://doi.org/10.55041/ijsrem40261.

Full text
Abstract:
The integration of advanced biometric security systems in modern vehicles has become crucial to enhance safety and user convenience. This paper presents the design and implementation of a Raspberry Pi-based facial recognition system for vehicle access control, utilizing the power of computer vision and machine learning to provide secure, keyless vehicle entry. The system employs a Raspberry Pi microcontroller, coupled with a camera module, to capture and analyze the driver's facial features. OpenCV, a widely-used computer vision library, is integrated with a pre-trained deep learning model to
APA, Harvard, Vancouver, ISO, and other styles
7

Patil, Tushar Anil, and Prof Dr Mrs K. V. Kulhalli. "Symmetric Key Cryptography Algorithm for Data Security." International Journal of Trend in Scientific Research and Development Volume-2, Issue-2 (2018): 586–89. http://dx.doi.org/10.31142/ijtsrd9444.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fengwei Cheng, Fengwei Cheng, Sai Ji Fengwei Cheng, and Chin-Feng Lai Sai Ji. "Efficient CP-ABE Scheme Resistant to Key Leakage for Secure Cloud-Fog Computing." 網際網路技術學刊 23, no. 7 (2022): 1461–71. http://dx.doi.org/10.53106/160792642022122307002.

Full text
Abstract:
<p>With the evolution of the Internet, people’s lives are growing increasingly intelligent, and massive amounts of data are also generated. The combination of cloud computing and fog computing can store and process it efficiently. However, a new and urgent challenge has emerged about how to ensure that data in cloud and fog nodes are accessed securely. In order to address this issue, we propose an efficient anti-key leakage CP-ABE (EAL-CP-ABE) scheme based on cloud-fog computing. In our scheme, we achieve the identity tracing of the authorized user who leaked the private key by
APA, Harvard, Vancouver, ISO, and other styles
9

Hao Yan, Hao Yan, Yanan Liu Hao Yan, Dandan Huang Yanan Liu, Shuo Qiu Dandan Huang, and Zheng Zhang Shuo Qiu. "Public Integrity Verification for Cloud Storage with Efficient Key-update." 網際網路技術學刊 24, no. 6 (2023): 1263–71. http://dx.doi.org/10.53106/160792642023112406009.

Full text
Abstract:
<p>To improve the security of the data on cloud storage, numbers of data integrity auditing schemes have been proposed in the past several years. However, there only a few schemes considered the security challenge that the user’s key is exposed unknowingly which is very likely to happen in real-life. To cope with the problem, we propose a public data integrity auditing scheme for cloud storage with efficient key updating. In our scheme, the user’s key is updated periodically to resist the risk of key exposure. Meanwhile, the authentication tags of blocks are updated simultaneously with t
APA, Harvard, Vancouver, ISO, and other styles
10

Melnyk, Viktor. "Implementation Options of Key Retrieval Procedures for the IEEE 802.15.4 Wireless Personal Area Networks Security Subsystem." Advances in Cyber-Physical Systems 4, no. 1 (2019): 42–54. http://dx.doi.org/10.23939/acps2019.01.042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

In-Ho Lee, In-Ho Lee, and Myungjin Cho Myungjin Cho. "Security enhancement for double-random phase encryption using orthogonally encoded image and electronically synthesized key data." Chinese Optics Letters 13, no. 1 (2015): 010603–10607. http://dx.doi.org/10.3788/col201513.010603.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Elamurugu, V., and D. J. Evanjaline. "DynAuthRoute: Dynamic Security for Wireless Sensor Networks." Indian Journal Of Science And Technology 17, no. 13 (2024): 1323–30. http://dx.doi.org/10.17485/ijst/v17i13.49.

Full text
Abstract:
Objectives: The research aims to design an architecture for secure transmission of data in wireless sensor networks. Methods: The method involves three main pillars: authentication, data encryption, and dynamic routing. Extensive simulations have been conducted to evaluate the suggested method in terms of energy consumption, memory footprint, packet delivery ratio, end-to-end latency, execution time, encryption time, and decryption time. Findings: For authentication, a dynamic key is used to power an improved salt password hashing method. Data encryption is performed using format-preserving en
APA, Harvard, Vancouver, ISO, and other styles
13

Rabari, Dipak K., Yogesh K. Meghrajani, and Laxmi S. Desai. "Lock and Key Share Secret Sharing Scheme with Meaningful Shares for Grayscale Image and Color Image." Indian Journal Of Science And Technology 17, no. 42 (2024): 4405–14. http://dx.doi.org/10.17485/ijst/v17i42.2486.

