Search alternatives:
protective » prospective (Expand Search), protection (Expand Search)
decrease » increase (Expand Search)
Showing 41 - 60 results of 705 for search '(( significant protective based ) OR ( significant ((mean decrease) OR (a decrease)) ))', query time: 0.15s Refine Results
  1. 41
  2. 42

    Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection by Shakeel Ahmad (702854)

    Published 2024
    “…<p dir="ltr">Advancement of the Internet has increased security risks associated with data protection and online shopping. Several techniques compromise Internet security, including hacking, SQL injection, phishing attacks, and DNS tunneling. …”
  3. 43

    An Integrated Model for Metaverse Adoption in Higher Education Institutions: A Structural Equation Modelling and Artificial Neural Network Approach by MAGHAYDAH, SAFWAN SULEIMAN MGHIED

    Published 2024
    “…Information and Communication Technology (ICT) is experiencing a significant shift with the advent of the Metaverse, merging physical reality with a virtual world via virtual and augmented reality headsets. …”
    Get full text
  4. 44

    An Overview of Membrane Based NO<sub>x</sub> Removal Technologies and Dinitrification Fitlers by Ahmed T. Yasir (17302753)

    Published 2025
    “…<p dir="ltr">Air pollution has emerged as a significant global issue, largely due to the increasing demand for energy and industrial processes that release harmful gases into the atmosphere. …”
  5. 45

    Beyond vanilla: Improved autoencoder-based ensemble in-vehicle intrusion detection system by Sampath Rajapaksha (17541411)

    Published 2023
    “…Detecting attacks on the CAN bus, particularly masquerade attacks, presents significant challenges. It necessitates an intrusion detection system (IDS) that effectively utilizes both CAN ID and payload data to ensure thorough detection and protection against a wide range of attacks, all while operating within the constraints of limited computing resources. …”
  6. 46

    Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices by Habib Ullah, Khan

    Published 2023
    “…Most of the security methods and procedures provided by researchers are based on existing Internet security practices. The top-ranking authentication feature categories included the most compatible and common authentication feature for all types of IoT-based devices as an elementary security requirement for protection from unauthorized access. …”
    Get full text
    Get full text
    Get full text
    article
  7. 47

    Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices by Habib Ullah Khan (12024579)

    Published 2023
    “…Most of the security methods and procedures provided by researchers are based on existing Internet security practices. The top-ranking authentication feature categories included the most compatible and common authentication feature for all types of IoT-based devices as an elementary security requirement for protection from unauthorized access. …”
  8. 48

    Enhanced electrochemical and mechanical performance of BN reinforced Ni-P based nanocomposite coatings by Izza Fatima (17346967)

    Published 2022
    “…<p dir="ltr">Adequate corrosion protection and improved mechanical properties are necessary requirements to overcome operational costs in the industries. …”
  9. 49

    Mechanical and corrosion characteristics of TiC reinforced Ni-P based nanocomposite coatings by Mohammad Farhan (17017683)

    Published 2023
    “…<p dir="ltr">The requirement for effective corrosion protection and better mechanical properties in various industries employing metal components has led to the growth of nickel (Ni)-based metallic coatings. …”
  10. 50

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…It is of critical significance given the advancement in modern strategic narratives. …”
  11. 51

    Mutations in L-type amino acid transporter-2 support SLC7A8 as a novel gene involved in age-related hearing loss by Meritxell Espino Guarch (18810097)

    Published 2018
    “…Significant decreases in SLC7A8 transport activity was detected for patient’s variants (p.Val302Ile, p.Arg418His, p.Thr402Met and p.Val460Glu) further supporting a causative role for SLC7A8 in ARHL. …”
  12. 52

    Factors Affecting Cybersecurity Behaviour in the Metaverse: A Hybrid SEM-ANN Approach Based on Deep Learning by ALMANSOORI, AFRAH

    Published 2023
    “…In line with the existing gaps found in the literature, this research, therefore, develops an integrated model based on extracting constructs from the Protection Motivation Theory (PMT), Health Belief Model (HBM), and Theory of Interpersonal Behaviour (TIB). …”
    Get full text
  13. 53

    Photobiomodulation Suppresses Alpha-Synuclein-Induced Toxicity in an AAV-Based Rat Genetic Model of Parkinson’s Disease by Abid Oueslati (816135)

    Published 2015
    “…This treatment also significantly reduced dopaminergic neuronal loss in the injected substantia nigra and preserved dopaminergic fibers in the ipsilateral striatum. …”
  14. 54

    Hyperspectral-physiological based predictive model for transpiration in greenhouses under CO<sub>2</sub> enrichment by Ikhlas Ghiat (16932564)

    Published 2023
    “…The results demonstrated the inclusion of hyperspectral-based vegetation indices significantly increased the performance of the three machine learning models in predicting transpiration. …”
  15. 55

    Security Supply Chain Using UAVs: Validation and Development of a UAV-Based Model for Qatar’s Mega Sporting Events by Khalifa AL-Dosari (17931434)

    Published 2023
    “…The key findings of the study are: (1) a valid and reliable UAV-based cybersecurity framework for FIFA mega sporting events was developed; (2) five critical factors were identified, including traceability, security and privacy, trust, acceptability, and preparedness; (3) all factors were significantly and positively correlated, highlighting the complexity of managing security systems in mega sporting events.…”
  16. 56

    Accelerated corrosion of stainless steel and Ni-based alloys in molten NaNO<sub>3</sub>-KNO<sub>3</sub> salt vapour phases by Qingyang Liu (1508776)

    Published 2024
    “…A thinner oxide layer was found on Ni-based alloy. This was identified as a dense and protective inner NiO layer with Fe oxide particles distributed above the layer. …”
  17. 57

    A customised fetal growth and birthweight standard for Qatar: a population-based cohort study by Thomas Farrell (3933833)

    Published 2024
    “…</p><h2>Other Information</h2><p dir="ltr">Published in: Journal of Perinatal Medicine<br>License: <a href="http://creativecommons.org/licenses/by/4.0" target="_blank">http://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1515/jpm-2024-0060" target="_blank">https://dx.doi.org/10.1515/jpm-2024-0060</a></p>…”
  18. 58

    Fixing a heart valve by Nature Research (16552612)

    Published 2015
    “…All of these factors significantly increase the rate of complications following valve replacement, so valve repair is a more viable option in these parts of the world. …”
  19. 59

    Improving the performance of a commercial absorption cooling system by using ejector: A theoretical study by Hamza K. Mukhtar (17821004)

    Published 2023
    “…An improvement of 70.6% in the COP was obtained at the design condition. A parametric analysis was implemented to study the significance of the key parameters in the RACS performance. …”
  20. 60

    A clustering metaheuristic for large orienteering problems by Almiqdad Elzein (13141038)

    Published 2022
    “…The metaheuristic aims to dramatically improve the computation time of a given Orienteering Problem algorithm without a significant decrease in the solution quality of that algorithm, especially for large Orienteering Problems. …”