Results for 'Focusing on Insurgency San Diegoher Research is in International Security'

986 found
Order:
  1.  20
    Ethical Hacking in Network Security: Assessing Vulnerabilities to Improve Defenses.Bellamkonda Srikanth - 2022 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 5 (5):611-619.
    In an era of increasing cyber threats, ethical hacking has emerged as a pivotal practice in strengthening network security. Ethical hacking, also known as penetration testing, involves authorized attempts to breach a network or system to uncover vulnerabilities before malicious actors can exploit them. This research paper delves into the role of ethical hacking in assessing and mitigating network vulnerabilities to fortify defenses against cyberattacks. It emphasizes the strategic importance of ethical hacking in the context of evolving cybersecurity (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Internal Instability as a Security Challenge for Vietnam.Nguyen Hoang Tien, Nguyen Van Tien, Rewel Jimenez Santural Jose, Nguyen Minh Duc & Nguyen Minh Ngoc - 2020 - Journal of Southwest Jiaotong University 55 (4):1-13.
    National security is one of the most critical elements for Vietnam society, economy and political system, their stability, sustainability and prosperity. It is unconditionally the top priority for Vietnamese government, State, Communist Party and military forces. In the contemporary world with advanced technology and rapid globalization process taking place, beside many extant economic, social and political benefits there are many appearing challenges and threats that could endanger and destabilize the current socio-economic and political system of any country, including Vietnam. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  51
    Digital Transformation in Insurance: How Guidewire, AWS, and Snowflake Converge for Future-Ready Solutions.Adavelli Sateesh Reddy - 2022 - International Journal of Computer Science and Information Technology Research 3 (1):95-114.
    The digital transformation of the insurance industry is unprecedented, urged by the changing expectations of customers, the necessity to embrace regulatory requirements and the necessity to enhance operational efficiency. This paper examines the convergence of three leading-edge technologies, Guidewire, Amazon Web Services (AWS) and Snowflake, to enable scalable, resilient and data-driven solutions for insurers. AWS and Snowflake provide unmatched cloud infrastructure in terms of security and scalability. They also provide industry-specific applications and frameworks for modernizing core systems for Guidewire, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  53
    Enhancing Network Security in Healthcare Institutions: Addressing Connectivity and Data Protection Challenges.Bellamkonda Srikanth - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):1365-1375.
    The rapid adoption of digital technologies in healthcare has revolutionized patient care, enabling seamless data sharing, remote consultations, and enhanced medical record management. However, this digital transformation has also introduced significant challenges to network security and data protection. Healthcare institutions face a dual challenge: ensuring uninterrupted connectivity for critical operations and safeguarding sensitive patient information from cyber threats. These challenges are exacerbated by the increased use of interconnected devices, electronic health records (EHRs), and cloud-based solutions, which, while enhancing efficiency, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  26
    Enhancing Network Security in Healthcare Institutions: Addressing Connectivity and Data Protection Challenges.Bellamkonda Srikanth - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):1365-1375.
    The rapid adoption of digital technologies in healthcare has revolutionized patient care, enabling seamless data sharing, remote consultations, and enhanced medical record management. However, this digital transformation has also introduced significant challenges to network security and data protection. Healthcare institutions face a dual challenge: ensuring uninterrupted connectivity for critical operations and safeguarding sensitive patient information from cyber threats. These challenges are exacerbated by the increased use of interconnected devices, electronic health records (EHRs), and cloud-based solutions, which, while enhancing efficiency, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Securing the Internet of Things: A Study on Machine Learning-Based Solutions for IoT Security and Privacy Challenges.Aziz Ullah Karimy & P. Chandrasekhar Reddy - 2023 - Zkg International 8 (2):30-65.
    The Internet of Things (IoT) is a rapidly growing technology that connects and integrates billions of smart devices, generating vast volumes of data and impacting various aspects of daily life and industrial systems. However, the inherent characteristics of IoT devices, including limited battery life, universal connectivity, resource-constrained design, and mobility, make them highly vulnerable to cybersecurity attacks, which are increasing at an alarming rate. As a result, IoT security and privacy have gained significant research attention, with a particular (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Intermediate Role of Operations Standard in the Relationship between the Focus on Benefiting Students and Students Satisfaction in Palestinian Universities.Suliman A. El Talla, Mazen J. Al Shobaki, Samy S. Abu-Naser & Ahmed M. A. FarajAllah - 2019 - International Journal of Academic Multidisciplinary Research (IJAMR) 3 (5):86-100.