Full text
Abstract:
Objectives: The proposed scheme aims to present a secret sharing scheme (2, m, n) with lock and key shares, including meaningful shares for all lock and key shares. Methods: To create m lock and n key shares, the secret image will be encrypted. To retrieve the secret information from the recipient, any one share from the lock and another share from the key shares are used. When both shares are selected from either lock shares or key shares, no partial information about the hidden image is recovered. Meaningful shares do not disclose any information on the privacy of the picture data. The secre
APA, Harvard, Vancouver, ISO, and other styles
14

Vinnarasi, J., and D. I. George Amalarethinam. "Advancing Data Security in Cloud Computing: Introducing Secured Layered Technique for Data Security Approach (SLT-DSA), A Multi-Layered Security Framework." Indian Journal Of Science And Technology 18, no. 11 (2025): 848–60. https://doi.org/10.17485/ijst/v18i11.273.

Full text
Abstract:
Objective: The aim of this study is to introduce the Secured Layered Technique for Data Security Approach (SLT-DSA), a multi-layered framework designed to enrich data protection in cloud computing environments. This research aims to evaluate the effectiveness of SLT-DSA in addressing security challenges, improving data privacy, and ensuring scalability and performance in cloud-based systems. Methods: This paper has introduced the Secured Layered Technique for Data Security Approach (SLT-DSA), aimed at ensuring data security and integrity when outsourcing data in cloud environments. The enhance
APA, Harvard, Vancouver, ISO, and other styles
15

Ph.D, Dr G. Karpaga Rajesh M. E. ,., Vaishnu Priya R, and Kaviya R. Jaya Divya Aj. "Security using Location Based Key LBK System for Effective Multipath Attack and Protection for Location Discrimination in Wireless Sensor Systems." International Journal of Trend in Scientific Research and Development Volume-3, Issue-2 (2019): 446–50. http://dx.doi.org/10.31142/ijtsrd21377.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Bao, Yiqin, Qiang Zhao, Jie Sun, Wenbin Xu, and Hongbing Lu. "An edge cloud and Fibonacci-Diffie-Hellman encryption scheme for secure printer data transmission." Mathematical Biosciences and Engineering 21, no. 1 (2023): 96–115. http://dx.doi.org/10.3934/mbe.2024005.

Full text
Abstract:
<abstract> <p>Network printers face increasing security threats from network attacks that can lead to sensitive information leakage and data tampering. To address these risks, we propose a novel Fibonacci-Diffie-Hellman (FIB-DH) encryption scheme using edge cloud collaboration. Our approach utilizes properties of third-order Fibonacci matrices combined with the Diffie-Hellman key exchange to encrypt printer data transmissions. The encrypted data is transmitted via edge cloud servers and verified by the receiver using inverse Fibonacci transforms. Our experiments demonstrate that th
APA, Harvard, Vancouver, ISO, and other styles
17

Qingru Ma, Qingru Ma, and Haowen Tan Qingru Ma. "D2D Group Key Agreement Scheme for Smart Devices in HANs." 網際網路技術學刊 24, no. 3 (2023): 659–64. http://dx.doi.org/10.53106/160792642023052403011.

Full text
Abstract:
<p>The home area network (HAN) is one of the most widely researched areas in recent years. HANs integrate 5G/6G networks and artificial intelligence technology to provide data services for home users. The devices in HANs collect and transmit data relating to users’ daily activities for analysis by remote service providers. These data often contain a large number of users’ personal privacy. The disclosure of these data could have far-reaching consequences for the privacy of the individuals involved. Some researchers are dedicated to investigating the authentication of
APA, Harvard, Vancouver, ISO, and other styles
18

Abdulhameed, Islam Sami, Intisar Al-Mejibli, and Jolan Rokan Naif. "Improving Security and Privacy for Health Information and Images." Webology 19, no. 1 (2022): 2435–57. http://dx.doi.org/10.14704/web/v19i1/web19164.

