بدائل البحث:
larger » large (توسيع البحث)
decrease » increase (توسيع البحث)
يعرض 1 - 20 نتائج من 170 نتيجة بحث عن '(( significant security based ) OR ( significant ((larger decrease) OR (largest decrease)) ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 1

    Maternal secure base support and preschoolers' secure base behavior in natural environments حسب Kaloustian, Garene

    منشور في 2007
    "…Overall, findings indicated that maternal secure base support was significantly related to the organization of child secure base behavior (r = .31 and .49 for Study 1 and Study 2, respectively). …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 2

    Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices حسب Habib Ullah Khan (12024579)

    منشور في 2023
    "…Most of the security methods and procedures provided by researchers are based on existing Internet security practices. …"
  3. 3
  4. 4

    Security Analysis of Integrated HAP-Based FSO and UAV-Enabled RF Downlink Communications حسب Mohammad Javad Saber (4334227)

    منشور في 2024
    "…Our results reveal the significant impact of atmospheric turbulence, RF fading, pointing errors, and optical detection technologies on the overall secrecy performance, providing valuable insights for designing secure mixed FSO and RF downlink communication systems.…"
  5. 5
  6. 6

    Degree-Based Network Anonymization حسب Halawi, Ola

    منشور في 2020
    "…The consequent privacy and data security concerns have motivated the work on degree-based data anonymization. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  7. 7

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…Therefore, the proposed work, in this paper, is based on the Least Significant Bit (LSB) substitution method. …"
  8. 8
  9. 9
  10. 10

    Security Supply Chain Using UAVs: Validation and Development of a UAV-Based Model for Qatar’s Mega Sporting Events حسب Khalifa AL-Dosari (17931434)

    منشور في 2023
    "…This study also confirmed the validity and reliability of the newly developed scales, offering practical and proposed implications for the IT and security industries. The key findings of the study are: (1) a valid and reliable UAV-based cybersecurity framework for FIFA mega sporting events was developed; (2) five critical factors were identified, including traceability, security and privacy, trust, acceptability, and preparedness; (3) all factors were significantly and positively correlated, highlighting the complexity of managing security systems in mega sporting events.…"
  11. 11

    Consortium Blockchain-Based Decentralized Stock Exchange Platform حسب Hamed Al-Shaibani (19497412)

    منشور في 2020
    "…In this paper, we present a novel blockchain-based architecture for a fully decentralized stock market. …"
  12. 12

    Secure Uplink IM-OFDMA With Artificial IQ Imbalance حسب Ozgur Alaca (17949101)

    منشور في 2023
    "…<p dir="ltr">This study proposes a novel secure uplink index modulation-based orthogonal frequency division multiple access (IM-OFDMA) systems using artificial in-phase and quadrature imbalance (A-IQI). …"
  13. 13
  14. 14

    Secure and Anonymous Communications Over Delay Tolerant Networks حسب Spiridon Bakiras (16896408)

    منشور في 2020
    "…As such, our protocol does not list the intermediate nodes along the route's path and, therefore, enhances significantly the anonymity of the underlying communications. …"
  15. 15
  16. 16

    Competition vs cooperation: An agent based model for sustainable tomatoes’ import system حسب Sarah Namany (17268922)

    منشور في 2024
    "…Interactions between trade partners are modeled using two game theoretic approaches counting<u> Cournot</u><u> competition</u> and <u>Cartel</u> collusion. Based on the research findings, a competitive global market can bring economic benefits to Qatar as an importing nation, but this approach also entails substantial <u>water consumption</u> and results in significant environmental emissions. …"
  17. 17
  18. 18

    An Energy-Water-Food Nexus-based Decision-making Framework to Guide National Priorities in Qatar حسب Sarah Namany (17268922)

    منشور في 2021
    "…The water system has also displayed a low security level, represented by a high criticality score of 0.14 in comparison with the food and energy sectors. …"
  19. 19

    Transforming Towards Secure Global Trade for Customs Administrations Powered by Blockchain حسب Abunqira, Hussam

    منشور في 2020
    "…The trade supply chain involves several participants each performs its task based on the documents that are provided by the other participant in the trade supply chain. …"
    احصل على النص الكامل
  20. 20

    Hybrid deep learning based threat intelligence framework for Industrial IoT systems حسب Jahanzaib Malik (23718816)

    منشور في 2025
    "…However, the increased pervasiveness, reduced human involvement, resource-constrained nature of underlying IoT devices, dynamic and shared spectrum of 4G/5G communication, and reliance on the cloud for outsourced massive storage and computation bring novel security challenges and concerns. A significant challenge currently confronting the Industrial Internet of Things (IIoT) is the increasing prevalence of sophisticated IoT malware threats and attacks. …"