    The study aimed to identify the intermediate role of the standard of operations in the relationship between the focus on students and beneficiaries in achieving satisfaction of students in Palestinian universities. The study used the analytical descriptive method. The study was conducted on university leadership in Al-Azhar, Islamic and Al-Aqsa Universities. The study sample consisted of (200) individuals, 182 of whom responded, and the questionnaire was used in collecting the data. The results of the study were as follows: - There (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  15
    Beyond The Cloud: Mastering Security in the Digital Age.Rupali Sharma Omkar C. Patil, Yash D. Patil - 2025 - International Journal of Advanced Research in Education and Technology 12 (1):240-247.
    As digital transformation accelerates, organizations are increasingly reliant on cloud-based services for flexibility, scalability, and cost-efficiency. However, the proliferation of cloud technologies has introduced new, sophisticated cybersecurity challenges. The traditional perimeter-based security model is no longer sufficient in safeguarding critical data and applications. This paper explores the evolving landscape of cybersecurity in the context of cloud computing and presents strategies for mastering security in the digital age. We discuss the importance of securing cloud-native applications, the role of advanced (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Modern information and communication technologies in the digital economy in the system of economic security of the enterprises.Tetiana Shmatkovska, Igor Britchenko, Serhii Voitovych, Peter Lošonczi, Iryna Lorvi, Iuliia Kulyk & Svitlana Begun - 2022 - Ad Alta: Journal of Interdisciplinary Research 12 (01-XXVII):153-156.
    The article considers the features of ensuring the economic security of enterprises in the conditions of intensive introduction of information technologies in their activities in the process of forming the digital economy. It is determined that digitalization creates important advantages for enterprises in terms of implementing a long-term strategy for their development, strengthening economic security, and achieving significant competitive advantages in doing business. It is studied that the system of economic security of the enterprise is an organized (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  73
    Network Segmentation and MicroSegmentation: Reducing Attack Surfaces in Modern Enterprise Security.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (6):2499-2507.
    In the modern enterprise environment, where cybersecurity threats continue to evolve in complexity and sophistication, network segmentation and micro-segmentation have emerged as critical strategies for mitigating risks and reducing attack surfaces. This research paper explores the principles, implementation, and benefits of network segmentation and micro-segmentation as essential components of a comprehensive cybersecurity framework. By dividing networks into smaller, isolated segments, these methodologies aim to limit unauthorized access, minimize lateral movement, and contain potential breaches, ensuring a more secure network infrastructure. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  57
    The Role of Network Engineers in Securing Cloud-based Applications and Data Storage.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (7):2894-2901.
    As organizations increasingly adopt cloud computing to enhance scalability, efficiency, and costeffectiveness, securing cloud-based applications and data storage has become a paramount concern. This shift has redefined the role of network engineers, who are now at the forefront of implementing and managing secure cloud infrastructures. This research paper examines the critical responsibilities of network engineers in safeguarding cloud environments, focusing on the challenges, strategies, and tools they employ to mitigate risks and ensure data integrity. The paper identifies key (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  32
    Network Segmentation and MicroSegmentation: Reducing Attack Surfaces in Modern Enterprise Security.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (6):2499-2507.
    In the modern enterprise environment, where cybersecurity threats continue to evolve in complexity and sophistication, network segmentation and micro-segmentation have emerged as critical strategies for mitigating risks and reducing attack surfaces. This research paper explores the principles, implementation, and benefits of network segmentation and micro-segmentation as essential components of a comprehensive cybersecurity framework. By dividing networks into smaller, isolated segments, these methodologies aim to limit unauthorized access, minimize lateral movement, and contain potential breaches, ensuring a more secure network infrastructure. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  26
    The Role of Network Engineers in Securing Cloud-based Applications and Data Storage.Bellamkonda Srikanth - 2020 - International Journal of Innovative Research in Computerand Communication Engineering 8 (7):2894-2902.