Full text
Abstract:
Recently, the wireless devices and information technology have been evolved greatly and used in many sectors such as health and military. Employing these technologies in health system require to transmitting the patient’s information over the Internet. Hence, there is an urgent need to provide a high degree of security and privacy for patient information. This paper presents new encryption method to protect the information that are transmitted and stored in electronic health records (EHR) with maintaining its privacy. The proposal employs AES and ECC algorithms for security purpose and HMAC-SH
APA, Harvard, Vancouver, ISO, and other styles
19

Sai Ji, Sai Ji, Yang Yuan Sai Ji, Jian Shen Yang Yuan, Chin-Feng Lai Jian Shen, and Bofan Chen Chin-Feng Lai. "An Efficient Three-Party Authentication and Key Agreement Protocol for Privacy-Preserving of IoT Devices in Mobile Edge Computing." 網際網路技術學刊 23, no. 3 (2022): 437–48. http://dx.doi.org/10.53106/160792642022052303002.

Full text
Abstract:
<p>The advancement of 5G communication technology and Internet of Things (IoT) technology has promoted the rapid development of Mobile Edge Computing (MEC). In mobile edge, all IoT devices adopt wireless communication technology. Therefore, it is particularly important to ensure the data security and the privacy of the sender in the process of data transmission. At present, a lot of researchers have proposed a large number of schemes for the authentication of the user in MEC. However, there is no effective and lightweight solution for authentication among users, edge devices and cloud se
APA, Harvard, Vancouver, ISO, and other styles
20

Namiyaly, A. E., B. B. Valiyev, A. O. Sagymbekova та A. Zh Adil. "ИСПОЛЬЗОВАНИЕ АНАЛИЗА ТОНАЛЬНОСТИ ДЛЯ ИЗУЧЕНИЯ КИБЕРБЕЗОПАСНОСТИ". INTERNATIONAL JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGIES 3, № 2(10) (2022): 59–66. http://dx.doi.org/10.54309/ijict.2022.10.2.006.

Full text
Abstract:
The main goal of this research article is to apply modern theoretical and practical knowledge in cybersecurity and develop a website by conducting sentiment analysis for cybersecurity learning on the developed platform. Electronic educational resources, information protection technologies, and data integrity preservation have been investigated to create the final product. The work has resulted in a secure platform for increasing user exposure in IT using the key machine learning models and hashing algorithms.
APA, Harvard, Vancouver, ISO, and other styles
21

Obach Lapieza, Anna, and María Ramos Sanz. "Elementos clave para la introducción de la perspectiva de género en las infraestructuras ciclistas." Hábitat y Sociedad, no. 13 (November 4, 2020): 87–105. http://dx.doi.org/10.12795/habitatysociedad.2020.i13.06.

Full text
Abstract:
Gender mainstreaming generated a wide diversity of innovative measures and interventions in new areas not explored until the moment. This is the case of mobility policies, linked to the sustainable urban design and the measures for the environment’s improvement. The literature review and the analysis of the cities’ experiences, allow us to establish some criteria to audit the level of inclusivity of transport infrastructures. In the case of cycling infrastructures, the following criteria have to be taken into account: security, ensuring road safety elements and adequate lighting; conciliation,
APA, Harvard, Vancouver, ISO, and other styles
22

Samoylenko, H. T., and Yu Yu Yurchenko. "Key aspects of designing information infrastructure for a medical enterprise." Mathematical machines and systems 3 (2023): 59–64. http://dx.doi.org/10.34121/1028-9763-2023-3-59-64.

Full text
Abstract:
The provision of necessary information for the operations of any medical institution is a com-plex and labor-intensive process aimed at addressing professional, organizational, and social challenges. Effective information support in the healthcare sector is crucial for the quality of medical services at all stages and levels, ranging from primary healthcare to online consulta-tions. This article explores the key aspects of designing an information infrastructure, including the selection of necessary technologies, system architecture development, and integration with existing medical processes.
APA, Harvard, Vancouver, ISO, and other styles
23

Simeonova, Iliana, and Tsvetelina Metodieva. "MODEL FOR ADMINISTRATIVE SECURITY MANAGEMENT IN A MUNICIPALITY." Journal Scientific and Applied Research 26, no. 1 (2024): 93–105. http://dx.doi.org/10.46687/jsar.v26i1.397.

Full text
Abstract:
Administrative security is critical to the effective functioning of government organisations. It is an attest component of governance and plays a key role in protecting public institutions. Bulgaria, with its distinctive geopolitical and historical context, represents a unique environment for exploring the conceptuality of administrative security and its functionality. Understanding and assessing administrative security is essential for the development and stability of the country.
APA, Harvard, Vancouver, ISO, and other styles
24

Namiyaly, A. E., B. B. Valiyev та A. Sagymbekova. "Использование анализа тональности для изучения кибербезопасности". INTERNATIONAL JOURNAL OF INFORMATION AND COMMUNICATION TECHNOLOGIES, № 8(8) (4 березня 2022): 18–22. http://dx.doi.org/10.54309/ijict.2021.8.8.003.

