To see the other types of publications on this topic, follow the link: Security Section.

Journal articles on the topic 'Security Section'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security Section.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Khin, Thandar Tun, Sandar Aung Aye, and Lwin Thant May. "GSM Based Fire Security System." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 1686–90. https://doi.org/10.5281/zenodo.3591292.

Full text
Abstract:
Telecommunication is a very important part of its life. This technology is used in a very sophisticated area like safety and security purpose. Using the GSM technology, telecommunication is conducive to save its life as well as households from fire accidents which have shown in this paper. In this paper, the overall circuit is constructed with six sections. The first section is power supply. The second section is temperature sensor and smoke sensor. The third section is Arduino. The fourth section is LCD display. The fifth section is fan, buzzer and water pump. The sixth section is GSM module.
APA, Harvard, Vancouver, ISO, and other styles
2

MR., SHIVAM KUMAR DR. SHAMBHU KUMAR SINGH. "STRENGTHENING CLOUD SECURITY AND DATA INTEGRITY WITH INNOVATIVE ENCRYPTION METHODS." International Journal For Technological Research In Engineering 11, no. 11 (2024): 1–11. https://doi.org/10.5281/zenodo.12670480.

Full text
Abstract:
Abstract - Cloud computing has transformed the IT industry by offering storage, computing power, network, and software services on demand over the internet. This allows clients to access these services remotely from anywhere, at any time, using any device. With this shift from personal computer storage to massive data centers, data security has become a major concern for cloud developers.In this paper, we propose a security model implemented in Cloud Analyst to enhance cloud storage security. This model uses various encryption algorithms and an integrity verification scheme to protect data. Th
APA, Harvard, Vancouver, ISO, and other styles
3

Sjoberg, Laura. "Failure and critique in critical security studies." Security Dialogue 50, no. 1 (2018): 77–94. http://dx.doi.org/10.1177/0967010618783393.

Full text
Abstract:
Debates imitates scholarship, which imitates debate. Using perspectives from both my policy debate career and my research career, this article argues that the enterprise of critique, whether in critical security studies or elsewhere, is always and already failing and failed. It proceeds in four sections. The first section sets up my entry into the problems of/with critique. The second section analyzes the types of dissonances inherent in the production of critical security studies scholarship. The third section theorizes those dissonances as failures – arguing that failure itself is a part of
APA, Harvard, Vancouver, ISO, and other styles
4

Munoz-Ausecha, Cesar, Juan Ruiz-Rosero, and Gustavo Ramirez-Gonzalez. "RFID Applications and Security Review." Computation 9, no. 6 (2021): 69. http://dx.doi.org/10.3390/computation9060069.

Full text
Abstract:
Radio frequency identification (RFID) is widely used in several contexts, such as logistics, supply chains, asset tracking, and health, among others, therefore drawing the attention of many researchers. This paper presents a review of the most cited topics regarding RFID focused on applications, security, and privacy. A total of 62,685 records were downloaded from the Web of Science (WoS) and Scopus core databases and processed, reconciling the datasets to remove duplicates, resulting in 40,677 unique elements. Fundamental indicators were extracted and are presented, such as the citation numbe
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Jin Jiang, Mei He, Hong Ke Xu, Qi Wang, and Yong Mei Yang. "The Identified Method of Accident-Prone Section Based on Principal Component-Gray Clustering Analysis." Applied Mechanics and Materials 135-136 (October 2011): 1060–66. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.1060.

Full text
Abstract:
In order to study the rapid and efficient identified method of accident-prone section in montane highway, the method of principal component - gray clustering analysis has been proposed. By deep analysis of the characteristics of accident-prone section, the identified indexes of accident-prone section have been screened out, the reducing dimensionality of principal component analysis and incomplete information processing of gray clustering analysis have been organically integrated, and the clustering weight coefficients are creatively determined based on the information content. Based on data i
APA, Harvard, Vancouver, ISO, and other styles
6

Rangel de Mesquita, Maria José. "Judicial review of Common Foreign and Security Policy by the ECtHR and the (re)negotiation on the accession of the EU to the ECHR." Maastricht Journal of European and Comparative Law 28, no. 3 (2021): 356–70. http://dx.doi.org/10.1177/1023263x20988241.