    As organizations increasingly adopt cloud computing to enhance scalability, efficiency, and costeffectiveness, securing cloud-based applications and data storage has become a paramount concern. This shift has redefined the role of network engineers, who are now at the forefront of implementing and managing secure cloud infrastructures. This research paper examines the critical responsibilities of network engineers in safeguarding cloud environments, focusing on the challenges, strategies, and tools they employ to mitigate risks and ensure data integrity. The paper identifies key (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Current issues of security management during martial law.Maksym Bezpartochnyi, Igor Britchenko, Olesia Bezpartochna, Kostyantyn Afanasyev, Mariia Bahorka, Oksana Bezsmertna, Olena Borschevska, Liliana Chyshynska-Hlybovych, Anna Dybała, Darya Gurova, Iryna Hanechko, Petro Havrylko, Olha Hromova, Tetiana Hushtan, Iryna Kadyrus, Yuri Kindzerski, Svіtlana Kirian, Anatoliy Kolodiychuk, Oleksandr Kovalenko, Andrii Krupskyi, Serhii Leontovych, Olena Lytvyn, Denys Mykhailyk, Oleh Nyzhnyk, Hanna Oleksyuk, Nataliia Petryshyn, Olha Podra, Nazariy Popadynets, Halyna Pushak, Yaroslav Pushak, Oksana Radchenko, Olha Ryndzak, Nataliia Semenyshena, Vitalii Sharko, Vladimir Shedyakov, Olena Stanislavyk, Dmytro Strikhovskyi, Oksana Trubei, Nataliia Trushkina, Sergiy Tsviliy, Leonid Tulush, Liudmyla Vahanova, Nataliy Yurchenko, Andrij Zaverbnyj & Svitlana Zhuravlova (eds.) - 2022 - Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the book have come to the conclusion that toensuring the country’s security in the conditions of military aggression, it is necessary to use the mechanisms of protection of territories and population, support of economic entities, international legal levers of influence on the aggressor country. Basic research focuses on assessment the resource potential of enterprises during martial law, the analysis of migration flows in the middle of the country and abroad, the volume of food exports, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  35
    Network Security Challenges in Remote Work Environments: Solutions for Protecting Data and Applications.Bellamkonda Srikanth - 2021 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 10 (10):7330-7337.
    The rise of remote work has redefined the modern workplace, driven by advancements in technology and the global need for flexible work environments. While remote work offers increased productivity and employee satisfaction, it has also introduced a host of network security challenges. Organizations must contend with securing sensitive data and critical applications across distributed networks, many of which extend beyond traditional corporate perimeters. This research paper explores the multifaceted security threats associated with remote work environments, including phishing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Nollywood in Diversity: New Dimensions for Behaviour Change and National Security in Nigeria.Stanislaus Iyorza - 2017 - International Journal of Communication 21.
    This paper sets out to demystify the nature of Nollywood movies existing in diversity and to propose new dimensions for using film to achieve behaviour change and a dependable national security in Nigeria. The paper views national security as the art of ensuring national safety of the government. Nollywood has naturally diversified along ethnic dimensions including the Hausa movies (Kannywood) in the North, the Yoruba movies in the West and the Ibo movies in the Eastern part of the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. Strategies for Healthcare Disaster Management in the Context of Technology Innovation: the Case of Bulgaria.Radostin Vazov, R. Kanazireva, T. Grynko & Oleksandr P. Krupskyi - 2024 - Medicni Perspektivi 29 (2):215-228.
    In Bulgaria, integrating technology and innovation is crucial for advancing sustainable healthcare disaster management, enhancing disaster response and recovery, and minimizing long-term environmental and social impacts. The purpose of the study is to assess the impact of modern technological innovations on the effectiveness of disaster management in health care in Bulgaria with a focus on Health Information Systems (HIS), Telemedicine, Telehealth, e-Health, Electronic Health Records, Artificial Intelligence (AI), Public Communication Platforms, and Data Security and Privacy. These innovations, when integrated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  11
    Enhanced Visual Proof of Identity: Keystroke Tracking-Robust System with Dual-Keypad Security.Prof S. C. Puranik Shradha Pandule, Akshada Ringe, Jaid Sayyed - 2024 - International Journal of Innovative Research in Computer and Communication Engineering 12 (11):12363-12366.