Full text
Abstract:
The main goal of the scientific article is to apply modern theoretical and practical knowledge about cybersecurity and to develop a website using sentiment analysis for cybersecurity learning on the platform. Electronic educational resources, information protection technologies and data integrity preservation were investigated to create the final product. To increase the users’ cybersecurity awareness, a secure platform was developed using the key machine learning models and algorithms for hashing. Основная цель научной статьи - применить современные теоретические и практические знания в облас
APA, Harvard, Vancouver, ISO, and other styles
25

An-Yuan Chang, An-Yuan Chang, and Po-Yen Lai An-Yuan Chang. "Research on key barriers and drivers for SME to implement sustainable manufacturing - an application of Fuzzy Delphi Method." 青年企業管理評論 15, no. 1 (2022): 001–18. http://dx.doi.org/10.53106/270308882022101501001.

Full text
Abstract:
<p>In 2020, Taiwan had 1,548,835 small and medium-sized enterprises (SMEs), accounting for 98.93% of all enterprises in Taiwan. SMEs can benefit greatly from emphasizing sustainability, energy security, environmental protection, and economic benefits. This study aimed to identify key barriers and drivers of SMEs’ sustainable development, thereby enhancing their understanding of sustainable development and boosting sustainability. Questionnaire survey was administered to experts, who were required to provide data based on their own experiences. The expert responses were organize
APA, Harvard, Vancouver, ISO, and other styles
26

Strilets, Victoria, Olha Prokopenko, and Volodymyr Orlov. "Impact of Covid-19 on the budget security of the national economy: a forecast for Ukraine." Public and Municipal Finance 9, no. 1 (2020): 25–33. http://dx.doi.org/10.21511/pmf.09(1).2020.03.

Full text
Abstract:
Nowadays, it is necessary to consider the impact of the COVID-19 pandemic on the state of the national economy, in particular on the budget system. This paper examines the essence of budget security and identifies the key threats to budget security in the current context. The methodological aspects of calculating Ukraine’s budget security key indicators (their list, criteria for the use of weighting factors, range of characteristic values of budget security levels) are investigated and their state in 2015–2019 is assessed. The influence of quarantine measures on the level of budget security in
APA, Harvard, Vancouver, ISO, and other styles
27

Sayantan, Gupta. "QUANTUM FOG CLOUD MODEL IN INTERNET OF THINGS WITH ANALYSIS OF GREEN COMPUTING." International Journal of Research -GRANTHAALAYAH 5, no. 1 (2017): 230–38. https://doi.org/10.5281/zenodo.264026.

Full text
Abstract:
The technology of Quantum Green Computing has been discussed in this paper. It also discusses the need of the many implementation techniques and approaches in relation with Fog-Cloud Computing. Moreover, we would like to introduce the latest algorithms like Stack Algorithm, Address Algorithm and many others which will help in the analysis of Green-Quantum Computing Technology in the modern society and would create a technological revolution. With the Internet of Things rising in the modern world time, new security issues have also been developed. So, our proposed Model the Fog-Things Model wil
APA, Harvard, Vancouver, ISO, and other styles
28

De Souza, Graziene Carneiro. "Islands of Stability: new conception on the use of force regarding the implementation of protection of civilians." Brazilian Journal of International Relations 5, no. 2 (2016): 431–53. http://dx.doi.org/10.36311/2237-7743.2016.v5n2.09.p431.

Full text
Abstract:
This article proposes that the normative context of the use of force is being modified by a new way to implement the Protection of Civilians (PoC). Resolution 2098 of the United Nations Security Council (UNSC) created a Force Intervention Brigade (FIB) with an unprecedented mandate to implement the use of force preemptively. In this context, the objective of this paper is to evidence that the FIB’s offensive actions resulted in the emergence of the “Islands of Stability” concept, which represents a new method to implement the PoC. In order to elaborate this method, a review of literature, news
APA, Harvard, Vancouver, ISO, and other styles
29

Sanchez, Dr Alejandro Rodriguez, and Prof Maria Lopez Garcia. "Cybersecurity for Industry 4.0: Safeguarding Manufacturing Systems for the Future." International journal of networks and security 5, no. 3 (2025): 13–21. https://doi.org/10.55640/ijns-05-01-02.