Full text
Abstract:
The article addresses the issue of judicial control of the implementation of Common Foreign and Security Policy at international regional level within the framework of the relaunching of the negotiation in view of the accession of the EU to the ECHR. Considering the extent of jurisdiction of the CJEU in respect of Common Foreign and Security Policy field in the light of its case law (sections 1 and 2), it analyses the question of judicial review of Common Foreign and Security Policy within international regional justice by the ECtHR in the light of the ongoing negotiations (section 3), in the
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Feifan, Yuncai Wang, Yuehui Sun, et al. "Key Space Enhancement in Chaotic Secure Communication Utilizing Monolithically Integrated Multi-Section Semiconductor Lasers." Photonics 10, no. 2 (2023): 213. http://dx.doi.org/10.3390/photonics10020213.

Full text
Abstract:
Chaotic secure communication schemes encounter a conflict of key space enhancement between the consistency and complexity of chaotic transceivers. In this paper, we propose a monolithically integrated multi-section semiconductor laser (MIMSL), used as a compact chaotic transceiver with an enhanced key space. The MIMSL consists of a distributed feedback (DFB) laser section, a semiconductor optical amplifier (SOA) section, two phase (P) sections and a passive optical waveguide. We simulate the dynamics of the MIMSL by applying the time-dependent coupled-wave equations for traveling-wave optical
APA, Harvard, Vancouver, ISO, and other styles
8

Brooks, Julia, and Rob Grace. "Confronting Humanitarian Insecurity." Journal of Humanitarian Affairs 2, no. 1 (2020): 11–20. http://dx.doi.org/10.7227/jha.030.

Full text
Abstract:
Violence against aid workers seeking to bring assistance and protection to vulnerable people amid ongoing armed conflicts, disasters or other crises has fuelled growing concern over how to protect the humanitarian mission. Based on semi-structured interviews conducted with 118 practitioners involved in humanitarian operations and security management, this article considers three under-analysed prongs of grappling with humanitarian insecurity. The first three sections, in turn, examine the pursuit of accountability at both the domestic and international levels, public advocacy efforts and confi
APA, Harvard, Vancouver, ISO, and other styles
9

VimalRosy, J., and S. Britto Ramesh Kumar. "Security Threats in Cloud Computing." Asian Journal of Computer Science and Technology 8, S1 (2019): 80–83. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1946.

Full text
Abstract:
Day by day witnesses a wide development of information technology in the use of cloud computing, and its services shape its architecture. It is indeed, that replaces the former attempts to enrich the security strategy in cloud computing. Security is one of the major issues in the cloud computing environment. In this paper we investigate about security threads and possible solution for cloud. The paper is categorized as follows: Section I describes the cloud computing overview. Section II describes the security threats and challenges in cloud computing. Section III describes the Obstacles and v
APA, Harvard, Vancouver, ISO, and other styles
10

Sheikh, Mahmood A., Syed Muhammad Bin Ahmed, and Afrasiab Ahmed Rana. "ECONOMIC SECURITY IN PAKISTAN: INDICATORS, ISSUES, IMPACTS AND WAY FORWARD." Pakistan Journal of Social Research 04, no. 01 (2022): 990–99. http://dx.doi.org/10.52567/pjsr.v4i1.1268.

Full text
Abstract:
Economic security is a critical component of a nation's overall well-being, encompassing various aspects such as sustainable growth, stable employment, and equitable wealth distribution. Pakistan, a developing country with a dynamic socio-economic landscape, faces multifaceted challenges in ensuring economic security for its populace. This article presents a comprehensive analysis of the indicators, issues, impacts, and potential pathways to enhance economic security in Pakistan and recommends certain key recommendations while comparing the economic conditions with other Asian economies. Compr
APA, Harvard, Vancouver, ISO, and other styles
11

Patkar, Uday, Priyanshu Singh, Harshit Panse, Shubham Bhavsar, and Chandramani Pandey. "Cloud Computing and Security Fundamentals." International Journal of Computer Science and Mobile Computing 11, no. 4 (2022): 18–24. http://dx.doi.org/10.47760/ijcsmc.2022.v11i04.004.