    The project focuses on developing an advanced authentication mechanism to counteract the growing threat of keylogging attacks. Keylogging, a type of cyber-attack that captures keystrokes to steal sensitive information, poses a significant risk to traditional authentication methods that rely on keyboard input. This project introduces a novel security approach combining two key innovations: a dual-keypad input system and a visual authentication protocol. The dual-keypad system consists of two separate input keypad (Normal Keypad and Virtual Keypad), each responsible for a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  28
    Smart Home Security System Using Arduino.Jay Dudhatra Karan Gori - 2020 - International Journal of Innovative Research in Computer and Communication Engineering 8 (10):4139-4144.
    Internet of Things (IoT) conceptualizes the idea of remotely connecting and monitoring real world objects (things) through the Internet [1]. When it comes to our house, this concept can be aptly incorporated to make it smarter, safer and automated. This IoT project focuses on building a smart wireless home security system which sends alerts to the owner by using Internet in case of any trespass and raises an alarm optionally. Besides, the same can also be utilized for home automation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Formation of global regulatory system for human resources development.S. Sardak - 2016 - In International Scientific Practical Conference «Modern Transformation of Economics and Management in the Era of Globalization». pp. 21-22.
    Focused on evolutionary and continuous human development the global, the regulatory system should be formed in the conceptual (the constant research for the detection, identification and evaluation of global imperatives) and application (development and implementation of activities and coordination tools of influence to ensure the existence of human civilization in a secure politically, economically, socially and environmentally balanced world) planes. On the author's calculations of its formation in functionally complete, holistic view is expected by 2030 due to historically conditioned (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  30
    The Sustainable Economic Model Based on the Universal Law of Balance.Angelito Malicse - manuscript
    The Sustainable Economic Model Based on the Universal Law of Balance -/- By Angelito Malicse -/- This model builds on the Universal Law of Balance, integrating sustainable population management, economic stability, technological progress, and environmental harmony. It presents a framework for a balanced civilization, where society no longer depends on endless population growth to sustain economic systems. Instead, human progress is guided by equilibrium between resources, technology, and well-being. -/- I. THE UNIVERSAL LAW OF BALANCE AS A FOUNDATION -/- The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Enhancing Research on Academicians in Cambodian Higher Education: A Policy Perspective.Rany Sam, Morin Tieng, Hak Yoeng, Sarith Chiv, Mardy Serey & Sopheak Sam - manuscript
    Cambodia's higher education institutions (HEIs) face a number of challenges. Academics require increased access to resources and funding, as well as restrictions on academic freedom and significant language and cultural barriers. The purpose of this chapter is to identify and analyze the individual factors influencing academicians' research productivity in Cambodian higher education institutions, to examine and evaluate the impact of institutional factors on research productivity, to investigate and assess the external factors affecting research productivity, and to develop (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. A Focus on the Contextualized Learning Activity Sheets.Dennis F. Gerodias - 2023 - International Journal of Multidisciplinary Educational Research and Innovation 1 (1):1-13.
    This study aims to determine the factors that may affect in constructing the contextualized learning activity sheets based on the learners’ results and the teachers’ self-assessment using a descriptive correlation research design. The findings of the study revealed that the teachers have varied levels of competence in terms of cultural knowledge and on average, they were at the Proficient level of competency. In addition, teachers’ self-assessments indicated that they strongly practiced the criteria in constructing contextualized IPED LAS. However, still (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  24.  45
    Global Readers’ Evaluation of Wild Wise Weird: The Kingfisher Story Collection.openAI Deep Research & La Viet Phuong - 2025 - Evaluation of Wild Wise Weird.
