Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6661
An Enhanced Sine Cosine Algorithm for Feature Selection in Network Intrusion Detection
Published 2024-12-01“…For computer networks to remain secure, intrusion detection is essential. Analyzing network traffic data is part of this activity to spot possible cyber threats. …”
Get full text
Article -
6662
Challenges to patients’ rights during the COVID-19 pandemic: survey of public perceptions in North Macedonia
Published 2024-12-01“…Although 72.4% felt adequately informed about their care throughout all phases, just under half (47.6%) were aware of their healthcare and insurance rights and the procedures to secure them. Two-thirds (67.6%) reported that their autonomy was respected despite restrictive measures, and over 70% believed their privacy was maintained. …”
Get full text
Article -
6663
Binary Image Data Hiding Using Matrix Encoding Technique in Sensors
Published 2013-11-01“…It is very important to protect the copyright of digital images in wireless transmission, because people often use a smart phone in their daily life. Traditional security schemes are computationally expensive, and they introduce overhead, which shortens the life of the image sensors. …”
Get full text
Article -
6664
The role of agriculture in Nepal's economic development: Challenges, opportunities, and pathways for modernization
Published 2025-01-01“…These problems prevent agriculture from realizing its full potential to advance economic development, reduce poverty, and provide food security. Modernization requires increasing productivity through mechanization, expanding infrastructure, and improving market accessibility. …”
Get full text
Article -
6665
The KnowWhereGraph ontology
Published 2025-01-01“…These have been leveraged through the graph by a variety of applications to address challenges in food security and agricultural supply chains; sustainability related to soil conservation practices and farm labor; and delivery of emergency humanitarian aid following a disaster. …”
Get full text
Article -
6666
A Simple Chaotic Wien Bridge Oscillator with a Fractional-Order Memristor and Its Combination Synchronization for Efficient Antiattack Capability
Published 2021-01-01“…Such techniques improve the antiattack capability of the systems when used for secure communication.…”
Get full text
Article -
6667
Optimizing Credit Card Fraud Detection: A Genetic Algorithm Approach with Multiple Feature Selection Methods
Published 2024-12-01“…To protect our financial security, it is crucial to develop robust and accurate fraud detection systems that stay one step ahead of the fraudsters. …”
Get full text
Article -
6668
A fuzzy logic-based risk evaluation and precaution level estimation of explosive, flammable, and toxic chemicals for preventing damages
Published 2025-01-01“…Using the calculated risk value and the location of the chemical industry as input variables, precaution level can be determined. Security arrangements have been recommended based on the different precaution levels so that industries can take appropriate measures according to the calculated results. …”
Get full text
Article -
6669
Perspectives of Mediation as a Consensual Dispute Resolution Tool under the Convention on the Civil Aspects of International Child Abduction
Published 2024-01-01“…The authors justify the advantages of mediation with a view to secure the best interests of a child. In particular, mediation may facilitate more expedited return of a child when compared to court procedures as well as exert a positive impact on its emotional status. …”
Get full text
Article -
6670
Challenges and opportunities of artificial intelligence in African health space
Published 2025-01-01“…Ethical guidelines are needed to ensure AI decisions align with medical standards and patient autonomy. Strict privacy and security controls are crucial to protecting sensitive health data. …”
Get full text
Article -
6671
Identifying barriers in the field of electronic payments based on blockchain technology: A multi-criteria decision-making approach
Published 2024-08-01“…Some of these obstacles include technical, technological, organizational, financial and security problems. To identify and prioritize these obstacles and solve them, multi-criteria decision-making methods can be useful.In this research, in order to identify and rank the factors of obstacles related to electronic payments based on blockchain technology, the Delphi method has been used. …”
Get full text
Article -
6672
Digital Sociability: Implications of the COVID-19 Pandemic among Young Adults
Published 2025-01-01“…The results suggest that young people live ambiguously with the sense of security provided by social networks while feeling anxious about the judgment of others regarding their posts.…”
Get full text
Article -
6673
Extremism and Non-Development: Utilizing Sustainable Development as an Approach to Combat Extremism
Published 2024-03-01“…Today extremism and any type of violent activities based on extremist idea have been become to one of the most controversial Threats to international peace and security. Combating this phenomenon is not properly successful by responsive measure, so its recommended by International intuitions that anti-extremist measures need to utilize a comprehensive policy that encompass all dimension and related matters in addition to suppressive measures, the policy has to consider preventive one. …”
Get full text
Article -
6674
The potential of the municipality of Trstenik for the development of the wine tourism
Published 2024-01-01“…The results of the research are significant as they can assist tourism organization as well as municipal officials to make up a strategy for the development of wine tourism which would secure a significant position on the Serbian wine tourism map for the Trstenik wine district.…”
Get full text
Article -
6675
A Review of Ethnomedicinal Plants as Potential Anthelmintic Agents to Alternatively Control Gastrointestinal Nematodes of Ruminants in South Africa
Published 2024-01-01“…Small ruminant production is one of the most important animal productions for food security in the world, especially in the developing world. …”
Get full text
Article -
6676
The usability and technology acceptance of immersive virtual reality simulation for critical infrastructure workers
Published 2024-09-01“…Training is crucial for ensuring the safety, security, and efficiency of critical infrastructure systems and their employees. …”
Get full text
Article -
6677
Time-and-ID-Based Proxy Reencryption Scheme
Published 2014-01-01“…We prove that our scheme is semantically secure in the standard model.…”
Get full text
Article -
6678
THE EFFECT OF PRECIPITATION VARIABILITY AND CHANGE ON THE INCREASING DROUGHT RISK IN SOME CLIMATIC REGIONS IN SYRIA DURING THE PERIOD 1958-2018
Published 2024-12-01“…Descriptive statistical analysis with T-test was also used to compare the values of the drought index between the periods 1958-1988 and 1988-2018.Results showed increasing annual drought severity related to decreasing tendency in drought index values especially in spring and winter in all regions, and increment in extreme drought frequency versus diminishing frequency of extreme moisture.These changes to drier conditions in all studied regions will negatively affect water resources availability, agricultural production, and ecosystems stability and productivity, which threaten water and food security, and will Pose grand challenges to manage environmental resources in the future.…”
Get full text
Article -
6679
Energy Efficient Partial Permutation Encryption on Network Coded MANETs
Published 2017-01-01“…Mobile Ad Hoc Networks (MANETs) are composed of a large number of devices that act as dynamic nodes with limited processing capabilities that can share data among each other. Energy efficient security is the major issue in MANETs where data encryption and decryption operations should be optimized to consume less energy. …”
Get full text
Article -
6680
Optimizing Palm Oil Plantation Productivity Using Offline Blockchain and Drone Rover Solutions
Published 2024-12-01“…The offline blockchain securely stores this data, ensuring integrity and traceability. …”
Get full text
Article