Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4141
-
4142
Measurement of Gallbladder Volume with Ultrasonography in Pregnant Women
Published 2000-01-01Get full text
Article -
4143
SUSTAINABLE GROUNDWATER MANAGEMENT THROUGH GROUNDWATER IRRIGATION ADVISORY APPLICATION (GIAA)
Published 2024-06-01“…Despite these challenges, groundwater remains indispensable for global food security, supporting approximately 60% of irrigated agriculture worldwide. …”
Get full text
Article -
4144
Research on new energy power plant network traffic anomaly detection method based on EMD
Published 2025-01-01“…Abstract Overview As Photovoltaic (PV) systems connect into the grid and depend on digital technology, risks develop from obsolete components, insufficient security measures, and insecure access points. Objectives Improve the safety and dependability of the main data communication network by conducting research on Proactive Coordinated Fault-Tolerant Federation (PCFT) security structure, building an early warning simulation to handle power data interactions network abnormalities, studying algorithms and technologies for abnormal traffic control, and effectively managing abnormal network traffic like DDoS, network scanning, along with surge traffic; Improve the capability of the SLA hierarchical service, enhance the service quality of the core services executed through the backbone network, as well as strengthen the security capability of the access system for the new energy power plant’s communication network by combing and analyzing the traffic of the main network of the current information communication network. …”
Get full text
Article -
4145
Are free school meals failing families? Exploring the relationship between child food insecurity, child mental health and free school meal status during COVID-19: national cross-se...
Published 2022-06-01“…This study examined levels of food security and FSM status to support decision-making regarding increasing the current eligibility criteria.Design Two cross-sectional national surveys administered in August–September 2020 and January–February 2021 were used to examine the impact of COVID-19 on the food experiences of children and young people.Setting UK.Participants 2166 children (aged 7–17 years) and parents/guardians.Main outcome measures Participant characteristics were described by food security and FSM status; estimated marginal means were calculated to obtain the probability of poor mental health, expressed as children reporting feeling stressed or worried in the past month, by food security status and FSM status.Results We observed food insecurity among both children who did and did not receive of FSM: 23% of children not receiving FSM were food insecure. …”
Get full text
Article -
4146
Pediatric Emergency Department-based Food Insecurity Screening During the COVID-19 Pandemic
Published 2024-11-01“…Six validated US Department of Agriculture household food security questions and sociodemographic questions were included. …”
Get full text
Article -
4147
Temperature seasonality regulates organic carbon burial in lake
Published 2025-01-01Get full text
Article -
4148
Implementasi Algoritme Spongent sebagai Algoritme Hashing untuk Integritas pada Modul Komunikasi Lora
Published 2023-12-01“…Data security can be done with hashing algorithms such as SPONGENT algorithm. …”
Get full text
Article -
4149
-
4150
Food insecurity and ultra-processed food consumption in the Health and Retirement Study: Cross-sectional analysis
Published 2025-02-01“…Mean UPFs% (95% confidence intervals) were 49.1 (47.8, 50.3), 48.5 (46.6, 50.4), and 52.3 (50.4, 54.3) among adults with food security, low food security, and very low food security, respectively (P-trend = 0.0156). …”
Get full text
Article -
4151
Deep learning-based encryption scheme for medical images using DCGAN and virtual planet domain
Published 2025-01-01“…Abstract The motivation for this article stems from the fact that medical image security is crucial for maintaining patient confidentiality and protecting against unauthorized access or manipulation. …”
Get full text
Article -
4152
Strategic Planning of Public Spaces in Order to Promote and Benefit from Social Interactions, Case Study: District 10 of Tehran Municipality
Published 2025-03-01“…Furthermore, issues such as physical deterioration, disrupted urban landscapes, a high tenant rate, low social security, and a transient population have further diminished the quality of existing public spaces and the level of social interaction in this particular district. …”
Get full text
Article -
4153
LEA Gene Expression Assessment in Advanced Mutant Rice Genotypes under Drought Stress
Published 2019-01-01Get full text
Article -
4154
Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling
Published 2025-01-01“…With the increasing importance of securing images during network transmission, this paper introduces a novel image encryption algorithm that integrates a 3D chaotic system with V-shaped scrambling techniques. …”
Get full text
Article -
4155
Cybersecurity in microgrids: A review on advanced techniques and practical implementation of resilient energy systems
Published 2025-03-01“…This study offers an in-depth examination of cyber security within the energy sector, exploring the historical backdrop of cyber-attacks and classifying different forms of MG breaches, encompassing both cyber and physical security strategies. …”
Get full text
Article -
4156
Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics
Published 2023-03-01“…The paper covers the contending needs for security, open borders and fundamental rights as well as legal constraints that any technological solution must consider. …”
Get full text
Article -
4157
A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things
Published 2019-12-01“…With the development of the Internet of Things, smart devices are widely used. Hardware security is one key issue in the security of the Internet of Things. …”
Get full text
Article -
4158
Chaotic sequence based polar code encrypted scheme in negative secrecy capacity case
Published 2020-10-01“…A chaos based encrypted polar coding scheme,which could be applied to the negative secrecy capacity case,was proposed.Chaotic sequences were employed to encrypt the information bits and fill the frozen bits.And multi-block polar coding structure was also employed in the proposed scheme.The proposed scheme was featured as lower complexity and higher secrecy transmission rate.Corresponding mathematical analysis had been performed in terms of the error probability,security and transmission rate.The result reveals that the proposed scheme can achieve reliability,security in negative secrecy capacity case.What’s more,it has relatively low complexity and high secrecy transmission rate compared with the existing schemes.…”
Get full text
Article -
4159
The New Trend in the EU’s Migration Policy: Is Externalization Any Better?
Published 2024-12-01“… The highly dynamic security environment, characterized by numerous disturbances such as armed conflicts, civil wars, and political and social instability in various parts of the world, has led millions of people to flee their countries of origin – as of 2023, this number is 117,3 million. …”
Get full text
Article -
4160
Improved identity based multi-receiver anonymous signcryption scheme
Published 2015-09-01“…Recently,Pang,et al proposed a novel identity based multi-receiver anonymous signcryption scheme (IBMRASC),which put into consideration both the sender's anonymity and the receiver's anonymity simultaneously.However,the analysis with respect to this scheme indicated that,under existing security models the adversary can distin-guish the ciphertexts associated with different plaintexts.Therefore,Pang's approach did not satisfy the requirement of indistinguishability against chosen ciphertext attacks (CCA).An improved scheme which is selective identity secure in the random oracle model was proposed.Under the CDH and Gap-BDH hard problem assumption,the improved scheme is both existentially unforgetable against chosen message attack and indistinguishable against adaptive CCA.…”
Get full text
Article