Full text
Abstract:
In today’s era almost all the organizations are preferring to use cloud as their primary storage. Once the organization uploads its data to cloud, then the organization has no control over it. Then comes the security challenges in handling data to cloud service providers. While selecting a Cloud Service Provider we need to be aware about that service provider before giving our data because as from now you will not have all the control. This paper gives a better understanding on the concept of cloud computing and the risks that came up after outsourcing data handling tasks. Section 1 is Introdu
APA, Harvard, Vancouver, ISO, and other styles
12

Shumov, Vladislav, Evgenij Sergeevich Girnik, and Pavel Dmitrievich Senichenkov. "Scientific support of border activity." Вопросы безопасности, no. 5 (May 2020): 1–16. http://dx.doi.org/10.25136/2409-7543.2020.5.34927.

Full text
Abstract:
The object of this research is the border activity, while the subject is the science of border activity – borderology. The article consists of five sections. The first section views border activity as a system of preventive (border prevention and deterrence), security and control (border patrol, border search), and defense-militant measures (special activity, combat activity, operational actions). The second and third sections give detail description to these measures, as well as the typical stages of the cycles of activity. The fourth section is dedicated to description of the struc
APA, Harvard, Vancouver, ISO, and other styles
13

Shumov, Vladislav, Evgenij Sergeevich Girnik, and Pavel Dmitrievich Senichenkov. "Scientific support of border activity." Вопросы безопасности, no. 1 (January 2021): 1–16. http://dx.doi.org/10.25136/2409-7543.2021.1.34927.

Full text
Abstract:
The object of this research is the border activity, while the subject is the science of border activity – borderology. The article consists of five sections. The first section views border activity as a system of preventive (border prevention and deterrence), security and control (border patrol, border search), and defense-militant measures (special activity, combat activity, operational actions). The second and third sections give detail description to these measures, as well as the typical stages of the cycles of activity. The fourth section is dedicated to description of the struc
APA, Harvard, Vancouver, ISO, and other styles
14

Venkataraman, Manickam. "Piracy off the coast of Somalia: implications for China’s maritime security." Bandung: Journal of the Global South 3, no. 1 (2016): 1–13. http://dx.doi.org/10.1186/s40728-016-0034-1.

Full text
Abstract:
Piracy off the coast of Somalia in the Gulf of Aden in the Indian Ocean region has become a significant non-traditional security challenge to many nations. The increasing number of such attacks as a result of failure of Somali government to tackle its internal problem drew the attention of international community who lent a drastic response thereby curtailing the number of such incidents significantly now. The intensity of the attacks had its implications on international shipping and maritime security of near and distant countries like China, which has of late become assertive. This article a
APA, Harvard, Vancouver, ISO, and other styles
15

Pandey, Neeraj Kumar. "Proposed Model in IoT Security Layer for Ethical Security Management." Journal of Futuristic Sciences and Applications 5, no. 2 (2022): 54–64. http://dx.doi.org/10.51976/jfsa.522208.

Full text
Abstract:
With the number of similar applications and concepts being used these days the threats of cyber-attacks are also high, where completely different attacks and threats can result in serious problems to the whole system of the network, hence making the concepts of security system to be extremely important. The present analysis helps in discussing the management of security in IoT networks discussing it in five sections. We tend to 1st illustrate the background and conception behind the idea of IoT. After which the needs for safety for IoT are mentioned. In the next section, the projected design m
APA, Harvard, Vancouver, ISO, and other styles
16

Rennels, Max R., and Ramesh B. Chaudhari. "Eye Contact and Grade Distribution." Perceptual and Motor Skills 67, no. 2 (1988): 627–32. http://dx.doi.org/10.2466/pms.1988.67.2.627.