    This study examines how global readers evaluate Wild Wise Weird: The Kingfisher Story Collection and focuses on the book’s impact on readers’ learning and thinking. Wild Wise Weird is a collection of short fables centered on a character called the Kingfisher, originally written in Vietnamese and later made available to international audiences (Wild Wise Weird | Goodreads). The book’s author explicitly aimed to introduce readers around the world to snippets of Vietnamese culture through humorous storytelling, while also providing “food (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. An Analytical Study of the Reality of Electronic Documents and Electronic Archiving in the Management of Electronic Documents in the Palestinian Pension Agency (PPA).Mohammed Khair I. Kassab, Samy S. Abu Naser & Mazen J. Al Shobaki - 2017 - European Academic Research 4 (12):10052-10102.
    The study aims to identify the reality of management of electronic documents and electronic archiving retirement in the Palestinian Pension Agency -analytical study, as well as to recognize the reality of the current document management system in the Palestinian Pension Agency. The study found the following results: that the reality of the current system for the management of documents in the agency is weak and suffers from many jams. Employee in the agency understand the importance and benefits of the management (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  26. Leveraging Disaster: Securitization in the Shadow of an Environmental Catastrophe: The Case of the Safer Floating Oil Tanker.Pezzano Riccardo - 2024 - Dissertation, Leiden University
    Recent scholarship on climate and conflict has increasingly examined the dynamic relationship between environmental scarcities and geopolitical tensions. Overall, climate-related shocks often lead to escalated disputes over natural resources, thus positioning climate hazards not only as an environmental issue but also as a catalyst that intensifies existing geopolitical and social frictions. The discourse on climate and conflict has mostly centred on its direct effects on natural resources and environmental conditions. However, its role in precipitating conflicts underscores the critical need to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  25
    Cloud Computing for Space Exploration: Enabling Data-Intensive Research and Remote Operations Beyond Earth.Hirulkar Sakshi R. - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology (Ijmrset) 8 (1):371-376.
    As space exploration advances, the need for innovative technologies to handle the ever-growing data and facilitate remote operations beyond Earth becomes critical. Cloud computing is emerging as a transformative force in space missions, enabling data-intensive research, remote collaboration, and the management of large datasets from space missions. This paper explores the role of cloud computing in space exploration, focusing on its potential to support the growing complexity of space missions, improve data storage and processing, and enable real-time remote (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  68
    Assessment of Web Services based on SOAP and REST Principles using Different Metrics for Mobile Environment and Multimedia Conference.Sharma Sakshi - 2023 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 12 (8):1701-1709.
    This article presents a comprehensive assessment of web services based on SOAP (Simple Object Access Protocol) and REST (Representational State Transfer) principles, focusing on their application in mobile environments and multimedia conference scenarios. As web services enable seamless communication and data exchange across diverse systems, understanding their performance characteristics in different contexts is crucial. SOAP, with its protocol-driven approach and emphasis on security and reliability, and REST, known for its simplicity, scalability, and efficiency, are evaluated using key performance (...)
    Download  
     
    Export citation  
     
    Bookmark   69 citations  
  29. Comparative views on research productivity differences between major social science fields in Vietnam: Structured data and Bayesian analysis, 2008-2018.Quan-Hoang Vuong, La Viet Phuong, Vuong Thu Trang, Ho Manh Tung, Nguyen Minh Hoang & Manh-Toan Ho - manuscript
    Since Circular 34 from the Ministry of Science and Technology of Vietnam required the head of the national project to have project results published in ISI/Scopus journals in 2014, the field of economics has been dominating the number of nationally-funded projects in social sciences and humanities. However, there has been no scientometric study that focuses on the difference in productivity among fields in Vietnam. Thus, harnessing the power of the SSHPA database, a comprehensive dataset of 1,564 Vietnamese authors (854 males, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Is Terrorism a Serious Threat to International and National Security? NO: The Myth of Terrorism as an Existential Threat.Jessica Wolfendale - 2012 - In Richard Jackson & Samuel Justin Sinclair, Contemporary Debates on Terrorism. Routledge. pp. 80-87.
