Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6401
An Overview of Global Wheat Market Fundamentals in an Era of Climate Concerns
Published 2017-01-01“…In addition to gradually and consistently increasing global wheat demand, these market drivers are posited to impact world prices and, ultimately, food security. To investigate how these factors differentially influence wheat markets, an extensive survey of literature regarding wheat market fundamentals was conducted, as well as a trend analysis using a uniquely compiled data set specific to significant wheat-producing areas. …”
Get full text
Article -
6402
Self-Adaptive Firefly-Algorithm-Based Unified Power Flow Controller Placement with Single Objectives
Published 2021-01-01“…The selection of positions for unified power flow controller (UPFC) placement in transmission network is an essential factor, which aids in operating the system in a more reliable and secured manner. This paper focuses on strengthening the power system performance through UPFC placement employing self-adaptive firefly algorithm (SAFA), which selects the best positions along with parameters for UPFC placement. …”
Get full text
Article -
6403
Multiscale Structural Health Monitoring of Cable-Anchorage System Using Piezoelectric PZT Sensors
Published 2013-11-01“…Structural health monitoring of the cable-anchorage system is very important to secure the integrity of the cable-stayed bridge. The cable-anchorage system carries most of the self-weight, so that any damage in the system may significantly reduce the load carrying capacity of the bridge. …”
Get full text
Article -
6404
Signal Processing Techniques for Through-Wall Object Imaging Using UWB Antipodal Vivaldi Antenna
Published 2024-12-01“…Through-wall imaging (TWI) is a critical application in various domains, including security, surveillance, search and rescue, and structural assessment. …”
Get full text
Article -
6405
Video Multiple Watermarking Technique Based on Image Interlacing Using DWT
Published 2014-01-01“…Digital watermarking is one of the important techniques to secure digital media files in the domains of data authentication and copyright protection. …”
Get full text
Article -
6406
Newly Licensed RNs Describe What They Like Best about Being a Nurse
Published 2011-01-01“…Five themes emerged: “providing holistic patient care,” “having an autonomous and collaborative practice,” “using diverse knowledge and skills to impact patient outcomes,” “receiving recognition,” and “having a job that is secure and stimulating.” Strategies are discussed that organizations might employ in helping NLRNs to realize what they best like about their work, which might lead to improved retention rates.…”
Get full text
Article -
6407
Research on the Heat Dissipation Characteristics of Lithium Battery Spatial Layout in an AUV
Published 2016-01-01“…The lithium battery heat dissipation properties not only affect the underwater vehicle performance but also bring some security risks. Based on the widespread application of lithium batteries, lithium batteries in an AUV are taken as an example to investigate the heat dissipation characteristics of the lithium battery spatial layout in an AUV. …”
Get full text
Article -
6408
Support Vector Machine for Behavior-Based Driver Identification System
Published 2010-01-01“…Since human driving behaviors belong to a dynamic biometrical feature which is complex and difficult to imitate compared with static features such as passwords and fingerprints, we find that this novel idea of utilizing human dynamic features for enhanced security application is more effective. In this paper, we first describe our experimental platform for collecting and modeling human driving behaviors. …”
Get full text
Article -
6409
Possibilities in Blockchain technology application
Published 2023-01-01“…The paper represents a comprehensive review of possibilities in Blockchain technology application in contemporary business environment, its benefits and shortcomings as well as security problems appearing in theory and practice. …”
Get full text
Article -
6410
Nano colonies: Rearing honey bee queens and their offspring in small laboratory arenas
Published 2025-01-01“…The process creates a bridge between field research and laboratory trials and provides a secure system for contagious or regulated elements while maintaining many of the intrinsic characteristics of a honey bee colony.…”
Get full text
Article -
6411
Jurisprudential Welfare Through the Transformation of the “Rendang-Mu” Qurban Meat Management System
Published 2024-12-01“…The findings indicate that the Rendang-Mu Program represents a transformation in the pattern of meat management and distribution, implementing a system of qurban meat management through canning and packaging with three essential benefits that facilitate and enhance its utility: (1) prolonged consumption and distribution over an extended period, (2) practical, delicious, and nutritious, (3) more evenly distributed reach, (4) high flexibility in achieving community food security, and (5) compliance with Islamic law.…”
Get full text
Article -
6412
Indigenous Identity in the Global Sustainable Project
Published 2025-02-01“…Developing countries can secure funding from developed countries to preserve their forests. …”
Get full text
Article -
6413
New Artificial Urinary Sphincter Devices in the Treatment of Male Iatrogenic Incontinence
Published 2012-01-01“…Recently three more sphincter devices, the Flow-Secure, the Periurethral Constrictor, and the ZSI 375, have been developed and presented in the market. …”
Get full text
Article -
6414
Blending Static and Dynamic Analysis for Web Application Vulnerability Detection: Methodology and Case Study
Published 2025-01-01“…Our approach was able to confirm either as a vulnerability or a false alarm 76.7% of the results reported by the SA, decreasing tremendously the usual need for manual work, which is a huge improvement for security practitioners.…”
Get full text
Article -
6415
Increasing the level of self-esteem in adolescent children through art therapy
Published 2020-10-01“…An additional effect and guarantee of securing performance will be if a teenager after art therapy turns artistic activity into a hobby. …”
Get full text
Article -
6416
Public acceptance in direct potable water reuse: a call for incorporating responsible research and innovation
Published 2024-12-01“…However, the successful implementation of Direct Potable Water Reuse (DPR) projects hinges on securing public acceptance, which remains challenging. …”
Get full text
Article -
6417
Obesity and overweight among the poor and marginalized in rural Mexico: impact analysis of the effect of school breakfasts on children aged five to eleven
Published 2023-05-01“…These findings highlight the need for a more comprehensive school breakfast program, that is connected to the food and nutritional security approach and is designed and implemented according to each Mexican region’s specific alimentary requirements and socioeconomic needs.…”
Get full text
Article -
6418
Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing
Published 2014-01-01“…However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features. …”
Get full text
Article -
6419
Diversity at Landscape Level to Increase Resilience. A Review
Published 2023“…Hence, building on these insights, diversity at landscape level is paramount to promoting resilient livelihoods as a means of improving the health and functioning of socio-ecological systems, as well as a mechanism for achieving food security. The study concludes that there should be involving many actors in a landscape management aspect to stimulate knowledge exchange and training.…”
Get full text
-
6420
Development and Implementation of a Healthcare Resource Allocation System: A Case Studay of Rugarama Hospital.
Published 2024“…Key features include real-time resource allocation, secure user authentication, and an intuitive interface. …”
Get full text
Thesis