Full text
Abstract:
While teaching a large lecture course of art appreciation, I investigated whether grades vary by section to section in the auditorium. The auditorium was divided into nine sections containing 20 students per section. Students were seated by alphabetized lists, by Social Security numbers, or by selecting seats they wished to sit in for the duration of that semester. Two tests were given to each class, one on required reading and one on the slide/lectures. Regardless of the method of seating, students in the middle and the front sections achieved scores considerably higher than those in the rear
APA, Harvard, Vancouver, ISO, and other styles
17

Soe, Sandar, and Aung Nyein Oo Saw. "Development of a Secured Door Lock System Based on Face Recognition using Raspberry Pi and GSM Module." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 357–61. https://doi.org/10.5281/zenodo.3589775.

Full text
Abstract:
Security is an important part of everyday life. The main aim of the system is to develop a secured door lock system. The system consists of three sections. The first section is the face recognition system that is based on Haar like features detection method and Local Binary Pattern LBP recognition algorithm. The second section is the password security system. And the last section is the alert system through GSM module. The system is composed by the combination of face recognition security system, password security system and the alert system through the GSM module. In this system, the iteratio
APA, Harvard, Vancouver, ISO, and other styles
18

Franco Cardona, Carlos Jaime, Mónica Castañeda Riascos, Alejandro Valencia Arias, and Jonathan Bermúdez Hernández. "The energy trilemma in the policy design of the electricity market." DYNA 82, no. 194 (2015): 160–69. http://dx.doi.org/10.15446/dyna.v82n194.48595.

Full text
Abstract:
The energy "Trilemma" seeks to develop an electricity market which simultaneously ensures environmental quality, security of supply, and economic sustainability. The objective of this paper is to present the "Trilemma" energy as the latest trend in the design of energy policy. For this, a theoretical framework is presented in sections 2 and 3, in section 4 and 5 the importance of security of supply and economic sustainability are discussed, respectively. In section 6 the energy "trilemma" is presented, in section 7 a brief state of the art is showed. Finally in section 8, it is approached thre
APA, Harvard, Vancouver, ISO, and other styles
19

James, A. J. B., J. Smith, R. Hoogkamer, J. Laing, and W. M. Donovan. "Minimum and medium security." Psychiatric Bulletin 20, no. 4 (1996): 201–4. http://dx.doi.org/10.1192/pb.20.4.201.

Full text
Abstract:
This paper examines the use of Section 17 trial leave from local psychiatric units to regional secure units in order to facilitate the return of patients to local services when higher security is no longer necessary. The current national shortage of medium secure beds is exacerbated by such patients when general psychiatric services are unwilling to have them back. Experience from the regional secure units in the old South Western Region has shown beneficial effects of the use of Section 17 trial leave in this way.
APA, Harvard, Vancouver, ISO, and other styles
20

Haberman, S. "Long-term sickness and invalidity benefits: Forecasting and other actuarial problems." Journal of the Institute of Actuaries 114, no. 3 (1987): 467–550. http://dx.doi.org/10.1017/s0020268100019181.

Full text
Abstract:
It is proposed to discuss the actuarial problems associated with the management of long-term sickness and invalidity benefits. The emphasis is on benefits provided by social security schemes (with particular reference to National Insurance benefit in the UK), but the main points are relevant to private sector benefits including permanent health insurance (PHI).The plan of the paper is as follows. We describe in Section 2 the nature of long-term invalidity benefit provided by the British social security system and then consider in Section 3 the problems associated with defining disability. A di
APA, Harvard, Vancouver, ISO, and other styles
21

Schneider, Patricia, Fanglu Sun, and Steve Wood. "Perspectives on World and Regional Orders: Australian, Chinese and German Views." Sicherheit & Frieden 37, no. 3 (2019): 149–58. http://dx.doi.org/10.5771/0175-274x-2019-3-149.

