Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5081
An Analysis of Indonesia’s Free and Active COVID-19 Vaccine Diplomacy
Published 2022-04-01“…Amid a global rush for vaccines, Indonesia has had to compete with other countries to secure vaccines to protect its people from the infection of COVID-19. …”
Get full text
Article -
5082
Assessment of Record Keeping Practices in Nursing Schools: A Case of Uganda Nursing School-Bwindi.
Published 2023“…Also, at Uganda Nursing School-Bwindi it was revealed that there were numerous instances where important documents and notes were not kept in secure conditions.…”
Get full text
Thesis -
5083
Production of Sweet-Potato Based Indigenous Micro-Organisms (IMO) for Sustainable Agriculture.
Published 2024“…The results underscore sweet potatoes' potential to support sustainable agricultural practices while addressing food security challenges in the region.…”
Get full text
Thesis -
5084
Integrating Two-Tier Optimization Algorithm With Convolutional Bi-LSTM Model for Robust Anomaly Detection in Autonomous Vehicles
Published 2025-01-01“…The AV is an advanced automobile efficient in preserving secure driving by evading collisions formed by drivers. …”
Get full text
Article -
5085
-
5086
Experiences of midwifery students and graduates in Somalia: evidence from qualitative data
Published 2025-01-01“…The recurring themes of inadequate training, security risks, and restrictive gender norms require holistic and systematic interventions that address these issues in order to improve motivation and workforce participation among this important health cadre.…”
Get full text
Article -
5087
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
Published 2021-01-01“…Deep learning-based guessing attack protection algorithms have been enhancing IoT security; however, it still has a critical challenge for the complex industries’ IoT networks. …”
Get full text
Article -
5088
Co-producing a safe mobility and falls informatics platform to drive meaningful quality improvement in the hospital setting: a mixed-methods protocol for the insightFall study
Published 2025-02-01“…The data to be included in the informatics platform will be curated from electronic health records and incident reports within an existing secure data environment, with appropriate data access approvals and controls. …”
Get full text
Article -
5089
Study on the application of thermal-meltable recovery of CFRP strand anchors
Published 2025-01-01Get full text
Article -
5090
THE CHALLENGES FACED BY NIGERIAN WOMEN IN AGRICULTURAL ACTIVITIES: STUDY OF FORON WOMEN, 2010- 2023
Published 2023-12-01“…The paper also discusses challenges faced by women in agriculture and suggests ways through which these can be resolved in order to foster food security and self reliance. The appraisal of these challenges constitutes the main thrust. …”
Get full text
Article -
5091
Overview of Cuba's Food Rationing System
Published 2004-09-01“…Issues related to food security are discussed in another fact sheet of this series (EDIS FE483). …”
Get full text
Article -
5092
Key technologies of personnel location’s management system for pumped storage power station
Published 2018-05-01“…The ultra wideband location has the advantages of low power consumption,high speed transmission and high security level,especially it can support high location accuracy.It plays an irreplaceable role in the information construction of pumped storage power station.The ultra wideband positioning technology was introduced.The positioning technologies such as RFID,ZigBee,high-frequency pulse were compared and analyzed.The system architecture and positioning principle were described.Finally,the application of the pumped storage power station were introduced.…”
Get full text
Article -
5093
Big data exchange based on information chain
Published 2016-10-01“…Based on the block chain technology, a new decentralized data exchange platform was designed, which would secure the legal rights of data providers and realize the goal of safe circulation between the only mutual parties of the data exchange, strengthen the regulation and monitoring of flows data.…”
Get full text
Article -
5094
OpenStack-Based Heterogeneous Hybrid Cloud Solution
Published 2015-07-01“…The status of hybrid cloud industry,mainstream products and solutions of hybrid cloud were studied.The applicable scenaries and deployment options were analyzed.Based on the characteristics of cloud resource and the hybrid cloud business needs of telecom operators,heterogeneous hybrid cloud system and technical solutions were proposed.The system framework and key technologies of hybrid cloud unified management,heterogeneous resource pools unified management,hybrid cloud network connectivity,and hybrid cloud security were described.…”
Get full text
Article -
5095
Respite Care for Caregivers of Older Adults
Published 2012-08-01“…My grandmother knew she was safe, secure, and loved.” This 2-page Family Album Radio transcript was written by Suzanna Smith and published by the UF Department of Family, Youth and Community Sciences, August 2012. …”
Get full text
Article -
5096
Overview of Cuba's Food Rationing System
Published 2004-09-01“…Issues related to food security are discussed in another fact sheet of this series (EDIS FE483). …”
Get full text
Article -
5097
Research and design of authenticated encryption algorithm based on AES round function
Published 2020-04-01“…The authenticated encryption algorithm guarantees the confidentiality and integrity of the information at the same time,and has extensive research and application prospects in the field of information security.With the mixed integer linear programming (MILP) method,the iterative structure with high efficiency and more active S boxes is searched.Based on this new round iterative function and the generalized Feistel structure,an authenticated encryption algorithm with the ability to resist collision attack,differential attack,linear attack and other attacks was designed and implemented,and the efficiency was twice that of AES-GCM.…”
Get full text
Article -
5098
STATE RESERVE UNDER CONTROLLED MARKET ECONOMY
Published 2016-12-01“…We present arguments justifying the need to improve the state reserve management system, due to the constantly changing external and internal risks of development of the state, the need for a response to the security threats of the population. The necessity of using adaptable to the conditions of Russian foreign experience in the use of modern instruments commodity interventions on the domestic market, with the purpose of influencing the decline in market prices and their stabilization in the event of special circumstances. …”
Get full text
Article -
5099
Attribute-based encryption scheme with efficient revocation in data outsourcing systems
Published 2015-10-01“…In order to support fine-grained attribute revocation in data outsourcing systems,an attribute-based encryption scheme with efficient revocation in indirect revocation model was proposed.The model of ABE supporting attribute revocation was given,and a concrete scheme was constructed which proved its security under the standard model.Compared to the existing related schemes,the size of ciphertext and private/secret key is reduced,and the new scheme achieves fine-grained and immediate attribute revocation which is more suitable for the practical applications.…”
Get full text
Article -
5100
Related-key rectangle attack on the full ARIRANG encryption mode
Published 2011-01-01“…The security of the block cipher used in the compression function of ARIRANG,which was one of the SHA-3 candidates,was revaluated.Based on a linear transformation of the master key and the all-one differential of the round function,a full 40-round related-key rectangle attack of the ARIRANG encryption mode was presented,which was the first cryptanalytic result of the ARIRANG encryption mode.The result shows that the ARIRANG encryption mode as a block cipher is not immune to the related-key rectangle attack.…”
Get full text
Article