    In contemporary academic, political, and media discourse, terrorism is typically portrayed as an existential threat to lives and states, a threat driven by religious extremists who seek the destruction of Western civilization and who are immune to reason and negotiation. In many countries, including the US, the UK, and Australia, this existential threat narrative of terrorism has been used to justify sweeping counterterrorism legislation, as well as military operations and even the use of tactics such as torture and indefinite detention. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  64
    Promoting Healthy Lifestyle Strategies among Couples for Sustainable Family Survival in Oyo State, Nigeria.Taiwo Adekemi Akinyemi, Olajide Olatunde Adeola & Halimot Omobola Toriola - 2024 - International Journal of Home Economics, Hospitality and Allied Research 3 (2):93-103.
    The study examines healthy lifestyle strategies among 1,086,543 couples in Oyo State, Nigeria, focusing on feeding, physical well-being, and mental health. Data from 817 married respondents revealed that 73.6% prefer self-prepared meals, while 9.5% prefer fast food or processed food. Consumption of vegetables and fruits varied, with 55.4% following a balanced diet. The study reveals that people living in clean environments are generally satisfied with their living conditions, with a high percentage of those living in spacious, secure homes. Couples (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. The Management and Challenges of Criminology Deans in the New Normal.Donald T. Sumad-on, Teody T. Basilio & Alban Fanao - 2022 - International Journal of Innovative Science and Research Technology 7 (8):1530-1536.
    Management in the new normal is an inventiveness to adopt new drift in the education system. Thus, this research study purposely to examine the Management and Challenges of Criminology Deans in this progression of new normal living condition. A qualitative research approach particularly a Case Study design was utilized. The population of this study were focused on the Seven (7) Deans of Criminal Justice Education of various Universities and Colleges and a Semi Structured Interview employing the open ended (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Research Competence of Out-of-Field Teachers in Teaching Practical Research: Input to Capability Building Series.Orville J. Evardo Jr & Ivy Lyt Abina - 2023 - International Journal for Multidisciplinary Research 6 (5).
    Research is a high-level course for the 21st century learners thus requiring highly qualified teachers that are proficient both in research and teaching. This study utilizes convergent parallel design, a mixed method approach to describe the research competence and to design a Capability Building Series Program. The respondents of this study are the out-of-field research teachers from selected private Senior High Schools. There are 40 respondents for the quantitative phase while 14 participants in the qualitative phase. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Capitalmud, or Akyn's Song about the Nibelungs, paradigms and simulacra.Valentin Grinko - manuscript
    ...If, in some places, backward science determines the remaining period by the lack of optimism only by the number 123456789, then our progressive science expands it to 987654321, which is eight times more advanced than theirs. However, due to the inherent caution of scientists, both sides do not specify the measuring unit of reference — year, day, hour or minute are meant. Leonid Leonov. Collected Op. in ten volumes. Volume ten. M.: IHL, 1984, p.583. -/- The modern men being as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Advancements in AI-Driven Communication Systems: Enhancing Efficiency and Security in Next-Generation Networks (13th edition).Palakurti Naga Ramesh - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (1):28-36.
    The increasing complexity and demands of next-generation networks necessitate the integration of Artificial Intelligence (AI) to enhance their efficiency and security. This article explores advancements in AI-driven communication systems, focusing on optimizing network performance, ensuring robust security measures, and addressing the challenges of scalability and real-time adaptability. By analyzing case studies, emerging technologies, and recent research, this study highlights AI's transformative potential in redefining communication systems for future applications.
    Download  
     
    Export citation  
     
    Bookmark  
  36.  33
    A Framework for Global Education and Leadership Implementation.Angelito Malicse - manuscript
    -/- A Framework for Global Education and Leadership Implementation -/- By Angelito Malicse -/- This model expands on the Universal Law of Balance by integrating it into a global education system and leadership strategy that ensures its practical application. The goal is to eliminate dependence on overpopulation for economic growth, shift toward a knowledge-based and technology-driven economy, and establish a sustainable, balanced civilization. -/- I. THE UNIVERSAL LAW OF BALANCE AS A GOVERNING PRINCIPLE -/- 1. Balance as the Foundation of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Study | Measuring Intra-Party Democracy in Political Parties in Albania.Anjeza Xhaferaj - 2022 - Tirana, Albania: Institute for Democracy and Mediation.