Full text
Abstract:
This article offers some reflections from diverse standpoints on actual and potential developments, at global and regional levels, and possible ramifications. The article has three main sections. The first section deals with the crisis of liberalism and its implications for peace and security. The second section examines some current controversial issues and cooperation between the EU, Australia and China. The third section analyses the effects of populist movements in Europe on China and Australia.
APA, Harvard, Vancouver, ISO, and other styles
22

VEVERA, Victor Adrian, and Ulpia Elena BOTEZATU. "Revolutionizing space security: The Laser Patroller Satellite – A technological marvel of modern warfare." BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 12, no. 2 (2023): 28–42. http://dx.doi.org/10.53477/2284-9378-23-18.

Full text
Abstract:
This comprehensive article analyses the Laser Patroller Satellite (LPS) and its capabilities for enhancing security and safety in space exploration. The article is organized into five sections. Section 1 presents the context of the growing problem of space debris and the need for effective solutions. In Section 2, the features of the LPS, including its advanced sensors and tracking capabilities, are discussed. Section 3 elaborates on the capabilities of the satellite, such as space debris monitoring and tracking, space traffic management, debris removal, space situational awareness, and space
APA, Harvard, Vancouver, ISO, and other styles
23

ALmogateef, Joharah, and Mohammed Alwajeeh. "Security Border Systems and their Impact on International Security Relations Alrashideen and Alamawi Eras, (11-132 AH /632-750 AD)." International Journal of Educational Sciences and Arts 4, no. 2 (2025): 430–62. https://doi.org/10.59992/ijesa.2025.v4n2p17.

Full text
Abstract:
The study aims to examine security systems borders and their impact on international relations during Al Rashideen and alamawi eras (11-132 AH / 632-750 CE). The aim of the study is to trace the border security systems and their impact on international relations during the Rashidun and Umayyad eras, as well as their contributions during the period under study. The study adopts the historical inductive method and the descriptive historical method. It includes an introduction to the systems related to military preparations during the Rashidun and Umayyad eras, and two main sections: The study co
APA, Harvard, Vancouver, ISO, and other styles
24

Aisha, Sani Maikudi. "THE UNITED NATIONS SECURITY COUNCIL AND THE NEED FOR STREGHTENING A RULES-BASED INTERNATIONAL SYSTEM." Abuja Journal of Private and Comparative Law 2, no. 1 (2012): 264–87. https://doi.org/10.5281/zenodo.4682133.

Full text
Abstract:
International law and the rule of law are the foundations of the international system and the Security Council is the most powerful international body. This article argues that in fulfilling its mandate of international peace and security, economic development and social progress, the Security Council is most legitimate and effective when it submits itself to the rule of law. Section I examines what the rule of law is in international affairs. Section II illustrates how the Security Council has used this concept. Section III discusses how the concept applies to the Security Council by consider
APA, Harvard, Vancouver, ISO, and other styles
25

Delp, Edward J. "Special Section on Security, Steganography, and Watermarking." Journal of Electronic Imaging 15, no. 4 (2006): 041101. http://dx.doi.org/10.1117/1.2387946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Horner, Joseph L. "Guest Editorial: Special Section on Optical Security." Optical Engineering 35, no. 9 (1996): 2451. http://dx.doi.org/10.1117/1.600830.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Javidi, Bahram. "Guest Editorial: Special Section on Optical Security." Optical Engineering 38, no. 1 (1999): 8. http://dx.doi.org/10.1117/1.602039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Önen, Melek, and Thorsten Strufe. "Special section on Security and Social Networking." Computer Communications 35, no. 1 (2012): 47. http://dx.doi.org/10.1016/j.comcom.2011.10.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Kim, Tai-hoon, and Wai-chi Fang. "Special section: Grid/distributed computing systems security." Future Generation Computer Systems 25, no. 3 (2009): 351. http://dx.doi.org/10.1016/j.future.2008.10.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Kawamura, S. "Special Section on Cryptography and Information Security." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, no. 1 (2006): 1. http://dx.doi.org/10.1093/ietfec/e89-a.1.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

