Results 21 to 30 of about 1,971,716 (147)

FSM-F: finite state machine based framework for denial of service and intrusion detection in manet [PDF]

open access: yes, 2016
Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster ...
Abdullah, A. H.   +2 more
core   +3 more sources

FOREIGN EXPERIENCE OF BORDER POLICE SPECIALISTS’ PROFESSIONAL TRAINING AT EDUCATIONAL INSTITUTIONS OF HUNGARY AND SLOVAKIA

open access: yesЗбірник наукових праць Національної академії Державної прикордонної служби України. Серія: педагогічні науки, 2023
The article presents the foreign experience of border guards’ professional training of the Hungarian and Slovak Republics. It is determined that the professional training of border guard specialists in these countries has a number of common and ...
Heorhii ARTIUSHYN   +2 more
doaj   +1 more source

Renal PEComa in a young male: A case report and insights from the literature

open access: yesUrology Case Reports
Perivascular epithelioid cell tumors (PEComas) are rare mesenchymal neoplasms, commonly found in the uterus and retroperitoneum. Renal PEComas are exceedingly rare, often posing diagnostic challenges due to their resemblance to renal cell carcinoma (RCC)
Rashad Sholan   +5 more
doaj   +1 more source

Preparation of changes to the law of Ukraine „On security service of Ukraine” with the consideration of foreign experience of legal regulation of the activities of internal security services

open access: yesПроблеми Законності, 2018
The authors examine the peculiarities of the legal regulation of the tasks of the Internal Security Agency of the Republic of Poland. A comparative analysis was conducted with domestic legislation, which defines the tasks of the Security Service of ...
Іван Іванович Мусієнко   +1 more
doaj   +1 more source

The Phenomenon of «Civilian Hostage» in the Deportation Practices of Soviet Special Services in Western Ukraine in 1944-1952

open access: yesVìsnik - Kiïvsʹkij nacìonalʹnij unìversitet ìmenì Tarasa Ševčenka: Ìstorìâ, 2020
In 1944, with the beginning of the re-occupation of Western Ukraine by the Soviet Union, the practice of using forced evictions of local civilians as a method of repression and combating against anti-Soviet organizations and movements was restored.
A. Kohut
doaj   +1 more source

SAMI: Service-Based Arbitrated Multi-Tier Infrastructure for Mobile Cloud Computing [PDF]

open access: yes, 2012
Mobile Cloud Computing (MCC) is the state-ofthe- art mobile computing technology aims to alleviate resource poverty of mobile devices. Recently, several approaches and techniques have been proposed to augment mobile devices by leveraging cloud computing.
Abolfazli, Saeid   +3 more
core   +2 more sources

Single-surgeon outcomes of open radical cystectomy for muscle-invasive bladder cancer: Experience from a tertiary center in Azerbaijan

open access: yesSurgery in Practice and Science
Summary: Objective: Radical cystectomy is the standard treatment for muscle-invasive bladder cancer (MIBC). This study presents the first analysis of open radical cystectomy (ORC) outcomes in Azerbaijan, where robotic surgery is unavailable. Methods: We
Rashad Sholan   +5 more
doaj   +1 more source

The Efficiency of the Use of Private Military Security Companies (Pmsc) by the United States in Iraq [PDF]

open access: yes, 2018
The shift of security paradigm post-cold war era has made the concept of security more complex, regarding the actor and its scope. The security dynamic trigger the emergence of new non-state actors in the security field.
Ayusi, R. (Raviq)
core   +1 more source

Physical Layer Service Integration in 5G: Potentials and Challenges

open access: yes, 2018
High transmission rate and secure communication have been identified as the key targets that need to be effectively addressed by fifth generation (5G) wireless systems. In this context, the concept of physical-layer security becomes attractive, as it can
Chen, Zhi   +3 more
core   +1 more source

SALR: Secure adaptive load-balancing routing in service oriented wireless sensor networks [PDF]

open access: yes, 2015
Congestion control and secure data transfer are the major factors that enhance the efficiency of Service Oriented Wireless Sensor Networks. It is desirable to modify the routing and security schemes adaptively in order to respond effectively to the ...
Dinesh Anvekar, .   +7 more
core   +1 more source

Home - About - Disclaimer - Privacy