Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4641
Exploring postgraduates’ experiences: A focused group discussion on violence against doctors
Published 2024-12-01“…Suggested interventions were improved security, training in de-escalation, zero-tolerance policies, and support systems for affected staff. …”
Get full text
Article -
4642
DEMOCRACY AND THE FIGHT AGAINST LEADERSHIP CORRUPTION IN SUB-SAHARAN AFRICA: IMPLICATION FOR CONTINENTAL DEVELOPMENT
Published 2024-08-01“… This paper examines democracy and the fight against leadership corruption in relation to Africa and its implication on development and security issues using a qualitative data gathering and analysis method. …”
Get full text
Article -
4643
The Challenges of Afghan Migrants in Türkiye
Published 2022-11-01“…Migration of an individual or a group occurs as a result of aggravating socio-economical, politic or security-based conditions. Migration isn’t simply a pickup-and-go process, but it comes with some challenges and opportunities for both migrants and relevant countries. …”
Get full text
Article -
4644
Lightweight multidimensional feature enhancement algorithm LPS-YOLO for UAV remote sensing target detection
Published 2025-01-01Get full text
Article -
4645
A Comprehensive Investigation of Fraud Detection Behavior in Federated Learning
Published 2025-01-01“…By addressing these challenges, FL can offer scalable, secure solutions for real-time fraud detection, ensuring the protection of sensitive financial data while enhancing detection accuracy across diverse data sources.…”
Get full text
Article -
4646
From threat to response: Cybersecurity evolution in Albania
Published 2025-01-01“…The focus is on how Albania has tailored its strategic responses to enhance digital resilience and national security. In the second part, the paper provides an in-depth review of the threat models prevalent in the Western Balkans and Albania, highlighting key areas where Albania's cyber management requires further development. …”
Get full text
Article -
4647
Confidential communication scheme based on uncertainty of underwater noisy channels
Published 2019-04-01“…Aiming at the influence of the uncertainty of underwater noise on information transmission and the security problem of the communication over noisy channels,a confidential communication scheme based on the uncertainty of underwater noisy channels was proposed.The proposed scheme was composed of an interactive key extraction protocol based on Godel’s code and a privacy amplification protocol based on r-circulant Toeplitz matrix.During the process of key extraction,the key sequence comparing number was reduced through the Godel’s code.When calculating the key length after privacy amplification,the uncertainty of underwater noise was considered to make the proposed scheme more practical.Experimental results show that under the condition of satisfying protocol security,it takes 11.99 s to transmit 119 940 bit string where the lower bound of the generated secret key length is 117 331 bit after privacy amplification and the upper bound of the adversary’s information about the secret key is 2 609 bit.Moreover,the proposed scheme (nt+s)×(nt+s)-order r-circulant Toeplitz matrix decreases(nt+s)-1 bit memory space compared to the traditional Toeplitz matrix with the same order.…”
Get full text
Article -
4648
Calculation of the quantity of oxygen required for maintenance of the predetermined temperature of steel during its boiling period in a steel-melting arc furnace
Published 2000-08-01“…The article provides а mathematical model of steel smelting in a steel-melting arc furnace with provision for calculation of necessary quantity of oxygen for maintenance of preset temperature of steel when arcs are switched off It shows that oxygen supply during the arcs disconnection period secures energy consumption reduction.…”
Get full text
Article -
4649
Resource Mobilization Policy Guidelines
Published 2022“…It is intended to enhance capacity of University stakeholders in securing resources for Kabale University’s mandate as documented in the Statutory Instrument No. 36 of July 2015, establishment of Kabale University…”
Get full text
Other -
4650
Recessive transition of rural residential land use from the perspective of value co-creation: A case study of Yiwu City, Zhejiang
Published 2025-01-01“…[Results] (1) Value co-creation of ural residential land follows the process model of “value consensus-value execution-value win-win” and the operational paradigm of “subject interaction - capacity embedding - benefit sharing”, driving the “element integration - structure reorganization - function optimization” of rural residential land use system, resulting in the dynamic evolution of diverse values such as residential security, economic property, production and operation, ecological protection, and cultural inheritance, and achieving the recessive rural residential land use transition. (2) Yiwu’s practice path of guiding multiple stakeholders to interact collaboratively, constructing “value consensus” for rural residential land, driving with multiple forces, and implementing “value execution” for rural residential land through multi-dimensional rule interaction is a successful model for realizing the recessive rural residential land use transformation through value co-creation. (3) Through the practice of value co-creation, Yiwu has achieved a transformation of the functional value of rural residential land from residential security orientation to economic property orientation, and then to a comprehensive and coordinated approach that encompasses residential security, production and operation, economic assets, and ecological protection, etc. …”
Get full text
Article -
4651
Averting War in Northeast Asia: A Proposal
Published 2011-01-01“…The most critical need of countries in Northeast Asia is an institution for crisis prevention, crisis management, and other security-promoting purposes-what might be called a Northeast Asia Security Dialogue Mechanism (NEASDM). …”
Get full text
Article -
4652
SDRG-Net: Integrating multi-level color transformation encryption and ICNN-IRDO feature analysis for robust diabetic retinopathy diagnosis
Published 2025-03-01“…A Secure DR Grading Network (SDRG-Net) is proposed to address these issues, integrating several advanced techniques. …”
Get full text
Article -
4653
The Small Wars Doctrine of the US Marine Corps and Colonial Experience of the European Powers
Published 2023-12-01“…The findings broaden the understanding of the modern leading powers’ approaches to internal security models transfer, as well as of its limits.…”
Get full text
Article -
4654
Speeding Violation Type Prediction Based on Decision Tree Method: A Case Study in Wujiang, China
Published 2019-01-01“…This study is approved by the Traffic Police Brigade of Wujiang Public Security Bureau and aims to explore the characteristic of the speeding violation behaviour and attempt to make an effective prediction about it. …”
Get full text
Article -
4655
Artificial Intelligence in Pediatric Epilepsy Detection: Balancing Effectiveness With Ethical Considerations for Welfare
Published 2025-01-01“…However, ethical considerations around privacy, data security, and model bias remain crucial for responsible AI integration. …”
Get full text
Article -
4656
2.5D Inductive Intertwined Frequency Selective Surface for Band-Pass and High Miniaturization Applications
Published 2025-01-01Get full text
Article -
4657
-
4658
Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks
Published 2024-12-01“…Finally, it is shown that the scheme is secure by analyzing encryption/decryption private keys, ciphertext quantum state sequences during transmission, plaintext quantum state sequence, and the result after computations on the plaintext quantum state sequence.…”
Get full text
Article -
4659
Semantic Tokenization-Based Mamba for Hyperspectral Image Classification
Published 2025-01-01Get full text
Article -
4660
The Development of Open Banking and the Analysis of Third-Party Providers in Azerbaijan
Published 2024-12-01“…Azerbaijan's current open banking development follows the regulatory-based European model and the Berlin Group standard for API security. It is considered more secure than other market-based and hybrid approaches in ensuring customer safety in open banking. …”
Get full text
Article