    SUMMARY The research focuses on the three main political parties in Albania, namely Socialist Party, Democratic Party and Socialist Movement for Integration. Its objectives are to measure the Intra-Party Democracy(IPD) in the Albanian political parties and to explore the meaning that party members attach to it. The IPD is understood and broken down into categories and sub-categories so that parties in particular and all interested actors in the field of political parties and democracy could understand, which component of IPD (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  38. A Study of Awareness About Cyber Laws for Indian Youth.Jigar Shah - 2016 - International Journal of Trend in Scientific Research and Development 1 (1):10-16.
    In india each and every minute one person become internet users. its convergence with digitally supported platforms and gadgets, safeguarding the parents as well as students from the cybercrimes is becoming a challenging task. In addition to, the pinching reality is that the internet users are not getting updated on the vulnerable cyber threats and security issues, at the pace they are getting updated with the usage of internet enabled tools and apps. Thus the current research paper focuses (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry.Federico Del Giorgio Solfa - 2022 - International Journal of Technology Innovation and Management (Ijtim) 2 (2):18-32.
    Purpose: The research explored empirical evidence to assess the impact of cyber security and supply chain risk on digital operations in the UAE pharmaceutical industry. Methodology/Design/Approach: Based on responses from 243 personnel working at 14 pharmaceutical manufacturing companies in Dubai, data were examined for normality, instrument validity and regression analysis. Cyber security and SC risk on digital operations were explored by applying convenient sampling and descriptive and analytical research design. Findings: The findings validated the significant positive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. On Classifying Material Entities in Basic Formal Ontology.Barry Smith - 2010 - In Barry Smith, Riichiro Mizoguchi & Sumio Nakagawa, Interdisciplinary Ontology, Vol. 3: Proceedings of the Third Interdisciplinary Ontology Meeting. Tokyo: Keio University Press. pp. 1-13.
    Basic Formal Ontology was created in 2002 as an upper-level ontology to support the creation of consistent lower-level ontologies, initially in the subdomains of biomedical research, now also in other areas, including defense and security. BFO is currently undergoing revisions in preparation for the release of BFO version 2.0. We summarize some of the proposed revisions in what follows, focusing on BFO’s treatment of material entities, and specifically of the category object.
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  41. International Journal of Current Research in the Humanities.Chinyere Okam - 2019 - International Journal of Current Research in the Humanities 23.
    The depiction of events in the society and storing the knowledge of such is an important forte of the dramaturge. Drama has been a very pertinent cultural form (whether textual or performative) through which writers create memory and knowledge of varying issues, especially issues of women and the girl child rights. Methodologically using content analysis of Tess Onwueme's The Reign of Wazobia and The Broken Calabash, the article explores the language of revolution against the domination of women and the girl (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Balancing Food Security & Ecological Resilience in the Age of the Anthropocene.Samantha Noll - 2018 - In Erinn C. Gilson & Sarah Kenehan, Food, Environment, and Climate Change: Justice at the Intersections. Rowman & Littlefield International.
    Climate change increasingly impacts the resilience of ecosystems and agricultural production. On the one hand, changing weather patterns negatively affect crop yields and thus global food security. Indeed, we live in an age where more than one billion people are going hungry, and this number is expected to rise as climate-induced change continues to displace communities and thus separate them from their means of food production (Internal Displacement Monitoring Centre 2015). In this context, if one accepts a humancentric ethic, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43.  37
    The Future of Serverless Computing: Pushing the Boundaries of Cost Efficiency and Scalability in the Cloud.Satish Patkar Shraddha Sayali - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management 12 (1):359-363.
    Serverless computing has become a pivotal model in cloud computing, offering the promise of reducing operational overhead, improving cost efficiency, and enabling scalable solutions without the need to manage infrastructure. This paradigm allows developers to focus purely on application logic while abstracting away the complexities of server management. As serverless computing evolves, it is pushing the boundaries of cloud architectures by enabling dynamic scaling and cost-effective resource utilization. This paper explores the future trajectory of serverless computing, focusing on its (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  32
    Secure Sharing of Personal Health Record in Cloud Environment.V. Tamilarasi E. Saranya - 2019 - International Journal of Innovative Research in Computer and Communication Engineering 7 (2):532-536.
