Search Results - (severity OR security)

  1. Re-imaging Nigeria value of safety through the discourse of security situations among community leaders in Akinyele Local Government Area of Oyo State

    Published 2022-05
    Full Text Available
    Access Repository
    Article
  2. Exploring a language-based solution to the problem of insecurity in Boko Haram dominated North Eastern Nigeria

    Published 2017
    Subjects: “…Peace and Security…”
    Full Text Available
    Access Repository
    Article
  3. Vehicle to Everything (V2X) and Edge Computing: A Secure Federated learning-based Lifecycle for UAV-Assisted Vehicle Network: A Survey

    Get full text
    Online Article RSS Article
  4. Allan, Tony. Handbook of Land and Water Grabs in Africa: Foreign Direct Investment and Food and Water Security. New York: Routledge, 2013, 488 pp.

    Published in Journal of Retracing Africa (2016)
    Get full text
    Online Article RSS Article
  5. GuardSec: A Multi-Modal Web Platform for Real-Time Digital Fraud Detection, Entity Verification, and Connection Security Analysis in the African Context

    Published in ArXiv cs.CR Recent Papers (2026)
    Get full text
    Online Article RSS Article
  6. Clinical Remission in Severe T2‐High Asthma in Real Life After Anti‐IgE, Anti‐IL‐5 and Anti‐IL5R: A Potential Role for CRP as a Biomarker

    Get full text
    Online Article RSS Article
  7. Evaluation of social protection adaptive capacity friendliness for sustainable human security among teen youths in a peri urban area of Akwa Ibom State, Nigeria

    Published 2023-12
    Full Text Available
    Access Repository
    Article
  8. Improved privacy Protection model for prevention of data over-collection in smart devices

    Published 2022-12
    Subjects: “…Security risk…”
    Full Text Available
    Access Repository
    Conference Proceeding
  9. The true sale doctrine in asset securitisation: the Nigerian perspective

    Published 2019
    Subjects: “…Assets backed securities…”
    Full Text Available
    Access Repository
    Article
  10. A Hybrid Quantum-Meta Reinforcement Learning and Graph Attention Transformer Approach for Low-Latency and a Secure D2D Routing in 6G Cellular Networks

    Published in IEEE Access (2026)
    Get full text
    Online Article RSS Article
  11. Assessment of crop storage structures in Swaziland

    Published 2006-10
    Subjects: “…food security,…”
    Full Text Available
    Access Repository
    Article
  12. DEVELOPMENT OF AN ARTIFICIAL INTELLIGENCE BASED SYSTEM FOR NUTRIENT DELIVERY TO GREENHOUSE GROWN CROPS

    Published 2023
    Subjects: “…Secure digital module…”
    Full Text Available
    Access Repository
    Article