Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4681
Attaching artificial Achilles and tibialis cranialis tendons to bone using suture anchors in a rabbit model: assessment of outcomes
Published 2025-01-01“…Study Design Metal suture anchors with braided composite sutures of varying sizes (United States Pharmacopeia (USP) size 1, 2, or 5) were used to secure artificial tendons replacing both the Achilles and tibialis cranialis tendons in 12 female New Zealand White rabbits. …”
Get full text
Article -
4682
Impact of nurturing care educational videos focusing on children with nutritional problems aged 6-23 months on mothers' knowledge and child growth
Published 2024-12-01“…Results: The intervention group showed significant improvements in nurturing care knowledge (p = 0.012), responsive caregiving (p = 0.018), and safety and security (p = 0.006). A significant difference in safety and security was observed between groups at posttest 1 (p = 0.020). …”
Get full text
Article -
4683
A Green′s function for a convertible bond using the Vasicek model
Published 2002-01-01“…We consider a convertible security where the underlying stock price obeys a lognormal random walk and the risk-free rate is given by the Vasicek model. …”
Get full text
Article -
4684
Bilgiyi Süzmek
Published 2011-09-01“…The article deals with the concerns about Secure Internet Law to be enforced on November 22, 2011, and points out that individuals of democratic societies are capable of filtering information and families have a part to play in protecting from the information pollution on the Internet. …”
Get full text
Article -
4685
Method of quantitative assessment for diversified software system
Published 2020-03-01“…To instruct the selecting of the redundancy variants for diversified software system at different situations,the evaluation systems of usability,security and performance was constructed by using some diversified software evaluation indicators.Then hierarchical analyzation system (HAS) was introduced based on the three evaluation systems.A real case verify that HAS is practicable at the situation that there are not many variants.…”
Get full text
Article -
4686
Anomaly Detection in Network Traffic Using Advanced Machine Learning Techniques
Published 2025-01-01“…Anomaly detection in network traffic is a critical aspect of network security, particularly in defending against the increasing sophistication of cyber threats. …”
Get full text
Article -
4687
An encryption algorithm for multiple medical images based on a novel chaotic system and an odd-even separation strategy
Published 2025-01-01“…To simultaneously augment security and optimize encryption efficiency, we undertake a dual-pronged approach. …”
Get full text
Article -
4688
Trustworthy and efficient project scheduling in IIoT based on smart contracts and edge computing
Published 2025-01-01“…Subsequently, the solution integrates combinatorial auction with random sampling (CA-RS) into smart contracts. Alongside security analysis, simulations are conducted using real data sets. …”
Get full text
Article -
4689
TM-Chain: TCB Measurement Management Using Cloud Blockchain for IoT Devices
Published 2025-01-01“…In the IoT era, RA is an important security feature because verifiers make critical decisions based on the RA result. …”
Get full text
Article -
4690
An Improved Deep Belief Network IDS on IoT-Based Network for Traffic Systems
Published 2022-01-01“…The security challenges such as privacy, scalability, authenticity, trust, and centralization thwart the quick adaptation of the smart services; hence, effective solutions are needed to be in place. …”
Get full text
Article -
4691
Challenges in Microgrids with Medium Voltage Circuit
Published 2025-01-01“…Effective coordination between protection devices and management systems ensures a rapid and selective response to faults, thereby enhancing microgrid security and facilitating efficient problem detection and resolution. …”
Get full text
Article -
4692
How Developments in Genebanks Could Shape Utilization Strategies for Domestic Animals
Published 2025-01-01“…Global geographical, climatic, and ecological diversity has given rise to a wealth of domestic animals, which are essential for food security and agricultural sustainability. Since the 1960s, these critical genetic resources have declined significantly due to overdevelopment, ecological degradation, and climate change, posing a serious threat to global food security. …”
Get full text
Article -
4693
The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database
Published 2016-03-01“…The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.…”
Get full text
Article -
4694
Motorcycle Engine Start System Using Fingerprint and Voice Command
Published 2023-06-01“…Making the starter engine system on this motorbike is to make it easier for users to turn on the motorbike without using a key so that they only use voice commands through an application found on an Android smartphone. In the security section, fingerprints are used as a substitute for manual ignition on motorbikes. …”
Get full text
Article -
4695
Electronic medical records sharing solution based on Hyperledger Fabric
Published 2024-10-01“…Compared to other secret sharing schemes, this solution demonstrates better theoretical time complexity, providing an efficient and reliable solution for secure storage and multi-party sharing of EMR.…”
Get full text
Article -
4696
Protecting Medical Images Using a Zero-Watermarking Approach Based on Fractional Racah Moments
Published 2025-01-01“…This article introduces a new family of orthogonal moments, the fractional Racah moments (FrROMs), developed to meet the demands of copyright protection for medical images, a field requiring robust and secure methods that preserve the integrity of the original image. …”
Get full text
Article -
4697
Enhancing the Process of AES: A Lightweight Cryptography Algorithm AES for Ad-hoc Environments
Published 2022-12-01“…This algorithm will be modified to improve the security as well as reduce the amount of time and energy consumed in comparison with the original algorithm. …”
Get full text
Article -
4698
In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes
Published 2025-02-01“…In the rapidly evolving landscape of the Internet of Things (IoT) and Wireless Sensor Networks (WSN), the need for secure and efficient data transmission is paramount. …”
Get full text
Article -
4699
StegoEDCA: An Efficient Covert Channel for Smart Grids Based on IEEE 802.11e Standard
Published 2025-01-01“…These covert channels provide an innovative solution for securely transmitting large volumes of data within the smart grid.…”
Get full text
Article -
4700
Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game
Published 2016-01-01“…Security in mobile ad hoc networks (MANETs) is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. …”
Get full text
Article