Articles with "security level" as a keyword



Photo from wikipedia

Prediction of water security level for achieving sustainable development objectives in Saskatchewan, Canada: Implications for resource conservation in developed economies

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of Cleaner Production"

DOI: 10.1016/j.jclepro.2021.127521

Abstract: Abstract Recently, water has become a valued resource amongst human beings due to the increasing demand for water supply on the one hand and the decreasing level of water resources on the other. As an… read more here.

Keywords: water security; security level; saskatchewan canada; water ... See more keywords
Photo from wikipedia

Data storage and encryption with a high security level based on molecular configurational isomers.

Sign Up to like & get
recommendations!
Published in 2022 at "Soft matter"

DOI: 10.1039/d2sm00890d

Abstract: Developing advanced materials for highly secure data-encryption is crucial but very challenging, as most data-encryption materials (the message area) are chemically different from the substrates (the background) on which they are being written, leading to… read more here.

Keywords: data security; data encryption; encryption; level ... See more keywords
Photo by juanantia from unsplash

Assessment of Weight Status, Food Security Level, and Fiber Intake Among Hispanic/Latino Adults Residing in New Hampshire

Sign Up to like & get
recommendations!
Published in 2022 at "Current Developments in Nutrition"

DOI: 10.1093/cdn/nzac051.061

Abstract: Abstract Objectives To assess weight status, food security level, and dietary intake, emphasizing consumption of fiber-rich foods, among adults of Hispanic/Latino background. Methods This cross-sectional phone-based survey was administered in English or Spanish, and included… read more here.

Keywords: food; food security; security level; security ... See more keywords
Photo by markusspiske from unsplash

Maximizing the Security Level of Real-Time Software While Preserving Temporal Constraints

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3264671

Abstract: Embedded computing systems are becoming increasingly relevant in the Internet of Things (IoT) and edge computing domains, where they are often employed as the control entity of a cyber-physical system. When operating in such interconnected… read more here.

Keywords: software; system; time; security level ... See more keywords
Photo from wikipedia

Multi-security-level cloud storage system based on improved proxy re-encryption

Sign Up to like & get
recommendations!
Published in 2019 at "EURASIP Journal on Wireless Communications and Networking"

DOI: 10.1186/s13638-019-1614-y

Abstract: Based on the characteristics and data security requirements of the cloud environment, we present a scheme for a multi-security-level cloud storage system that is combined with AES symmetric encryption and an improved identity-based proxy re-encryption… read more here.

Keywords: storage; multi security; security level; security ... See more keywords
Photo from wikipedia

Decision Making of the Ensuring Public Security at the Level of the State Territorial Borders

Sign Up to like & get
recommendations!
Published in 2017 at "Journal of Security and Sustainability Issues"

DOI: 10.9770/jssi.2017.7.1(3)

Abstract: The article presents the current issues and latest trends of the legal and administrative aspects of ensuring public security in the field of state border protection. Firstly, the research reveals aspects of the public security… read more here.

Keywords: state; ensuring public; security level; security ... See more keywords