Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5421
Midwife-led birthing centre in the humanitarian setup: An experience from the Rohingya camp, Bangladesh.
Published 2024-01-01“…Recommendations included increased support and security staff, establishing a referral hospital nearer to the camp, refresher training for midwives and monitoring, and mentoring to improve service quality. …”
Get full text
Article -
5422
Public safety in the conditions of martial law and mental warfare
Published 2022-09-01“…The main purpose of the study is to develop proposals and concrete measures to strengthen public security in the conditions of martial law and mental war unleashed against Ukraine. …”
Get full text
Article -
5423
Ischemic Heart Disease and Work Disability in Patients Treated at the Internal Medicine Consultation and Assessed by the Expert Medical Labor Commission
Published 2016-02-01“…Its costs in terms of social security are increasing.…”
Get full text
Article -
5424
The defense function of the state: Traditional and modern understanding
Published 2025-01-01“…Since the defense function of the state is a complex phenomenon encompassing biological, anthropological, philosophical, sociological, psychological, political, security, military, strategic, and other aspects, understanding its essence is no easy task. …”
Get full text
Article -
5425
Highway Performance Evaluation Index in Semiarid Climate Region Based on Fuzzy Mathematics
Published 2019-01-01Get full text
Article -
5426
Clamshell Inductive Current Coupler for Online Cable Condition Monitoring
Published 2025-01-01Get full text
Article -
5427
Personalized lightweight distributed network intrusion detection system in fog computing
Published 2023-06-01“…With the continuous development of Internet of Things (IoT) technology, there is a constant emergency of new IoT applications with low latency, high dynamics, and large bandwidth requirements.This has led to the widespread aggregation of massive devices and information at the network edge, promoting the emergence and deep development of fog computing architecture.However, with the widespread and in-depth application of fog computing architecture, the distributed network security architecture deployed to ensure its security is facing critical challenges brought by fog computing itself, such as the limitations of fog computing node computing and network communication resources, and the high dynamics of fog computing applications, which limit the edge deployment of complex network intrusion detection algorithms.To effectively solve the above problems, a personalized lightweight distributed network intrusion detection system (PLD-NIDS) was proposed based on the fog computing architecture.A large-scale complex network flow intrusion detection model was trained based on the convolutional neural network architecture, and furthermore the network traffic type distribution of each fog computing node was collected.The personalized model distillation algorithm and the weighted first-order Taylor approximation pruning algorithm were proposed to quickly compress the complex model, breaking through the limitation of traditional model compression algorithms that can only provide single compressed models for edge node deployment due to the high compression calculation overhead when facing a large number of personalized nodes.According to experimental results, the proposed PLD-NIDS architecture can achieve fast personalized compression of edge intrusion detection models.Compared with traditional model pruning algorithms, the proposed architecture achieves a good balance between computational loss and model accuracy.In terms of model accuracy, the proposed weighted first-order Taylor approximation pruning algorithm can achieve about 4% model compression ratio improvement under the same 0.2% model accuracy loss condition compared with the traditional first-order Taylor approximation pruning algorithm.…”
Get full text
Article -
5428
-
5429
ECOLOGICAL FUNCTION OF THE STATE AND PROBLEMS OF ITS REALIZATION IN MODERN CONDITIONS
Published 2024-11-01“…The introduction of these measures will allow to contribute to a greater extent to ensuring environmental security. Scope of application of the results. The results of the study can be applied in the doctrine of environmental law, as well as in legislative activity, when improving the legal framework regulating environmental legal relations.…”
Get full text
Article -
5430
Interval-Aware Scheduling of Surveillance Drones: Exact and Heuristic Approaches
Published 2025-01-01“…In recent years, the patrol security of facilities has faced various challenges, including labor shortages and rising labor costs. …”
Get full text
Article -
5431
Protein-ligand binding affinity prediction using multi-instance learning with docking structures
Published 2025-01-01Get full text
Article -
5432
Promoting Internal Armed Conflict Resolution and Peacebuilding: The Case of the U.S.-Colombia Relations (Part II)
Published 2020-11-01“…Assessing Colombia’s experience in overcoming the internal conflict and the role of the United States in that process, the author concludes that although prioritization of security issues may have a considerable organizing potential, at the same time it may be detrimental to the process of post-conflict reconstruction in general.…”
Get full text
Article -
5433
Block of personal formation of the heads of the system of the Ministry of Internal Affairs of Ukraine indicators characteristics
Published 2021-09-01“…The obtained empirical data will contribute to the improvement of management theory and practice in the security and defense sector of Ukraine.…”
Get full text
Article -
5434
Susceptibility modeling of hydro-morphological processes considered river topology
Published 2024-12-01Get full text
Article -
5435
Randomized controlled trials in central vascular access devices: A scoping review.