MORII, M. "Special Section on Cryptography and Information Security." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, no. 1 (2007): 1. http://dx.doi.org/10.1093/ietfec/e90-a.1.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Matsui, M. "Special Section on Cryptography and Information Security." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E91-A, no. 1 (2008): 1–2. http://dx.doi.org/10.1093/ietfec/e91-a.1.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Levine, Richard. "Trade vs. national security: Section 232 cases." Comparative Strategy 7, no. 2 (1988): 133–41. http://dx.doi.org/10.1080/01495938808402738.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Ms., Sahana Suresh G1* Ms. Sachana C2 Ms. Ramya K3 Dr. T. Vetrivel4 Dr.R.Satheeshkumar5. "APPLICATION OF DATA SECURITY IN ORGANIZATIONS WITH REFERENCE TO BANGALORE." ISRG Journal of Arts Humanities & Social Sciences (ISRGJAHSS) III, no. I (2025): 532–42. https://doi.org/10.5281/zenodo.14898083.

Full text
Abstract:
<strong>Abstract</strong> <em>This paper presents the application of data security in organizations, emphasizing its significance in the digital age. The introduction establishes data as a core organizational asset, in danger to various threats. To address these vulnerabilities, the methodology section outlines a comprehensive framework encompassing Access Controls, Data Encryption, Data Loss Prevention (DLP), Employee Training, Backup and Recovery, Security Software. </em> <em>Results section is envisioned to present the findings from implementing above outlined methodologies and the discussi
APA, Harvard, Vancouver, ISO, and other styles
35

Duque, Gustavo Adolfo Guarin. "Interpreting WTO Rules in Times of Contestation (Part 2): A Proposed Interpretation of Article XXI(b)ii–iii of the GATT 1994 in the Light of the Vienna Convention of the Law of the Treaties." Global Trade and Customs Journal 14, Issue 1 (2019): 31–44. http://dx.doi.org/10.54648/gtcj2019004.

Full text
Abstract:
This document is a research paper written under the legal framework of the WTO. It focuses on the issue of the justiciability and interpretation of the security exception provided in the Article XXI(b) of the GATT 1994. It contains two sections. The first section deals with the issue of Jurisdiction of the Settlement Mechanism of the WTO, whether a WTO panel is entitled to solve a controversy regarding Article XXI(b) of the GATT 1994. The second section engages in a debate over the interpretation of the security exception, literal (b) subsections ii-iii, applying as a necessary corollary of in
APA, Harvard, Vancouver, ISO, and other styles
36

Obeid, H., F. Hillani,, R. Fakih, and K. Mozannar. "Artificial Intelligence: Serving American Security and Chinese Ambitions." Financial Markets, Institutions and Risks 4, no. 3 (2020): 42–52. http://dx.doi.org/10.21272/fmir.4(3).42-52.2020.

Full text
Abstract:
In recent years artificial intelligence has entered a new era, which gives rise to many hopes for powerful states such as the United States and China. In this paper, we analyze the importance and role of artificial intelligence in technological development in each of the two countries on the one hand, and its influence on China-American relations in terms of technological and geopolitical conflict. To get the right results, we rely on a literature review of dozens of articles published on the phenomenon in order to compare the power of artificial intelligence between the United States and Chin
APA, Harvard, Vancouver, ISO, and other styles
37

Guo, Yuanyuan, Yao Du, Hua Gao, et al. "Chaos Synchronization of Integrated Five-Section Semiconductor Lasers." Entropy 26, no. 5 (2024): 405. http://dx.doi.org/10.3390/e26050405.