Full text
Abstract:
The manufacturing industry is undergoing a significant transformation, with digitalization, automation, and the Internet of Things (IoT) paving the way for more intelligent, connected, and efficient production systems. However, as manufacturing systems become increasingly digitalized, they are also becoming more vulnerable to cyber threats. This article examines the key challenges and solutions in ensuring that cybersecurity strategies are fit for the future of manufacturing, focusing on the integration of emerging technologies, proactive security measures, and the importance of collaboration
APA, Harvard, Vancouver, ISO, and other styles
30

Tusher, Chandra Ghosh, and Ismail Jabiullah Md. "Analysis of Network Security Issues and Threats Analysis on 5G Wireless Networks." Recent Trends in Information Technology and its Application 4, no. 3 (2021): 1–11. https://doi.org/10.5281/zenodo.5573669.

Full text
Abstract:
We are going to enter the world of the 5G network. There are many advanced features in the 5G network. The newer features come, the more security will be required, for all these new features. This paper is a survey for 5 generations of wireless network security, complete and thorough our current cellular network. This paper starts with a rethink of 5G wireless networks circumstantial as well as on the new pretension and motivations of 5G wireless security. The effective offensive and security services with the thought of new service necessity and latest use-cases in 5G Wireless Network securit
APA, Harvard, Vancouver, ISO, and other styles
31

John, Siju, and S. N. Kumar. "6D Hyperchaotic Encryption Model for Ensuring Security to 3D Printed Models and Medical Images." Journal of Image and Graphics 12, no. 2 (2024): 117–26. http://dx.doi.org/10.18178/joig.12.2.117-126.

Full text
Abstract:
In the 6G era, where ultra-fast and reliable communication is expected to be ubiquitous, encryption shall continue to play a crucial role in ensuring the security and privacy of data. Encryption and decryption of medical images and 3D printed models using 6D hyperchaotic function is proposed in this research work for ensuring security in data transfer. Here we envisage using a six-dimensional hyperchaotic system for encryption purposes which shall offer a high level of security due to its complex and unpredictable dynamics with multiple positive Lyapunov exponents. This system can potentially
APA, Harvard, Vancouver, ISO, and other styles
32

Ahmed, Mohammed Imran, Abdul Raheman Mohammed, Srujan Kumar, Sireesha Kolla, and Mohammed Kashif. "AI-Driven Green Construction: Optimizing Energy Efficiency, Waste Management and Security for Sustainable Buildings." Journal of Cognitive Computing and Cybernetic Innovations(JCCCI) 1, no. 1 (2025): 37–41. https://doi.org/10.21276/jccci/2025.v1.i1.7.

Full text
Abstract:
Rapid urbanization and the increased construction activities worldwide have immensely contributed to the consumption of energy and degradation of the environment. Green construction minimizes these impacts by designing energy-efficient buildings and reducing waste. The integration of Artificial Intelligence in green construction presents innovative solutions that optimize design, resource management, and sustainability practices. This paper analyzes the role of AI in achieving energy efficiency in building design and enhancing waste management during construction. It covers key aspects such as
APA, Harvard, Vancouver, ISO, and other styles
33

Esther Omoniyi, Mofoluwawo. "Social Studies Education: A Roadmap for National Integration and Security Challenges in Nigeria." Himalayan Journal of Humanities and Cultural Studies 01, no. 01 (2020): 1–5. https://doi.org/10.47310/hjhcs.2020.v01i01.009.

Full text
Abstract:
Nigeria as a multistate with diverse ethnic and religious groups. Nigeria is made up of diverse cultural groups with over 400 languages and dialects and the cultural groups live in different geographical locations. This paper examines how social studies education can be a roadmap for national integration and security challenges in Nigeria. The paper posits that one of the major factors that hinder national integration and security in Nigeria is the inability of many Nigerian citizens to demonstrate national values of patriotism, tolerance, cooperation, obedience, honesty, hardwork etc. These n
APA, Harvard, Vancouver, ISO, and other styles
34

Tagayeva, Faragat. "UZBEKISTAN AND THE ORGANIZATION OF TURKIC STATES: PROSPECTS FOR COOPERATION." Oriental Journal of Social Sciences 05, no. 01 (2025): 39–50. https://doi.org/10.37547/supsci-ojss-05-01-06.

