Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6001
-
6002
-
6003
Permanent aquifer storage loss from long-term groundwater withdrawal: A case study of subsidence in Bandung (Indonesia)
Published 2025-02-01“…Our study is one of the first examples of using satellite data with geomechanical models to constrain groundwater extraction rates and emphasises the importance of remote sensing data in groundwater resource management, and the irreversible impact of unsustainable groundwater extraction, which has implications for long term water security. New Hydrological Insights for the Region: The study found that continued industrial groundwater extraction has resulted in permanent aquifer storage loss, with significant implications for long-term water security. …”
Get full text
Article -
6004
Relations Between the Holy See and Lithuania: A 100-Year History
Published 2024-11-01“…Although the reestablishment of the independent State of Lithuania being based on the continuation of the State’s identity opened door for securing the validity of the Concordat concluded by the Holy See and the Republic of Lithuania in 1927, it was no longer capable of reflecting new realities, and new fundamental changes required the conclusion of new treaties between the parties. …”
Get full text
Article -
6005
Multi‐objective multiperiod stable environmental economic power dispatch considering probabilistic wind and solar PV generation
Published 2024-12-01“…Abstract The economic‐environmental power dispatch (EEPD) problem, a widely studied bi‐objective non‐linear optimization challenge in power systems, traditionally focuses on the economic dispatch of thermal generators without considering network security constraints. However, environmental sustainability necessitates reducing emissions and increasing the penetration of renewable energy sources (RES) into the electrical grid. …”
Get full text
Article -
6006
-
6007
-
6008
The U.S. Assistance to the MENA Arab Countries under the Trump Administration: The Logic of a Diff erentiated Approach
Published 2020-12-01“…The assistance to Cairo and Amman is ringfenced and protected, while aid to other recipients, including security assistance and FMF grants, is prone to quite drastic cuts. …”
Get full text
Article -
6009
-
6010
Occult hepatitis B virus infection: risk for a blood supply, but how about individuals’ health?
Published 2025-03-01Get full text
Article -
6011
Financial Innovations and Financial Inclusion Among Commercial Banks in Uganda: Case Study Of Kabale District.
Published 2023“…As more clients choose mobile banking, the report advises banking institutions to develop measures to improve security in the platform. The report also advises making these platforms straightforward and simple to use in order to attract more users to the business. …”
Get full text
Thesis -
6012
The Contribution of Micro Finance Institutions on the Growth of Small and Medium Business : A Case Study of North Kigezi Diocese Sacco In Rukungiri Municipality.
Published 2023“…Findings from the study established that the requirements for accessing credit services from North Kigezi SACCO by small-scale enterprises include; collateral security, being an active member, Local Council letter, and having guarantor, among other requirements. …”
Get full text
Thesis -
6013
Effective Facial Expression Recognition System Using Artificial Intelligence Technique
Published 2024-12-01“…Recognizing these facial expressions accurately is essential for a variety of applications — such as tools that use our faces to interact with computers (human-computer interaction, or HCI), security systems and emotionally intelligent artificial intelligence technologies. …”
Get full text
Article -
6014
A multi-model feature fusion based transfer learning with heuristic search for copy-move video forgery detection
Published 2025-02-01“…If original content is not accessible, then the forgery recognition technique is employed in image security. In contrast, methods that depend on deep learning (DL) have exposed good performance and suggested outcomes. …”
Get full text
Article -
6015
Population Shrinkage and Spatio-Temporal Changes in Cultivated Land Use Efficiency in China’s Agro-Pastoral Ecotone
Published 2025-01-01“…Revealing the level of cultivated land use efficiency and its influencing factors in the northern agro-pastoral ecotone from the perspective of population contraction can provide a decision-making reference for ensuring national food security and promoting the implementation of rural revitalization strategies. …”
Get full text
Article -
6016
The Impact of Artificial Intelligence on Healthcare: A Comprehensive Review of Advancements in Diagnostics, Treatment, and Operational Efficiency
Published 2025-01-01“…However, there are major obstacles to the mainstream implementation of AI in healthcare, including issues with data security and budget constraints. Conclusion Healthcare may be transformed by AI, but its successful use requires ethical and responsible use. …”
Get full text
Article -
6017
Belonging to the Land in Tura: Reforms, Migrations, and Indentity Politics in Evenkia
Published 2014-06-01“…In the long course of reforms and identity construction, the indigenous intelligentsia has manipulated the concept of belonging to the land either to stress or to erase cultural differences, and thus, to secure the access of the local elite to valuable resources. currently, the most hotly debated boundaries are those dividing Evenks into local and migrant, authentic and unauthentic, urban and rural. …”
Get full text
Article -
6018
« Pieds Noirs Rythmes : un orchestre de détenus OAS dans le “Sing-Sing” français »
Published 2016-01-01“…From 1962 to 1968, several hundreds of activist members of the OAS (Organisation of the Secret Army), i.e. partisans of a French Algeria, were condemned to be incarcerated in the barracks of Thoiras, a maximum-security prison located near the citadel of Saint-Martin-de-Ré. …”
Get full text
Article -
6019
Comme une aiguille sur un sillon d’asphalte
Published 2021-12-01“…Through his work with skateboarders in Tokyo, the author shows how the search for spots - places that are good for skating - and the observation of security measures transform the skaters' perception of their environment. …”
Get full text
Article -
6020
A density clustering-based network performance failure big data analysis algorithm
Published 2020-09-01“…Facing frequent network security incidents,how to quickly find abnormal data in massive monitoring database and carry out network failure analysis becomes a research difficulty.A density-based network performance failure big data analysis algorithm was proposed,which extracted key performance characteristic indicators through entropy weight analysis,implemented data shaping through data cleaning and standardization,and extracted abnormal performance data on the basis of DBSCAN clustering algorithm.Relying on the real-time massive backbone network link performance data of multiple domestic operators to validated this algorithm,the results shows that compared with the manually manner,the recognition accuracy of the algorithm proposed to the network performance abnormal data is more than 90%,which can well fit for the analysis of real-time Internet network operation failure.…”
Get full text
Article