Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6641
Implementation of Peer-Led Seeking Safety for Women in Jail
Published 2025-01-01“…We describe several “lessons learned” related to the jail context, including structure and security processes and vicarious and retraumatization experiences among facilitators. …”
Get full text
Article -
6642
Hierarchical Aggregation for Federated Learning in Heterogeneous IoT Scenarios: Enhancing Privacy and Communication Efficiency
Published 2025-01-01“…To this end, this paper designs a hierarchical federated-learning framework for heterogeneous IoT systems, focusing on enhancing communication efficiency and ensuring data security through lightweight encryption. By leveraging hierarchical aggregation, lightweight stream encryption, and adaptive device participation, the proposed framework provides an efficient and robust solution for federated learning in dynamic and resource-constrained IoT environments. …”
Get full text
Article -
6643
Artificial intelligence techniques for stability analysis in modern power systems
Published 2024-12-01“…Effective stability analysis is essential for the secure operation of modern power systems. As smart grids evolve with increased interconnection, renewable energy integration, and electrification, the large-scale deployment of ultra-high voltage AC/DC networks introduces various operational modes and potential fault points, posing significant challenges to maintaining stability. …”
Get full text
Article -
6644
Good governance based on service information system applications administration population via smartphones
Published 2023-12-01“…If applied to an application platform that manages population administration services, the principles of Good Governance can secure the smooth running of these services, in line with the needs of the community. …”
Get full text
Article -
6645
Strategies for Implementing Building Operability Certificate to Improve Performance of Building Management: A Case Study in Probolinggo City, Indonesia
Published 2024-01-01“…The building operability certificate concerns occupants’ safety before the building is used and is directed by Law Government Regulation 16 of 2021 for building security. This article discusses implementing a building operability certificate underperforming and the strategy for implementing the building operability certificate (SLF) policy. …”
Get full text
Article -
6646
Agricultural support policies and GHG emissions from agriculture in Latin America: relationships and policy implications for climate change
Published 2023-11-01“…Domestic support policies for farmers and agriculture, through their price effect, have been deemed potentially environmentally harmful; for example, in developing countries, agricultural prices have been set- below the world market prices, aiming to secure low retail prices for urban consumers. This practice has lowered producer prices, and thereby prevented farmers from adopting ecofriendly production techniques. …”
Get full text
Article -
6647
Optimal configuration of dynamic VAR compensators considering uncertainty and correlation
Published 2024-11-01“…Simulation studies in the modified New England 10‐machine 39‐bus system show the proposed method can ensure transient voltage security of the studied power system under source‐load uncertainty.…”
Get full text
Article -
6648
Simplified Technique for Sealing Corneal Perforations Using a Fibrin Glue-Assisted Amniotic Membrane Transplant-Plug
Published 2014-01-01“…An amniotic membrane patch was placed over the plug, which was then secured by a bandage contact lens. Result. Surgery to restore corneal stromal thickness without recurrence of perforation. …”
Get full text
Article -
6649
Quantile and interquantile regression models for returns to education by economic sector and vulnerable population in Colombia
Published 2024-12-01“…Traditional Mincerian socioeconomic variables such as gender, experience, hours worked, marital status, relationship with the head of the household, and social security affiliation, were controlled for. Results show that while there is a positive effect between educational level and income in all economic sectors studied, this relationship varies in magnitude and form along the wage distribution.…”
Get full text
Article -
6650
Ring Oscillators with Additional Phase Detectors as a Random Source in a Random Number Generator
Published 2024-12-01“…This feature enhances the security of the produced sequences, as eavesdroppers are unable to observe the continuous random bit generation process, such as through monitoring power lines. …”
Get full text
Article -
6651
An Image Encryption Algorithm Based on the Improved Sine-Tent Map
Published 2021-01-01“…The correlation of the ciphertext image pixels is very low, and the algorithm is highly secure as a conclusion.…”