Full text
Abstract:
This article analyzes the current state and future prospects of Uzbekistan's cooperation within the framework of the Organization of Turkic States (OTS). Key areas of collaboration are examined, including political interaction, security issues, economic integration, transport and logistics, trade relations, joint promotion of tourism potential, and cultural-humanitarian ties. Special attention is given to Uzbekistan’s role as one of the key players in the Organization. The study explores strategic initiatives and proposals by the President of the Republic of Uzbekistan, Shavkat Mirziyoyev, aim
APA, Harvard, Vancouver, ISO, and other styles
35

Vamsi, Krishna Kokku. "Toward Secure IoT Infrastructure: Integrating Zero Trust, Federated Learning, and Dynamic Trust Management Models." Research and Reviews: Advancement in Cyber Security 2, no. 2 (2025): 19–25. https://doi.org/10.5281/zenodo.15281302.

Full text
Abstract:
<em>With the proliferation of Internet of Things (IoT) devices across industrial, healthcare, and consumer domains, the demand for secure, scalable, and intelligent infrastructure has surged. This paper presents an in-depth synthesis of 29 high-impact research contributions focusing on the integration of Zero Trust architectures, Federated Learning, and Dynamic Trust Management Models for securing IoT ecosystems. The study categorizes key themes including cybersecurity frameworks, AI-augmented anomaly detection, edge computing optimization, and AI-driven software development. By analyzing the
APA, Harvard, Vancouver, ISO, and other styles
36

Mazhnyk, Lidiia O., Iryna V. Lytovchenko, and Vladyslav O. Shakun. "Innovative Solutions for the Formation of Personnel Security of Online Entrepreneurship." Business Inform 1, no. 552 (2024): 146–53. http://dx.doi.org/10.32983/2222-4459-2024-1-146-153.

Full text
Abstract:
The aim of the article is to study the list of innovative solutions for the formation of personnel security of online entrepreneurship. The article analyzes the current state of conditions and features of the formation of personnel security for online entrepreneurship in Ukraine. The relevance of online entrepreneurship for Ukrainian enterprises is substantiated, indicating both the advantages and disadvantages. A definition of online entrepreneurship has been proposed, its types have been considered. Innovative solutions for the formation of personnel security in online entrepreneurship refle
APA, Harvard, Vancouver, ISO, and other styles
37

Komen, Leah. "“Here you can use it”: Understanding mobile phone sharing and the concerns it elicits in rural Kenya." for(e)dialogue 1, no. 1 (2016): 52–65. http://dx.doi.org/10.29311/for(e)dialogue.v1i1.532.

Full text
Abstract:
Globally, mobile phones are mostly used as personal items largely due to their data storage and services provision. However, various features enable mobile phone sharing and this subverts the notion of a single individual use. In cultures where communal sharing is valued and seen as normal, it is natural for mobile phones to be incorporated into other traditionally shared support systems, such as meetings summoned by elders, which involve social, economic, cultural and political activities. This paper draws on a recent doctoral thesis to examine the role of mobile telephony in the social trans
APA, Harvard, Vancouver, ISO, and other styles
38

Pryanikova, Alina A. "International Institutions Activity in the Field of Food Security." Administrative Consulting, no. 6 (186) (June 7, 2024): 137–52. https://doi.org/10.22394/1726-1139-2024-6-137-152.

Full text
Abstract:
Globalization processes have had a significant impact on agricultural and food systems around the world, resulting in a strong correlation between international political and economic events and food security. The dependence of actors on each other, the transcendental nature of food problems makes them even more difficult to eliminate. The category of food security itself reflects not only the food supply of individual households or regions, but also demonstrates the level of scientific and technological progress, socio-economic development, and the success of monitoring the natural and climat
APA, Harvard, Vancouver, ISO, and other styles
39

Seshagiri, Asha. "METHODS FOR PREVENTING SQL INJECTION IN IDENTITY AND ACCESS MANAGEMENT (IAM) SYSTEMS." American Journal of Engineering and Technology 6, no. 10 (2024): 17–22. http://dx.doi.org/10.37547/tajet/volume06issue10-03.

Full text
Abstract:
This paper discusses methods for preventing SQL (Structured Query Language) injections in identity and access control (IAM) systems. SQL injections represent one of the most serious threats to web security, allowing attackers to gain unauthorized access to and modify data. The main security methods include filtering input data, using prepared statements and parameterization, implementing stored procedures, restricting access rights, and regularly updating software. Effective privilege management and database activity monitoring also play a key role in preventing attacks. The introduction of th
APA, Harvard, Vancouver, ISO, and other styles
40

Mmasi, Patience Robai. "Extensive Review of Security and Privacy Issues in Heterogeneous Networks." World Journal of Advanced Research and Reviews 23, no. 1 (2024): 2955–84. https://doi.org/10.5281/zenodo.14830558.

