Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4541
A requirement-driven approach for competency-based collaboration in industrial data science projects
Published 2024-01-01“…Simultaneously, especially manufacturing companies need to gain and secure knowledge in the field of Industrial Data Science (IDS) and to collaborate with partners to form a competitive value chain. …”
Get full text
Article -
4542
Innovative Technologies for Improved Water Productivity and Climate Change Mitigation, Adaptation, and Resilience: A Review
Published 2025-02-01“… Water scarcity, exacerbated by climate change, poses severe challenges to agriculture, food security, and sustainable development, particularly in vulnerable regions. …”
Get full text
Article -
4543
An adaptive neuro-fuzzy inference system for multinomial malware classification
Published 2025-02-01“… Malware detection and classification are important requirements for information security because malware poses a great threat to computer users. …”
Get full text
Article -
4544
Deep Learning-Based Intrusion Detection System for Detecting IoT Botnet Attacks: A Review
Published 2025-01-01“…Ultimately, this survey serves as a guideline for future researchers, contributing to the advancement of botnet detection methods in IoT environments and enhancing security against botnet threats.…”
Get full text
Article -
4545
Edge computing for detection of ship and ship port from remote sensing images using YOLO
Published 2025-02-01“…In marine security and surveillance, accurately identifying ships and ship ports from satellite imagery remains a critical challenge due to the inefficiencies and inaccuracies of conventional approaches. …”
Get full text
Article -
4546
Blockchain adoption factors
Published 2025-01-01“…Trust significantly enhances this intention, underscoring the importance of confidence in the technology's reliability and security. Environmental Concerns present a barrier, suggesting sustainability perceptions can deter adoption. …”
Get full text
Article -
4547
Quantum Computing for Advanced Driver Assistance Systems and Autonomous Vehicles: A Review
Published 2025-01-01“…The perks of quantum computation (QC) over classical systems are apparent with respect to security, privacy, and an exponentially high computation rate. …”
Get full text
Article -
4548
HSK Wallet: A User Friendly Blockchain Application
Published 2024-12-01“…It focuses on improving the security, transparency, and efficiency of digital asset operations compared to traditional systems and decentralized solutions. …”
Get full text
Article -
4549
A Program for Master of Information Technology
Published 2022“…The core courses in this programmes address challenges related to Enterprise Governance of ICT, Managing ICT Projects, Risk & Change Management, Cyber Security Management, IT project Management among others. …”
Get full text
Other -
4550
Dynamic monitoring and drivers of ecological environmental quality in the Three-North region, China: Insights based on remote sensing ecological index
Published 2025-03-01“…Additionally, these have provided scientific references for determining whether to expand the implementation of ecological restoration measures in arid regions to enhance the ecological environment and establish a robust ecological security barrier.…”
Get full text
Article -
4551
THE MAIN ASPECTS OF FINANCIAL PLANNING AND FUNDING OF THE ARMED FORCES
Published 2016-04-01“…Thе article describes the system and structure of financial security of the Armed Forces of the Russian Federation, new approaches to financial planning, reflects the aggravation of problems of financial planning, dedicated work of Department of financial support and the common settlement centre of the Ministry of Defence of the Russian Federation.…”
Get full text
Article -
4552
Optimizing demand response and load balancing in smart EV charging networks using AI integrated blockchain framework
Published 2024-12-01“…Blockchain integration further strengthens security and privacy, delivering a 97.71% improvement in data protection via its decentralized framework. …”
Get full text
Article -
4553
Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks
Published 2025-01-01“…The lightweight D-H key exchange ensures that even resource-constrained IoT devices can securely perform key exchanges without significant computational overhead. …”
Get full text
Article -
4554
Building a Digital Health Research Platform to Enable Recruitment, Enrollment, Data Collection, and Follow-Up for a Highly Diverse Longitudinal US Cohort of 1 Million People in the...
Published 2025-01-01“…Participants were recruited by in-person, print, and online digital campaigns. Participants securely accessed the DHRP via web and mobile apps, either independently or with research staff support. …”
Get full text
Article -
4555
-
4556
« Paroles de flics ». Communications policières et actualité politique au Maroc (2005-2023)
Published 2023-12-01“…In line with the political readjustment period, communication will become less and less aimed at the general public and more and more focused on members of the security forces.…”
Get full text
Article -
4557
Ecological problem identification based on spatial and temporal dynamics of ecosystem quality: A case study
Published 2025-01-01“…Bayannur, located in the Hetao Plain and the Urat Grassland, is China’s important ecological security barrier. It plays a significant role in the country’s sustainable socio-economic development, ecological protection, and high-quality growth. …”
Get full text
Article -
4558
Impact of the upgraded version of German“industrial 4 platform”on China's manufacturing industry
Published 2016-01-01“…Firstly,the organizational structure and positioning of German“Industrial 4 Platform”were introduced,and then the core research was focused on,such as research and innovation,reference system and standardization,network system security.Finally,we should draw on the advanced experience of German manufacturing field,and promote the development of intelligent manufacturing in China.…”
Get full text
Article -
4559
An Agent-Based Auction Protocol on Mobile Devices
Published 2014-01-01“…This paper proposes an English auction protocol to preserve a secure, fair, and effective online auction environment, where the operations are integrated with mobile agent technology for bidders participating in online auctions. …”
Get full text
Article -
4560
D’une industrie… l’autre ?
Published 2013-06-01“…Starting from a contextualization of Cindy Patton’s text, the authors invite consideration of the timeliness of these questions in light of contemporary issues related to the production of identities and communities that helps us see of the establishment of the « targets » of the prevention and treatment of HIV, as well as the effects of the depoliticization secured by the medicalization of the fight against the epidemic.…”
Get full text
Article