    In cloud secure personal data sharing is the important issues because it creates several securities and data confidentiality problem while accessing the cloud services. Many challenges present in personal data sharing such as data privacy protection, flexible data sharing, efficient authority delegation, computation efficiency optimization, are remaining toward achieving practical fine-grained access control in the Personal Health Information Sharing system. Personal health records must be encrypted to protect privacy before outsourcing to the cloud. Aiming at solving the above challenges, here (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. The Effects of Fake News on Consumers’ Brand Trust: An Exploratory Study in the Food Security Context.Farte Gheorghe-Ilie & Obadă Rareș - 2021 - Romanian Journal of Communication and Public Relations 23 (3):47-61.
    The aim of this study is to explore the effects of fake news on consumers’ brand trust in the food security context. The starting point of our research is the finding that issues related to food security cannot be addressed without the contribution of multinational food corporations. The efficiency of their intervention depends on their capacity to build and preserve their brand trust despite the multifarious fake news stories that contaminate the information flow. Is brand trust sensitive (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Paul Ricoeur: il linguaggio metaforico come espressione di libertà creativa, in «FormaMente. International Research Journal on Digital Future», Issue 2, 2019, Supplement, pp. 319-339 [Print: ISSN 1970-7118, Gangemi Editore di Roma; On line: ISSN 2284-4600].Tommaso Valentini - 2019 - FormaMente. International Research Journal on Digital Future 2 (2019 - special issue -):319-339.
    This paper focuses on the rule of metaphor in Paul Ricoeur's philosophy of language. In his MultiDisciplinary Studies in the Creation of Meaning in Language (1975), the French philosopher shows the fundamental power of human language in constructing the world we perceive. He reveals the processes by which linguistic imagination creates and recreates meaning through metaphor. He develops a "linguistic philosophy of freedom," and a hermeneutics of the subject based on human capabilities. According to Ricoeur, to exist is to act: (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Pragmatism in International Relations Theory and Research.Shane J. Ralston - 2011 - Eidos: Revista de Filosofía de la Universidad Del Norte 14:72-105.
    The goal of this paper is examine the recent literature on the intersection between philosophical pragmatism and International Relations (IR), including IR theory and IR research methodology. One of the obstacles to motivating pragmatist IR theories and research methodologies, I contend, is the difficulty of defining pragmatism, particularly whether there is a need for a more generic definition of pragmatism or one narrowly tailored to the goals of IR theorists and researchers.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  48. AI and Ethics in Surveillance: Balancing Security and Privacy in a Digital World.Msbah J. Mosa, Alaa M. Barhoom, Mohammed I. Alhabbash, Fadi E. S. Harara, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research (IJAER) 8 (10):8-15.
    Abstract: In an era of rapid technological advancements, artificial intelligence (AI) has transformed surveillance systems, enhancing security capabilities across the globe. However, the deployment of AI-driven surveillance raises significant ethical concerns, particularly in balancing the need for security with the protection of individual privacy. This paper explores the ethical challenges posed by AI surveillance, focusing on issues such as data privacy, consent, algorithmic bias, and the potential for mass surveillance. Through a critical analysis of the tension between (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  49. Food security: modern challenges and mechanisms to ensure.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Košice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the scientific monograph have come to the conclusion that ensuring food security during martial law requires the use of mechanisms to support agricultural exports, diversify logistics routes, ensure environmental safety, provide financial and marketing support. Basic research focuses on assessment the state of agricultural producers, analysing the financial and accounting system, logistics activities, ensuring competitiveness, and environmental pollution. The research results have been implemented in the different decision-making models during martial law, international logistics (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Implementation of Data Mining on a Secure Cloud Computing over a Web API using Supervised Machine Learning Algorithm.Tosin Ige - 2022 - International Journal of Advanced Computer Science and Applications 13 (5):1 - 4.
    Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorithm and Random Forest over (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 986