Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4521
African Orphan Crops under Abiotic Stresses: Challenges and Opportunities
Published 2018-01-01“…A changing climate, a growing world population, and a reduction in arable land devoted to food production are all problems facing the world food security. The development of crops that can yield under uncertain and extreme climatic and soil growing conditions can play a key role in mitigating these problems. …”
Get full text
Article -
4522
Aid Effectiveness: From Project Appraisal to Strategic Impact Evaluation
Published 2020-11-01“…The US case shows key principles of ensuring policy coherence at different levels of goal-setting — from the National Security Strategy to planning individual projects and programs. …”
Get full text
Article -
4523
Multi-sensor image fusion based on contrast and directional features optimization
Published 2018-12-01“…Multi-sensor image fusion is always an important and opening problem, which can enhance visual quality and benefit some social security applications. In this article, we use contrast pyramid to decompose visible and infrared images, respectively, and the directional filter banks are applied to obtain multiple directional sub-band image features. …”
Get full text
Article -
4524
Automatic classification of mobile apps to ensure safe usage for adolescents.
Published 2025-01-01“…The integration of mobile devices into adolescents' daily lives is significant, making it imperative to prioritize their safety and security. With the imminent arrival of fast internet (6G), offering increased bandwidth and reduced latency compared to its predecessor (5G), real-time streaming of high-quality video and audio to mobile devices will become feasible. …”
Get full text
Article -
4525
Design and Construction of a Fingerprint Based Students’ Attendance and Monitoring System.
Published 2023“…There is a need to replace these traditional methods of attendance recording with a more secure, cheap and robust system. Fingerprint based automated identification system based are gaining popularity due to their unique nature. …”
Get full text
Thesis -
4526
Patients’ Health Records Management in Ugandan Hospitals: A Case of Kabale Regional Referral Hospital
Published 2021“…The study concluded that privacy of patients’ records was vital to the patients and recommended that security measures be implemented.…”
Get full text
Article -
4527
Automated stringed robotechnical complex as a prospective method for monitoring of objects’safety and state border areas
Published 2021-04-01“…A distinctive feature of the project is the mobility in relocation and the maximum use of artificial intelligence to solve problems of ensuring the security of a protected object or territory.…”
Get full text
Article -
4528
The performance analysis of SEMA system
Published 2003-01-01“…The enhanced transmission security arises from the special spectrum spreading and de-spreading processes. …”
Get full text
Article -
4529
Evaluating the use of blockchain technology and identifying critical success factors for the successful implementation of renewable energy projects in sub-Saharan Africa
Published 2025-12-01“…This study advances the application of blockchain technology within renewable energy systems (RES) Projects for energy security. Employing a mixed research method involving Bibliometric analysis for the qualitative and quantitative methodology includes Mean Response Ranking and Structural Equation Modelling, using SPSS and SMATPLS software for analysis. …”
Get full text
Article -
4530
A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding
Published 2017-01-01“…Chaotic maps have good potential in security applications due to their inherent characteristics relevant to cryptography. …”
Get full text
Article -
4531
One-Time Broadcast Encryption Schemes in Distributed Sensor Networks
Published 2012-03-01“…We mainly focus on data origin authentication and rekeying processes, crucial for security in such a hostile environment. An analysis and evaluations of proposed schemes are also provided.…”
Get full text
Article -
4532
A Biometric Key Establishment Protocol for Body Area Networks
Published 2011-08-01“…The correctness of the proposed key establishment protocol is formally verified based on SVO logic. Security analysis shows that our protocol can guarantee data confidentiality, authenticity and integrity. …”
Get full text
Article -
4533
Breaking Silo Thinking within the South African Water-Energy-Food Nexus via Systems Thinking and Simulation Workshops
Published 2024-06-01“… Despite their inextricable interlinkage commonly known as Water-Energy-Food nexus, the current disconnect in policy development and management of the water, energy, and food resources threatens their security of supply. The security of these basic human needs is aggravated by the cross-cutting role of climate change which impacts their availability. …”
Get full text
Article -
4534
Analisis Kualitas Pelayanan Parkir Tepi Jalan Umum di Kota Pekalongan
Published 2022-04-01“…In order to approach these problems, the theoretical references from Zeitaml and Ilosa are used, namely tangible, reliability, responsiveness, assurance, empathy, transparency and security. The data were collected through direct observation and interviews with informants and analyzed qualitatively. …”
Get full text
Article -
4535
Optimizing milpa agrosystems with beneficial microbes and their ecological interactions: a review
Published 2025-01-01“…Abstract Ensuring food security through sustainable systems remains a key goal for the agricultural sector. …”
Get full text
Article -
4536
Dynamics and Control of Worm Epidemic Based on Mobile Networks by SEIQR-Type Model with Saturated Incidence Rate
Published 2021-01-01“…The mobile networks have increasingly facilitated our daily life but are also breeding grounds for malicious worms, which are considered as the main threat to cyber security. The purpose of this paper is to analyze the dynamics of worm propagation and to control the worm epidemic based on mobile-phone networks. …”
Get full text
Article -
4537
Grid-Based Anomaly Detection of Freight Vehicle Trajectory considering Local Temporal Window
Published 2021-01-01“…The security travel of freight vehicles is of high societal concern and is the key issue for urban managers to effectively supervise and assess the possible social security risks. …”
Get full text
Article -
4538
A geotecnologia Smart Geo Layers (SGeoL) e sua aplicação para as políticas públicas: o caso do Painel de Segurança Hídrica (PSH)
Published 2023-10-01“…Through PSH, managers and researchers can have access to a myriad of information relating to water security, which can be filtered, processed, correlated, and viewed in a georeferenced way. …”
Get full text
Article -
4539
The use of technological innovations in military armaments -contemporary trends and future prospects
Published 2024-12-01“…The conclusions suggest that the development of new technologies will require appropriate international regulations, as well as new challenges related to ethics and security. Understanding these processes is crucial to ensuring global security. …”
Get full text
Article -
4540
Access Control Points: Reducing a Possible Blast Impact by Meandering
Published 2018-01-01“…Such control zones could be located within the building that has to be protected or attached to it. The elevated security needs for these areas call for a design that will consider the risk of internal explosive events. …”
Get full text
Article