Get full text
Article -
6652
Enhancing e-government in digital transformation: integrating archive management and digital solutions in Pekanbaru, Indonesia
Published 2024-08-01“…The study's results identified challenges to SRIKANDI implementation, including inadequate technological infrastructure, the need for skilled human resources in information technology, attention to data security, changes in organizational culture, and ongoing technical support. …”
Get full text
Article -
6653
Estimation of Tabriz population based on exponential and logistic growth models for water scarcity analysis
Published 2024-12-01“…In addition, by using this method, it is possible to better plan for the future of this city in terms of water scarcity, water demand and consumption, and water security. The used method can be applied to other cities and regions to predict the population numbers and to assess water scarcity.…”
Get full text
Article -
6654
Stretchable and body conformable electronics for emerging wearable therapies
Published 2025-01-01“…Furthermore, the article delineates the crucial characteristics of wearable therapeutic devices, such as biocompatibility, secure skin attachment, and effective moisture management. …”
Get full text
Article -
6655
Modeling the Risks of Blockchain Development in Improving the Resilience of the Medical Equipment Supply Chain
Published 2024-10-01“…Hence, 10 main political and governmental risks, reliability, service, profitability, security, networking, organizational issues, privacy, social issues, environmental effects were identified and the risks were ranked based on fuzzy BWM and political and governmental risks They ranked first with a weight of 0.26, reliability ranked second with a weight of 0.15, and profitability ranked third with a weight of 0.127..…”
Get full text
Article -
6656
THE STRUCTURE OPTIMIZATION AND ANALYSIS OF THE SEMI-AUTOMATIC RAIL-MOUNTED BILATERAL CASTING MACHINE
Published 2016-01-01“…The study has reduced vibration and improved work stability. Its working security was determined through stress and deformation analysis of casting ladle support system. …”
Get full text
Article -
6657
Adaptive message sending rate control method based on channel congestion cost calculation in VANET
Published 2016-10-01“…In VANET,sending beacon messages reliably played a vital role in cooperative awareness and collision avoidance,and changes of vehicle density in real traffic environment had a direct impact on channel load and will cause the channel congestion to a certain degree,thus causing inefficiency of cooperative security applications.Aiming at this issue,a adaptive method based on channel congestion detection to control message sending rate was designed.First of all,an interference model that can accurately reflect the current state of the channel was established.Secondly,according to the Shannon information theory and network utility maximization theory,the optimal transmission speed of the current node in the physical layer was calculated.Finally,according to the mismatch of transmission rate and transmission queue length,the next moment's cost function of the channel congestion degree by monitoring the message queue was established to avoid channel congestion and queue overflow.The simulation experiment shows that the scheme effectively reduces communication transmission delay and avoids channel congestion,ensuring that the data be sent reliably.…”
Get full text
Article -
6658
Condition Recognition of High-Speed Train Bogie Based on Multi-View Kernel FCM
Published 2019-03-01“…Monitoring the operating status of a High-Speed Train (HST) at any moment is necessary to ensure its security. Multi-channel vibration signals are collected by sensors installed on bogies and beneficial information are extracted to determine the running condition. …”
Get full text
Article -
6659
Exploring the possibilities of using cryptocurrencies in production in creative industries
Published 2024-06-01“…One of the advantages of applying this type of currency is the ability to conduct fast and secure financial transactions without the involvement of intermediaries. …”
Get full text
Article -
6660
DEVELOPMENT OF SALARY CARDS IN THE SYSTEM OF CASHLESS PAYMENTS IN CONDITIONS OF FINANCIAL INSTABILITY ON THE EXAMPLE OF SBERBANK OF RUSSIA
Published 2020-09-01“…As a result, the main directions for the development of salary projects have been proposed, including the definition of incentive provisions for their application, ensuring security, confidence in salary projects and contactless payment, regulating the risk of occurrence of accounts payable and accounts receivable between business entities, the need to modernize individual banking service, formation of innovative salary cards.…”
Get full text
Article