Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5721
Food Insecurity and Obesity
Published 2017-05-01“…It is important that the coexistence of food insecurity and obesity is well understood so that community outreach programs and interventions can continue to be implemented in order to improve food security by increasing access to affordable, healthy foods and promoting good health nationwide. …”
Get full text
Article -
5722
Le suicide, une pathologie carcérale ?
Published 2018-05-01“…The failure of prevention, as demonstrated by prison statistics, thus appears to be inherent to the methods used: the straitjacket, security isolation cells, and the training of prison guards in techniques of resuscitation. …”
Get full text
Article -
5723
Ballot initiatives and the national debate on immigration
Published 2012-01-01“…As of 1996 new laws related to immigration and access to welfare benefits followed the main guidelines of Proposition 187; since the 9-11 attacks national security has become the main axis of immigration laws. …”
Get full text
Article -
5724
Précarité alimentaire et pratiques informationnelles des étudiant·e·s
Published 2023-10-01“…Four categories were identified: food secure, mildly food insecure, moderately food insecure and severely food insecure. …”
Get full text
Article -
5725
Design and Implementation of Software-Based Simulator for Performance Evaluation of Transmission Protocol
Published 2014-03-01“…We propose a method of software-based transmission protocol simulation for the establishment of ubiquitous infrastructure as a method of securing reliability of a ubiquitous sensor network (USN), which is an important element of ubiquitous infrastructure establishment. …”
Get full text
Article -
5726
Trucking, Owner-Operators, and Florida Perishables
Published 2005-04-01“…In this report, we examine the extent to which owner-operators have been able to maintain their share of Florida's produce/ornamentals haulage and their dependence upon larger carriers to secure loads. his is EDIS document, FE543, a publication of the Department of Food and Resource Economics, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida, Gainesville, FL. …”
Get full text
Article -
5727
Trucking, Owner-Operators, and Florida Perishables
Published 2005-04-01“…In this report, we examine the extent to which owner-operators have been able to maintain their share of Florida's produce/ornamentals haulage and their dependence upon larger carriers to secure loads. his is EDIS document, FE543, a publication of the Department of Food and Resource Economics, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida, Gainesville, FL. …”
Get full text
Article -
5728
Estimating Time-Varying Beta of Price Limits and Its Applications in China Stock Market
Published 2013-01-01Get full text
Article -
5729
Partition Resolvability of Nanosheet and Nanotube Derived from Octagonal Grid
Published 2024-01-01Get full text
Article -
5730
The global energy challenge: second-generation feedstocks on marginal lands for a sustainable biofuel production
Published 2025-01-01“…Biofuels represent a renewable source of energy, but their production has raised concerns regarding their possible impacts on food security. Indeed, the current biofuel production primarily relies on food crops and arable lands. …”
Get full text
Article -
5731
Design a Robust DDoS Attack Detection and Mitigation Scheme in SDN-Edge-IoT by Leveraging Machine Learning
Published 2025-01-01“…However, the complexity of IoT networks, with their resource-constrained devices, presents substantial security challenges, particularly Distributed Denial of Service (DDoS) attacks. …”
Get full text
Article -
5732
Person-based design and evaluation of MIA, a digital medical interview assistant for radiology
Published 2024-08-01“…The Q&A module achieved a precision of 0.51, a recall of 0.87 and an F-Score of 0.64 based on 114 questions asked by the participants. Security and accessibility also require improvements.ConclusionThe applied person-based process described in this paper can provide best practices for future development of medical interview assistants. …”
Get full text
Article -
5733
Data privacy preservation for the search of Internet of things based on fine-grained authorization
Published 2017-01-01“…Secondly, the scheme of data privacy preservation for the search of Internet of things based on fine-grained authorization was pro-posed, which combined the encrypted search algorithm with the attribute based access control algorithm. Thirdly, the security analysis and performance analysis of the scheme were also carried out. …”
Get full text
Article -
5734
Marketing analysis of the technological equipment market for the Russian logging industry
Published 2021-08-01“…The directions of further development of forest engineering and the entire forest complex of Russia based on import substitution and ensuring the economic and technological security of Russia are substantiated.…”
Get full text
Article -
5735
HYGIENIC EVALUATION OF ENVIRONMENTAL INFLUENCE ON THE HEALTH OF CHILDREN FROM RURAL REGIONS OF SOUTHERN UKRAINE
Published 2017-03-01“…The program of preventive measures in areas with low environmental security should include correction of food, providing drinking water quality and regulatory measures on hygienic education of the children’s population.…”
Get full text
Article -
5736
Next generation IP network test system framework based on microservices architecture
Published 2019-09-01“…The next generation IP network is a new type of public network.It integrates wire and wireless,broad-band and narrow-band,transmit and receive,passive and active,which leads to the diverse and complex service scenarios.However,different scenario has different needs and standards,and there remains gaps with the current techniques,protocols and standards.In order to ensure the completeness and security of all kinds of techniques and facilities in the new application scenarios,and the upcoming new characteristics in the process of network development,a comprehensive test system framework needs to be established.The next generation IP network test framework based on micro services architecture was proposed,combined with different new application characteristics,which provided support for the development of network technology.…”
Get full text
Article -
5737
FACTORS INFLUENCING ENTREPRENEURIAL INTENTIONS OF STUDENTS SPECIALIZING IN THE TOURISM INDUSTRY
Published 2016-12-01“…On the tendency to create new business positively affect entrepreneurial values of significant groups, the belief in the ability to provide their personal (psychological) and social security, as well as entrepreneurship education.…”
Get full text
Article -
5738
Efficient distributed model sharing strategy for data privacy protection in Internet of vehicles
Published 2022-04-01“…Aiming at the efficiency problem of privacy data sharing in the Internet of vehicles (IoV), an efficient distributed model sharing strategy based on blockchain was proposed.In response to the data sharing requirements among multiple entities and roles in the IoV, a master-slave chain architecture was built between vehicles, roadside units, and base stations to achieve secure sharing of distributed models.An asynchronous federated learning algorithm based on motivate mechanism was proposed to encourage vehicles and roadside units to participate in the optimization process.An improved DPoS consensus algorithm with hybrid PBFT was constructed to reduce communication costs and improve consensus efficiency.Experimental analysis shows that the proposed mechanism can improve the efficiency of data sharing and has certain scalability.…”
Get full text
Article -
5739
The Performance of LBP and NSVC Combination Applied to Face Classification
Published 2016-01-01“…The growing demand in the field of security led to the development of interesting approaches in face classification. …”
Get full text
Article -
5740
Attribute-based authenticated key agreement protocol supporting revocation
Published 2014-05-01“…The protocol is provably secure in the standard model and modified ABCK model. …”
Get full text
Article