Published 2017-01-01“…<h4>Conclusion</h4>More high quality randomized trials across central venous access device management are necessary, especially in dressing and securement and patency. These can be encouraged by having more studies with multidisciplinary team involvement and consumer engagement. …”
Get full text
Article -
5436
Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
Published 2022-04-01“…Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were reviewed systematically from the vertical, horizontal, current, developing and future perspectives.From the vertical perspective, the development process of CMD from concept to theory and practice was summarized.From the horizontal view, it elaborated the core structure DHR (dynamical heterogeneous redundancy) of CMD, the principles based on CMD’s three major theorems, safety gains and performance costs.A comparison was conducted between CMD and five other active defense technologies, namely intrusion tolerance, moving target defense, zero trust architecture, trusted computing and computer immunology.From the current perspective, it reviewed the implementation elements, performance, system architecture, heterogeneous strategies, scheduling strategies, voting strategies and other common technology patterns and characteristics of 11 types of main existing mimic products including mimicry router, mimicry processor, mimicry DNS server and mimicry cloud platform.From the developing perspective, it explored the “mimic+” AICDS (Mimic + AI/IoT/Cloud/Data/SDN) symbiotic ecology with respect to 5 types of new technologies, namely artificial intelligence, Internet of things, cloud computing, big data and software-defined network, and proposed the corresponding technology junctions and cross research value.From the future perspective, it looked into the future mimicry baseline 2.0 product ecology, “mimic +5G/6G”, “mimic + edge computing”,“mimic + cloud” and “mimic + blockchain” application scenarios.Besides, 4 types of challenges faced by CMD in the future were analyzed and summarized, including escape space of multi-mode decision attack, mutual restriction of heterogeneous and synchronous, difficult balance between security and function, and limited transformation space of existing endogenous security components.…”
Get full text
Article -
5437
Changes in Cultivated Land and Its Effects on Vegetation and Evapotranspiration Characteristics in the Naoli River Basin
Published 2023-01-01“…The Naoli River Basin is located in the hinterland of the Sanjiang Plain and is an important grain production area in China.In recent years,with the guarantee of food security and the adjustment of regional agricultural structure in China,there have been significant changes in land use,such as cultivated land expansion and planting structure adjustment.Therefore,identifying changes in cultivated land and their ecological effects is of great significance for regional ecological protection.This study analyzed changes in land use from 1980 to 2020 and then estimated their ecological impact using the ecological impact index of cultivated land change based on normalized difference vegetation index (NDVI) and actual evapotranspiration data.In addition,changes in evapotranspiration were estimated to determine the degree of water consumption.The results show that:① the area of cultivated land in the basin has increased significantly from 7 273.22 km<sup>2</sup> to 15 313.62 km<sup>2</sup> over the past 40 years,an increase of 110.55%,mainly due to the reclamation of forests and wetlands;② in the past 20 years,there has been a significant conversion between paddy fields and dry land,with a greater increase in conversion from dry land to paddy fields;③ From 2000 to 2020,both NDVI and evapotranspiration in the basin showed an increasing trend,with an increased amplitude of 8.15% and 18.58%,respectively.The increase in NDVI in cultivated areas mainly occurs during the crop growing season,while the contribution of non-growing seasons to NDVI change is low;④ different types of changes in cultivated land have varying contributions to the NDVI and annual evapotranspiration in the basin.Returning cultivated land to forest has contributed to ecological protection and reduced water consumption.Although the reclamation of wetlands has increased NDVI during the growing season,it has also increased water consumption in the basin.The conversion from paddy fields to dry land is beneficial for water conservation in the basin,while the conversion from dry land to paddy fields increases evaporation and water consumption,potentially posing a risk to water resource security.…”
Get full text
Article -
5438
Explaining the interactions of city and border with the sustainable development approach Based on the logic of fuzzy multi-criteria decision making Case study: Zahedan ,Mijaveh, D...
Published 2022-03-01“…"Establishing economic, political and environmental security to deal with crises, attacks and ... (ST2)" is the most desirable strategy of deciding on the issue of zero value. …”
Get full text
Article -
5439
Genebanks and market participation: evidence from groundnut farmers in Malawi
Published 2022-03-01“…Abstract Background Genebanks contribute to poverty reduction as well as food and nutritional security by being one of the main sources of diversity for the development of improved crop varieties. …”
Get full text
Article -
5440
Smart Predictor for Spontaneous Combustion in Cotton Storages Using Wireless Sensor Network and Machine Learning
Published 2024-01-01“…In the last decade, a variety of new techniques and tools are proposed to monitor storage areas, which provide more safe and secure storage for different crops. The term storage area monitoring is supposed to check and avoid fire hazards, whereas numerous other hazards also need attention. …”
Get full text
Article