Full text
Abstract:
This paper studies advanced network security, privacy, and performance issues for Heterogeneous Networks (HetNets), which combine multiple types of cells to enhance wireless communication coverage and capacity. The coexistence of heterogeneous network elements inherently leads to considerable issues in terms of security, privacy, and performance. Previous research has primarily addressed security issues using common cryptographic techniques including data encryption with AES, secure key exchange with RSA, and handoff security with mutual authentication. Data anonymization methods and regulator
APA, Harvard, Vancouver, ISO, and other styles
41

Chaplynska, Natalia M., and Pavlo V. Makeienko. "INNOVATIVE SOLUTIONS FOR ENSURING ENERGY SECURITY OF UKRAINE AND THE WORLD." Academic Review 2, no. 59 (2023): 284–97. http://dx.doi.org/10.32342/2074-5354-2023-2-59-19.

Full text
Abstract:
The article examines the preconditions for the aggravation of the energy danger for Ukraine and the world as a whole, in particular in the context of the strengthening of the economic crisis and war in Ukraine. The issue of compliance by energy organizations with the International Climate Paris Agreement and the achievement of the Global Sustainable Development Goals by 2030 were studied. The component indicators of the global index of energy innovations were analyzed. The main global energy indicators and their results in 2021 compared to 2020 were monitored. The paper also estimates domestic
APA, Harvard, Vancouver, ISO, and other styles
42

Omuya Odida, Maurice. "Exploring the Application of Artificial Neural Networks in Enhancing Security Measures For Cloud Computing: A Survey." Journal of Marine Science Research and Oceanography 7, no. 2 (2024): 01–12. http://dx.doi.org/10.33140/jmsro.07.02.02.

Full text
Abstract:
Cloud computing has become integral to modern business operations, offering scalability, flexibility, and cost-effectiveness. However, the increasing adoption of cloud services also brings forth significant security challenges. In response, researchers and practitioners have explored various approaches to enhance security measures in cloud computing environments. Among these approaches, Artificial Neural Networks (ANNs) have emerged as promising tools for bolstering cloud security. This survey aims to explore the application of Artificial Neural Networks in enhancing security measures for clou
APA, Harvard, Vancouver, ISO, and other styles
43

Samoylenko, H. T., та Yu Yu Yurchenko. "Features of mathematical rationale for a complex datа security system of a medical enterprise". Mathematical machines and systems 4 (2023): 51–57. http://dx.doi.org/10.34121/1028-9763-2023-4-51-57.

Full text
Abstract:
The article is dedicated to the analysis of data protection issues, particularly personal data, in medical institutions of various ownership forms. The necessity of implementing comprehensive data security systems is justified by the Bell-LaPadula model, which is considered a foundation for the development of a complex data security system within the enterprise. The Bell-LaPadula model represents an access control system based on a hierarchical data access structure. How-ever, using a rigid hierarchical approach when building an information infrastructure of an en-terprise based on this model,
APA, Harvard, Vancouver, ISO, and other styles
44

Ray, Papri, R. Duraipandian, Gajjala Kiranmai, Rachana Rao, and Mathew John Jose. "An Exploratory Study of Risks and Food Insecurity in the Agri Supply Chain." Shanlax International Journal of Management 8, S1-Feb (2021): 1–12. http://dx.doi.org/10.34293/management.v8is1-feb.3752.

Full text
Abstract:
Globally, the agricultural industry has increased the market for various farm products. The timely production and distribution of harvested crops and fruits are essential because of the increased demand across the globe. According to the Food and Agricultural Organization of the United Nations, one third of the food produced for consumption is lost or wasted worldwide, amounting to approximately 1.3 billion tons per year. The productivity of the farm’s yield decreases mainly because of unstandardized processes. The employment of an optimal supply chain management scheme must be the key to the
APA, Harvard, Vancouver, ISO, and other styles
45

Miroshnychenko, Vitalii. "Conceptual Models for Optimizing Infrastructure Solutions for Isps Based on Cloud Technologies." American Journal of Engineering and Technology 07, no. 06 (2025): 08–13. https://doi.org/10.37547/tajet/volume07issue06-02.

