Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4981
High trophic similarity between non-native common carp and gibel carp in Turkish freshwaters: Implications for management
Published 2025-01-01“…In Turkey, stocking of common carp Cyprinus carpio is practised to provide food security for people and job security for artisanal fishers, resulting in a country-wide distribution. …”
Get full text
Article -
4982
Generative adversarial synthetic neighbors-based unsupervised anomaly detection
Published 2025-01-01“…Abstract Anomaly detection is crucial for the stable operation of mechanical systems, securing financial transactions, and ensuring network security, among other critical areas. …”
Get full text
Article -
4983
MonoMax Suture: A New Long-Term Absorbable Monofilament Suture Made from Poly-4-Hydroxybutyrate
Published 2012-01-01“…Its tensile modulus of 0.48 GPa is approximately one-third of the value of the PDS II fiber providing an exceptionally flexible and pliable fiber with excellent knot strength and security. These features are further enhanced by the fiber's elasticity, which also improves knot security and may help prevent wound dehiscence. …”
Get full text
Article -
4984
A Scalable Framework for Sensor Data Ingestion and Real-Time Processing in Cloud Manufacturing
Published 2025-01-01“…However, existing frameworks face challenges related to scalability, resource orchestration, and data security, particularly in rapidly evolving decentralized manufacturing settings. …”
Get full text
Article -
4985
Enhancing Safety in Nigeria's Oil and Gas Sector: A Fault Tree Analysis Approach
Published 2023-12-01“…By dissecting incidents ranging from structural failures to security threats, the research illuminates the multifaceted risks entrenched within the sector's activities. …”
Get full text
Article -
4986
Electronic petitions in France on the material of Change.org, a non-governmental e-petition platform
Published 2022-09-01“…Residents of France most often relate to social problems (social security, health care and education) in electronic petitions. …”
Get full text
Article -
4987
Comparing Types of Statistical Data Between Turkey (the Case Study of Istanbul) and Selected Countries for Creating Fire Strategies
Published 2019-07-01“…Therefore, it can be said that fire statistics are kept and used to determine the strategies of fire statistics, especially in the countries that have high standards of social security and are technologically advanced. The strength of this chain of secure relations is possible with the establishment of learning systems. …”
Get full text
Article -
4988
A FSTCN-Based Leak Detection Method for Large-Scale Pipeline Transportation Systems
Published 2025-01-01“…In large-scale pipeline transportation systems, security issues such as leaks and explosions are prevalent, thus early detection of leaks is important to reduce security hazards in pipeline systems. …”
Get full text
Article -
4989
Numerical Assessment of a Safety System to Minimize Injuries during a Cyclist Run-Over
Published 2021-01-01“…The computed results were divided into groups, A for the run-over test without a passive security system and B for the run-over test with a passive security system. …”
Get full text
Article -
4990
Dynamics of Cropland Non-Agriculturalization in Shaanxi Province of China and Its Attribution Using a Machine Learning Approach
Published 2025-01-01“…Cropland is a critical component of food security. Under the multiple contexts of climate change, urbanization, and industrialization, China’s cropland faces unprecedented challenges. …”
Get full text
Article -
4991
Driving simulator study of text messaging and phone conversations: Effects of messages’ valence, drivers’ values and self-reported driving behaviors
Published 2025-01-01“…Self-reported values of power, security, and universalism were significantly correlated with objective driving measures: power was associated with riskier driving behaviors, whereas security and universalism were linked to safer driving patterns. …”
Get full text
Article -
4992
Impact of Community-based Adaptation Methods in Creating Resilient Communities in Indonesia and Philippines
Published 2024-01-01“…Improvements were observed in disaster management, aquaculture, food, and water-security resilience, thus, 25% water management practices, also including irrigation systems and flood control measures. …”
Get full text
Article -
4993
Solar Drying for Domestic and Industrial Applications: A Comprehensive Review of Innovations and Efficiency Enhancements
Published 2025-02-01“…Abstract Global challenges such as energy scarcity and food security are intensified by a growing population and substantial post‐harvest food losses, contributing to alarming hunger levels. …”
Get full text
Article -
4994
Assessing the Impact of Hermetic Storage Technology on Storage Quantity and Post-Harvest Storage Losses Among Smallholding Maize Farmers in Nepal
Published 2025-01-01“…This can contribute to enhancing local food security.…”
Get full text
Article -
4995
Promoting Healthy Lifestyle Strategies among Couples for Sustainable Family Survival in Oyo State, Nigeria
Published 2024-12-01“…Healthy lifestyle can be encouraged through mindfulness, with secure communities and local mental support resources playing a key role. …”
Get full text
Article -
4996
The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field
Published 2022-01-01“…The mathematical operation of the Elliptic Curve over the prime finite field is wildly used for secure data communication as it provides high security while utilizing the same size as the secret key. …”
Get full text
Article -
4997
The Effectiveness and Mechanisms of China’s Grain Support Policies in Relation to Grain Yield—An Evaluation of a Wide Range of Policies
Published 2025-01-01“…These conclusions are of great significance for improving grain production support and protection systems, enhancing incentives for farmers to grow food and for local governments to control food, and achieving the goal of food security.…”
Get full text
Article -
4998
Blockchain enabled traceability in the jewel supply chain
Published 2025-01-01“…The system incorporates robust security measures, addressing vulnerabilities such as reentrancy attacks and unauthorized access. …”
Get full text
Article -
4999
Effect of Banana Production on Poverty Reduction in Kabuyanda Sub-County, Isingiro District.
Published 2024“…Additionally, diversifying banana products like flour, chips, and juice was suggested to enhance food security and create additional income streams through value addition. …”
Get full text
Thesis -
5000
Routing control method of hot standby BRAS in IP MAN
Published 2016-01-01“…With the implementation of“Broadband China”strategy,IP services become more and more diversified,the demand for all kinds of security is also increasing.The key technology of BRAS hot backup and its realization method were introduced,realizing the seamless handover between primary and standby BRAS and effectively controlled the route range in BRAS.The routing was optimized to reduce traffic between interconnect circuits of primary and backup BRAS to improve the utilization efficiency of the circuit.…”
Get full text
Article