Full text
Abstract:
We proposed and verified a scheme of chaos synchronization for integrated five-section semiconductor lasers with matching parameters. The simulation results demonstrated that the integrated five-section semiconductor laser could generate a chaotic signal within a large parameter range of the driving currents of five sections. Subsequently, chaos synchronization between two integrated five-section semiconductor lasers with matched parameters was realized by using a common noise signal as a driver. Moreover, it was found that the synchronization was sensitive to the current mismatch in all five
APA, Harvard, Vancouver, ISO, and other styles
38

Zainal, Redho. "PELAKSANAAN TUGAS SEKSI KEAMANAN DAN KETERTIBAN RUMAH DETENSI IMIGRASI (RUDENIM) PEKANBARU." JIANA ( Jurnal Ilmu Administrasi Negara ) 20, no. 1 (2022): 70. http://dx.doi.org/10.46730/jiana.v20i1.8025.

Full text
Abstract:
This study aims to analyze how the Security and Order Section of the Pekanbaru Immigration Detention Center is carried out. In this study, the benchmark used is to pay attention to security, service and disposition of the security and order section. The population in this study were the Head of Rudenim, Head of Security and Order Section, Head of Security Subsection, Head of Order Subsection, Commander of Immigration Guards, and Detainees. And the entire population is used as a sample where the Head of the Rudenim is a key informant and the security and order section uses a purposive sampling
APA, Harvard, Vancouver, ISO, and other styles
39

Millar, Jane. "Simplification, modernisation and social security." Benefits: A Journal of Poverty and Social Justice 13, no. 1 (2005): 10–15. http://dx.doi.org/10.51952/fxdz9147.

Full text
Abstract:
The topic of benefit simplification regularly returns to the policy agenda. A simpler system, easy to understand and to deliver, is a goal that everyone wants to reach. Simplification is both a political and an administrative issue and, although these two issues cannot be entirely separated, this article focuses on the administrative side. The first section discusses how the government’s commitment to modernisation has, in various ways, focused attention on the need for simplification of benefits. The second section considers simplification from the three rather different perspectives of the D
APA, Harvard, Vancouver, ISO, and other styles
40

Turkut, Emre. "Accommodating Security Imperatives v. Protecting Fundamental Rights." Security and Human Rights 28, no. 1-4 (2018): 62–91. http://dx.doi.org/10.1163/18750230-02801002.

Full text
Abstract:
This article seeks to illuminate the use of exceptional national security and emergency powers in the fight against terrorism in Turkey. The article is organized in four parts. Section i looks at the role of terrorism in the activation and justification of a state of emergency and introduces the Turkish case within this context. Section ii explores the historical origins of the Turkish state of emergency regime and analyses the principles regulating emergency regime at the Turkish domestic level. Section iii examines the operation of governmental emergency powers by providing an analysis of th
APA, Harvard, Vancouver, ISO, and other styles
41

Dasgupta, Rohee. "Section III :." Jindal Journal of International Affairs 1, no. 1 (2011): 162–63. http://dx.doi.org/10.54945/jjia.v1i1.13.

Full text
Abstract:
The essays in this commemorative issue, speak about global responsibility and accountability which may reframe the way issues are defined between globalisation, sovereignty and security. There are increasingly visible works in international relations that invite an all too familiar mode of probing and interpretation. But this scholarly collection assigns a strategy of response to liberal orders, and situates a range of possibilities that allowably explore standard measures of global conduct of both states and non-states.
APA, Harvard, Vancouver, ISO, and other styles
42

Qiu, Ling, and Cai Ming Liu. "An Intelligent Detection Method for Network Security." Applied Mechanics and Materials 530-531 (February 2014): 646–49. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.646.

Full text
Abstract:
To dynamically discover network attacks hidden in network data, an intelligent detection method for network security is proposed. Biological immune principles and mechanisms are adopted to judge whether network data contain illegal network packets. Signature library of network attacks and section library of attack signatures are constructed. They store attack signatures and signature sections, respectively. They are used to make the initial detection ability of proposed method. Detectors are defined to simulate immune cells. They evolve dynamically to adapt the network security. Signatures of
APA, Harvard, Vancouver, ISO, and other styles
43

Kendall, Emily C. "The Alien Terrorist Removal Court and Other National Security Measures You May Have Never Heard Of: The Need for Comprehensive National Security Reform." Texas Wesleyan Law Review 18, no. 2 (2011): 253–74. http://dx.doi.org/10.37419/twlr.v18.i2.4.

