Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5141
Model for Predicting Hope According to the Attachment Styles and Time Perspective with the Mediation Role of Psychological Resilience in the University Students
Published 2024-12-01“…Moreover, secure, avoidant and ambivalent attachment styles, time perspective and psychological resilience have significant direct effect on the students’ hope (p<0.01). …”
Get full text
Article -
5142
Defend Against Property Inference Attack for Flight Operations Data Sharing in FedMeta Framework
Published 2025-01-01“…Our contribution lies in the development of a secure and efficient data-sharing solution for flight operations data, which has the potential to revolutionize the aviation industry.…”
Get full text
Article -
5143
Analysis of new varieties adoption behavior of Chinese turbot farmer based on the perspective of heterogeneity
Published 2025-01-01“…China is the largest turbot farming in the world, where germplasm source security is closely related to national security. To further promote the sustainable development of the turbot aquaculture industry, the China Marine Fish Industry Technology System team has developed a new variety of fast-growing turbot (hereinafter referred to as new varieties) in 2012. …”
Get full text
Article -
5144
ORGANIC FARMING: A RELIABLE STRATEGY FOR SUSTAINABLE AGRICULTURE IN NEPAL
Published 2024-01-01“…As a result, it becomes increasingly important to address how to achieve food security while simultaneously addressing the imbalance in the ecosystem. …”
Get full text
Article -
5145
Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks
Published 2024-01-01“…Based on our thorough analysis, we identify key limitations in current methodologies and propose potential paths for future research, focusing on integrating real-time data analysis, cross-layer security measures, and collaborative IDS frameworks.…”
Get full text
Article -
5146
From data to diagnosis: leveraging deep learning in IoT-based healthcare
Published 2024-11-01“…Ethical and legal considerations are also critical as the deployment of artificial intelligence in healthcare necessitates careful consideration of patient consent and data security. The future of deep learning in healthcare IoT is geared toward enhancing data security, improving device integration, and creating patient-centric models through innovative technologies such as blockchain and edge computing. …”
Get full text
Article -
5147
Factors Influencing QRIS Adoption in Warkops
Published 2025-01-01“…In contrast, perceived security, risk, anxiety, and comfort do not significantly affect the intention to adopt QRIS. …”
Get full text
Article -
5148
Enhancing RF Fingerprint Generation in Power Amplifiers: Unequally Spaced Multitone Design Approaches and Considerations
Published 2024-01-01“…The rapid growth of Internet of Things (IoT) devices and communication standards has led to an increasing demand for data security, particularly with limited hardware resources. …”
Get full text
Article -
5149
Healthcare assessment tools—a valid source of data for pre-hospital care? Usability for ensuring medical care in the event of a disaster
Published 2025-02-01“…Currently, only the German Armed Forces (Bundeswehr) offer an internally secured infrastructure that allows all those involved in the care of soldiers to access all important medical data quickly and easily from any location.…”
Get full text
Article -
5150
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01“… Information security is paramount for individuals, companies, and governments. …”
Get full text
Article -
5151
The role of 5G network in revolutionizing agriculture for sustainable development: A comprehensive review
Published 2025-03-01“…Additionally, the paper explores development optimization of various nodes, fault detection, self-healing mechanisms, AI application optimization, and security issues specific to 5G-enabled smart agriculture. …”
Get full text
Article -
5152
The implications of the ongoing war on Gaza for food sustainability
Published 2025-06-01“…This work investigates the impact of the ongoing war on food security and food-related sustainable development goals (SDGs) from local, regional, and global perspectives. …”
Get full text
Article -
5153
Effect of friction on levelling of the maxillary canine with NiTi superelastic wire - an in silico experiment using a finite element method
Published 2024-10-01“…When the wire is ligated securely to the bracket, additional friction is generated, hindering the levelling process.…”
Get full text
Article -
5154
Comparative Study of Microorganisms in Diabetic and non-diabetic Patients with Moderate and Severe Periodontitis
Published 2024-07-01“…<br /><strong>Methods:</strong> a descriptive and cross-sectional study was carried out at the Hospital of the Ecuadorian Social Security Institute and at the González Suárez Health Center in the period June-August 2023. …”
Get full text
Article -
5155
-
5156
The question of Baltic states in the policy of the Great Western powers in 1943
Published 2003-12-01“…Because the Western Allies hoped that Stalin would continue the cooperation with the Western powers, USA and Britain accepted Stalin's demands for security in Tehran. Baltic states in inter-Allied relations were used as a bargaining chip. …”
Get full text
Article -
5157
Optimization of Rendering Parameters of Cesium 3DTiles Model Based on Differential Evolution Algorithm
Published 2025-01-01Get full text
Article -
5158
Some issues of global problems in the changing system of values of the modern world
Published 2023-12-01“…The article analyzes the peculiarities of global problems in the modern world system, their transformation, identification of more acute issues, taking into account the urgent issue of the security of each country, food security against the background of the growth of the total population of the planet. …”
Get full text
Article -
5159
THE ANALYSIS OF THE KEY DRIVERS AND BARRIERS OF CLOUD MIGRATION IN COMPANIES IN BOSNIA AND HERZEGOVINA
Published 2020-05-01“…According to the research results, the most significant obstacles of cloud migration include the fo-llowing: lack of internal experts, privacy, lack of respo-nsibility of cloud providers in case of security incident, costs and complexity of migration to the cloud, etc. …”
Get full text
Article -
5160
STATE POLICY TO COUNTER CRIME IN BORDER REGIONS IN A DIGITAL SOCIETY
Published 2024-03-01“…The purpose of the scientific report is to summarize the criminal risks of digitalization for the national security of border regions and to analyze some areas of state policy in the field of combating crime in a digital society. …”
Get full text
Article