Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5521
Farm gate profitability of organic and conventional farming systems in the tropics
Published 2024-12-01“…In instances where premium prices for non-cash crops are secured, their profitability can even surpass that of cash crops. …”
Get full text
Article -
5522
Accelerating Deep Learning-Based Morphological Biometric Recognition with Field-Programmable Gate Arrays
Published 2025-01-01“…This dependency on internet connectivity increases bandwidth consumption and fails to meet the required security criteria, contrary to ZYBO-Z7 board hardware programming. …”
Get full text
Article -
5523
Evaluation of EGFR-TKIs and ICIs treatment stratification in non-small cell lung cancer using an encrypted multidimensional radiomics approach
Published 2025-01-01“…Conclusion The proposed method effectively balances the level of evidence with privacy protection, enhancing the study’s validity and security. Therefore, radiomics biomarkers are expected to complement molecular biology analyses and guide therapeutic strategies for EGFR-TKIs, ICIs, and their combinations.…”
Get full text
Article -
5524
Toward 6G: An Overview of the Next Generation of Intelligent Network Connectivity
Published 2025-01-01“…Additionally, it identifies major challenges—such as advanced coding schemes, energy management, and security—and presents a roadmap for future research in these critical areas. …”
Get full text
Article -
5525
A novel and efficient digital image steganography technique using least significant bit substitution
Published 2025-01-01“…However, image-based steganography is a challenging task due to transparency, security, computational efficiency, tamper protection, payload, etc. …”
Get full text
Article -
5526
Exploring the Landscape of Programming Language Identification With Machine Learning Approaches
Published 2025-01-01“…The increasing complexity of modern software development necessitates tools and methodologies for code analysis, maintenance, and migration in multi-language Integrated Development Environments (IDEs). The security needs of the software development process also recently led to the introduction of the Software Bill of Materials (SBOM), which vendors must include in their products. …”
Get full text
Article -
5527
The impact of a water promotion and access intervention on elementary school students in the presence of food insecurity
Published 2025-01-01“…However, students with child food insecurity (CFI) may not respond to nutrition interventions like children who are food-secure. Design: The Water First cluster-randomised trial found that school water access and promotion prevented child overweight and increased water intake. …”
Get full text
Article -
5528
Does climate-smart agriculture technology improve farmers' subjective well-being? Micro-level evidence from Odisha, India
Published 2025-01-01“…Since the global population is expected to reach 9.7 billion by 2050, food production must increase by 70% in the next 30 years to provide food security in the face of climate change. Implementing climate-smart agriculture technology (CSAT) is essential for ensuring food security and promoting economic growth in the context of sustainable agriculture. …”
Get full text
Article -
5529
Treatment of Spontaneous Subarachnoid Hemorrhage: A 20‐Year National Inpatient Sample Review
Published 2025-01-01“…Patients undergoing surgery to secure an aneurysm were more severely ill through time yet experienced a stable hospital mortality rate.…”
Get full text
Article -
5530
SYN flood attack defense strategy for asymmetric routing
Published 2013-08-01“…In order to resolve the problem that existing network security facilities can't defend against large-scale SYN flood attack under asymmetric routing environment, attack detection technology and connection management strategy were researched, and a defense architecture combining a light-weight detection method with a hierarchical connection management strategy was presented. …”
Get full text
Article -
5531
Integral attack on HIGHT block cipher
Published 2016-07-01“…The security of HIGHT block cipher under integral attack was studied. …”
Get full text
Article -
5532
ASSESSMENT OF THE CREDIT HISTORY OF ENTERPRISES
Published 2017-12-01“…In the framework of this study, it was assumed that the creditworthiness of agrarian enterprises involves the following four factors which are subject to the assessment: the credit history of the enterprise, its financial status, business plan and the adequacy of the security (the subject of the mortgage). This article describes the results of the assessment of the credit history of the enterprise. …”
Get full text
Article -
5533
Meet-in-the-middle attacks on FOX block cipher
Published 2016-08-01“…The security of the block cipher FOX against meet-in-the-middle attack was analyzed.Firstly,3-round meet-in-the-middle distinguishers was constructed and 6-round meet-in-the-middle attacks for FOX64 and FOX128 was proposed.The two attacks were beter attacks for 6-round FOX64 and FOX128,respectively.Secondly,the meet-in-the-middle distinguisher was extended of FOX128 to 4 rounds and proposed 7-round meet-in-the-middle attack combined with time/memory/data tradeoff.Compared to the currently known attacks on 7-round FOX128,The attack has a greater time and memory complexity,however the data complexity is much smaller.…”
Get full text
Article -
5534
Bedřich ze Strážnice a husitské posádky ve Slezsku
Published 2020-12-01“…In Silesia, the priest Bedřich of Strážnice helped to transform the system operating among the garrisons in Central and South Moravia, including the collection of food in the form of tributes, obtaining the spoils of war, supplying through the convoys sent from the Hussite domain, and the cooperation with local elites. At the same time, securing supplies determined the main features of military operations. …”
Get full text
Article -
5535
Dynamic hierarchical quantum information sharing protocol
Published 2016-12-01“…Quantum secret sharing (QSS) is one important branch of quantum cryptography.Based on the studies of multi-shared quantum bits,a new dynamic quantum bit sharing protocol was proposed.The participation of the shared members is hierarchical in this protocol.The quantum information leader,in the absence of the establishment of a new quantum channel,can remove some of the participants in the secret reconstruction system.After the layoffs,the leader can also update the quantum information using quantum operations,and the remaining effective partici-pants can recover the new quantum information without performing additional operations.In addition,the correct-ness,security and the hierarchy of the participants of the protocol were discussed.…”
Get full text
Article -
5536
Application of fuzzy modeling in the evaluation of crisis state of enterprises
Published 2019-04-01“…In the model of a fuzzy assessment of the crisis state of enterprises, the following input linguistic variables have been highlighted: the relative level of financial status, the probability of bankruptcy, the level of information security, the level of innovation potential. The terms of the input variables and the result variable have been described. …”
Get full text
Article -
5537
Research and Application of the Key Part Design Method of Minor Double Input Planetary Gear Reducer
Published 2017-01-01“…Through analysis of the result,when the condition cannot meet the strength requirement by using general mechanical design method,the theoretical security coefficient calculated by using the disposable mechanical design method is 3. 96 under the same conditions. …”
Get full text
Article -
5538
A Novel Image Encryption Algorithm Based on DNA Subsequence Operation
Published 2012-01-01“…The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.…”
Get full text
Article -
5539
Introducing the Citizen’s Income (Bürgergeld): Making Bold Changes
Published 2022-02-01“…The reform of the in-work benefit element should aim at supporting sustainable employment subject to social security contributions. However, to live up to its name, the citizen’s income must ensure genuine social participation for those receiving the citizen’s income.…”
Get full text
Article -
5540
AN APPROACH HYBRID RECURRENT NEURAL NETWORK AND RULE-BASE FOR INTRUSION DETECTION SYSTEM
Published 2019-06-01“…Network intrusion detection is one of the most important issues of network security and is a research interest of many researchers. …”
Get full text
Article