Full text
Abstract:
In light of the decade that has passed since 2001, cooler heads have prevailed. Advancements in technology and information-seeking have paved the way to prune unnecessary laws that are archaic, redundant, in many instances contradictory, and which merely frustrate the real policy behind these laws: safeguarding the U.S. and its citizens. To assist in this pruning, this Article presents a comprehensive plan for national security reform, specifically involving immigration, with an emphasis on the agency tasked with its implementation-the Department of Homeland Security. In light of this goal, Se
APA, Harvard, Vancouver, ISO, and other styles
44

Rameshreddy Katkuri. "Security in cloud-native microservices: The critical foundation." World Journal of Advanced Engineering Technology and Sciences 15, no. 1 (2025): 1255–71. https://doi.org/10.30574/wjaets.2025.15.1.0321.

Full text
Abstract:
Cloud-native microservices architectures have revolutionized application development but introduce significant security challenges due to their distributed nature. This article examines three critical pillars of microservices security: secure coding practices, encryption strategies, and compliance requirements. The secure coding section explores input validation, principle of least privilege, error handling, and dependency management techniques specific to distributed services. The encryption strategies section details transport layer security implementation, data encryption at rest, secrets m
APA, Harvard, Vancouver, ISO, and other styles
45

Groves, Kenneth. "2017 Homeland Security Section Service Award - Allen Brodsky." Health Physics 113, no. 6 (2017): 438. http://dx.doi.org/10.1097/hp.0000000000000733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Yunsi, Fei,, Eisenbarth, Thomas, and Serpanos, Dimitrios. "Guest Editorial: Special Section on Embedded System Security." IEEE Embedded Systems Letters 7, no. 1 (2015): 1–2. http://dx.doi.org/10.1109/les.2015.2404940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Pérez, María S., and Bin Xiao. "Special section: Security on grids and distributed systems." Future Generation Computer Systems 23, no. 6 (2007): 774–75. http://dx.doi.org/10.1016/j.future.2007.02.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Nakao, K. "Special Section on Information and Communication System Security." IEICE Transactions on Information and Systems E91-D, no. 5 (2008): 1225. http://dx.doi.org/10.1093/ietisy/e91-d.5.1225.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Liu, Jun, Ling Ling Pan, Yi Jun Yu, et al. "A Method of Static Security Analysis Based on Section Topology Relation." Advanced Materials Research 614-615 (December 2012): 900–906. http://dx.doi.org/10.4028/www.scientific.net/amr.614-615.900.

Full text
Abstract:
In this paper, a calculation method of static security analysis based on section topology relation is proposed. When topological structure of current data section is the same as that of the basecase section, it fully utilizes the factor tables of Jacobian matrix, and inverse matrix information of the basecase data section in rapid filtration of DC power flow. On the contrary, If topology changes compared with the basecase section, it adopts substation partial topological analysis technology as well as the method of partial factor table correction to increase the speed of calculation. Case stud
APA, Harvard, Vancouver, ISO, and other styles
50

Tavuyanago, Simbarashe. "An Analysis of the "National Security Interest" Provision in terms of Section 18A of the Competition Act 89 of 1998." Potchefstroom Electronic Law Journal 24 (April 9, 2021): 1–34. http://dx.doi.org/10.17159/1727-3781/2021/v24i0a6031.

Full text
Abstract:
This contribution examines the implications of the "national security provision" in terms of section 18A of the Competition Act 89 of 1998 as inserted by section 14 of the Competition Amendment Act 18 of 2018. The effect of section 18A is that it confers upon the President of the Republic of South Africa power to appoint a national security committee whose mandate is to investigate mergers involving a foreign acquiring firm and determine whether such a merger would pose a threat to the "national security interests". The contribution highlights the possible challenges that the insertion of sect
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!