Full text
Abstract:
This study examines the conceptual models for optimizing infrastructure solutions for ISPs based on cloud technologies. The relevance of this research is justified by the rapid technological advancements that serve as the foundation for infrastructure solutions in internet service providers (ISPs). Their optimization requires a systematic approach that considers load balancing, distributed data storage, security issues, and regulatory aspects. However, there are contradictions in the scientific literature regarding optimization methods. The goal of this article is to systematize the understand
APA, Harvard, Vancouver, ISO, and other styles
46

Yusif Asgarov, Mehdi. "Ətraf mühit təhlükəsizliyinin hüquqi tənzimlənməsi üzrə Azərbaycan ilə Avropa İttifaqı arasında əməkdaşlıq". SCIENTIFIC WORK 78, № 5 (2022): 209–14. http://dx.doi.org/10.36719/2663-4619/78/209-214.

Full text
Abstract:
After proclaimed its independence in 1991, the Republic of Azerbaijan has developed relations with the European Union in various fields, including support for economic, political and environmental reforms, the establishment of the East-West transport corridor, and the development of infrastructure. The Partnership and Cooperation Agreement, which was signed in 1996 and entered into force in 1999, covers cooperation in the areas of political dialogue, trade, investment, legislation, science and culture. In 1998, the EU appointed its own special representative in Azerbaijan. In 2000, the Represe
APA, Harvard, Vancouver, ISO, and other styles
47

Biryukov, A. N., та A. M. Akchurina. "Анализ критериев оценки региональной экономической безопасности с учетом индикаторов инвестиционной составляющей". Экономика и управление: научно-практический журнал, № 4(178) (23 серпня 2024): 64–72. http://dx.doi.org/10.34773/eu.2024.4.11.

Full text
Abstract:
The study emphasizes that the successful development of the region depends on the analysis of economic security indicators, taking into account the investment component. Investments play a key role in sustainable economic growth, modernization of production and introduction of new technologies. Constant improvement of investment policy mechanisms is an integral part of the region's development. Rational use of resources and a sound investment strategy contribute to the achievement of strategic goals and ensure economic security. The main goal of the study is to determine areas for improving in
APA, Harvard, Vancouver, ISO, and other styles
48

AVHUSTYN, Ruslan, and Iryna DEMKIV. "STRATEGIC PROFIT MANAGEMENT AS A TOOL FOR ENSURING THE ECONOMIC SECURITY OF THE ENTERPRISE." Herald of Khmelnytskyi National University. Economic sciences 310, no. 5(1) (2022): 126–30. http://dx.doi.org/10.31891/2307-5740-2022-310-5(1)-20.

Full text
Abstract:
The article emphasizes the relevance of strategic profit management of enterprises, in particular from the point of view of achieving the appropriate level of profitability as a guarantee of stabilization of its financial and economic condition and, accordingly, stability in the system of its economic security. The purpose of the article is the scientific substantiation of the theoretical-methodical and applied principles of the formation of the company’s profit as one of the key indicators of guaranteeing the economic security of the economic entity. The set of factors that determine the comp
APA, Harvard, Vancouver, ISO, and other styles
49

Veernapu, Kiran. "Data Security in Healthcare with Machine Learning and Biometric Methods: Current Challenges, Solutions, and Future Directions." PROGRESS IN MEDICAL SCIENCES 6, no. 1 (2025): 1–6. https://doi.org/10.47363/PMS/2022(6)E162.

Full text
Abstract:
The healthcare industry is increasingly adopting digital technologies for patient care, management, andresearch. However, this shift toward electronic health records (EHR), telemedicine, and other digitalhealthcare solutions presents significant data security challenges. This paper explores the importance ofdata security in healthcare, identifies key challenges faced by healthcare organizations, and reviews existingsolutions to mitigate these risks. Additionally, it discusses emerging trends and future directions for datasecurity in healthcare, including the role of artificial intelligence (AI
APA, Harvard, Vancouver, ISO, and other styles
50

Anisha, Godse, and Kulkarni Akanksha. "Security, Protection, Tools and Applications for Big Data." Journal of Network Security and Data Mining 7, no. 1 (2023): 29–46. https://doi.org/10.5281/zenodo.10073954.

Full text
Abstract:
<i>In the past several decades, smart and advanced innovations have grown quickly. Such revolutionary advances apply to extensive number connected gadgets, including smartphones, computers, even internet-connected monitors. Due to the broad adoption of these breakthroughs have transpired in the manufacturing of enormous amounts of unorganized info in multiple layouts ranging in amount from terabytes (tb) to petabytes (pb). Big data refers to this enormous range of information. There's a lot of potential to impact the social as well as commercial sectors of the economy. Big data is used by seve
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!