Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6681
The Social Construction of Financial Accountability in Government and Parliament Discourses
Published 2021-05-01“…Thus, in each paradigm, dominant discourses formed with context, and by highlighting themselves and marginalizing rival discourse, they succeeded in securing a temporary centralized sign and a new articulation of the semantic system of financial accountability.…”
Get full text
Article -
6682
Cooperative UAV Scheduling for Power Grid Deicing Using Fuzzy Learning and Evolutionary Optimization
Published 2025-01-01“…Icing is one of the most serious threats to power grid security in cold seasons. This article studies a problem of cooperatively scheduling inspection unmanned aerial vehicles (UAVs) and deicing UAVs for power grid deicing, the aim of which is to minimize the total expected loss of outages and collapses caused by the icing disaster. …”
Get full text
Article -
6683
Integrated systems approach to enhance rural development: word2vec analysis
Published 2025-12-01“…Rural development plays a pivotal role in global efforts to eradicate extreme poverty, ensure food security, and create sustainable livelihoods. Existing research shows a lack of comprehensive understanding of the interconnections among various systems and subsystems within a rural ecosystem. …”
Get full text
Article -
6684
Zvezda Shipyard Project: Global Implications and Its Influence on the Russian Economy
Published 2024-04-01“…This strategy addresses both socio-economic goals and defense and security challenges. Additionally, the paper provides quantitative analyses of the multiplicative effects generated by the Zvezda Shipyard project's realization.…”
Get full text
Article -
6685
Study on the Influence of Tectonic Stress on Stability of Horseshoe-Shaped Tunnels
Published 2021-01-01“…The numerical model of the tunnel is built by FLAC3D, and the influence of the magnitude and direction of structural stress on the horseshoe-shaped tunnel is studied in detail. Finally, the security support of the tunnel is discussed. Results show that the stress concentration phenomenon is easily focused on the left, right, and bottom sides of the tunnel; these places should therefore be the focus of attention of tunnel stability analysis. …”
Get full text
Article -
6686
Optimal Scheduling of Multi-Energy Complementary Systems Based on an Improved Pelican Algorithm
Published 2025-01-01“…In recent years, the global power industry has experienced rapid development, with significant advancements in the source, network, load sectors, and energy storage technologies. The secure, reliable, and economical operation of power systems is a critical challenge. …”
Get full text
Article -
6687
Exploring the Functional Features of Melon Peel Flour for Healthier Bakery Products
Published 2024-12-01“…Based on these results, melon peel has the potential to improve global food security, nutrition, economic well-being, and overall health and well-being.…”
Get full text
Article -
6688
Energy Transition in Azerbaijan: Advantages of System Value Analysis and Strategic Role of the Global Climate Actors
Published 2024-12-01“…We argue that Azerbaijan's strategic engagement with the EU is crucial, as it serves as a means for Europe to bolster energy security and assist Azerbaijan in its political drive and strategy for transitioning to green energy. …”
Get full text
Article -
6689
The spillover effects of military spending across superpowers using the TVP - VAR approach
Published 2024-07-01“…The amount of money spent on military activities across superpowers globally has generally caused significant concerns regarding military conflicts, the arms race, economic growth development, security, political stability, and governance. This paper investigates the spillover effects of military spending among the world’s largest spenders on military activities over the period 1997 - 2022. …”
Get full text
Article -
6690
A platform for Bioengineering Tissue Membranes from cell spheroids
Published 2025-04-01“…To overcome this, we developed a method to assemble spheroids into a thin layer by using two mesh scaffolds to spread them evenly, and a solid frame with grid to secure the assembly. This allows the spheroids to fuse into a thin membrane-like tissue, allowing better medium diffusion during cell culture. …”
Get full text
Article -
6691
An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation
Published 2014-01-01“…Security and privacy issues present a strong barrier for users to adapt to cloud storage systems. …”
Get full text
Article -
6692
Quantum Particle Swarm Optimization Extraction Algorithm Based on Quantum Chaos Encryption
Published 2021-01-01“…The bit error rate and similarity coefficient of the voice signal are extracted by testing the source voice signal SA1, SA2, and SI943 under different SNR, and the similarity coefficient, uncertainty, and disorder of the observed signal and the source voice signal SA1, SA2, and SI943 verify the effectiveness of the proposed speech signal extraction method and the security of quantum chaos used in speech signal encryption.…”
Get full text
Article -
6693
New Locked-Wire-Type External Fixator (the Ichi-Fixator) for Fourth and Fifth Carpometacarpal Joint Dislocation
Published 2018-01-01“…Linked external wire-type fixation enables enhanced security of fixation, facilitates postoperative mobilization, and may allow an immediate return to work.…”
Get full text
Article -
6694
Fast Antinoise RFID-Aided Medical Care System
Published 2015-10-01“…We prove that our generated proof is reliable because it can resist most security threats and guarantee the integrity of the proof. …”
Get full text
Article -
6695
Machine Learning-Based Anomaly Prediction for Proactive Monitoring in Data Centers: A Case Study on INFN-CNAF
Published 2025-01-01“…Anomaly prediction in time series is crucial for ensuring the stability and security of data centers, especially in scientific contexts such as INFN-CNAF, the National Center for Research and Development in Information and Communication Technology of the National Institute for Nuclear Physics. …”
Get full text
Article -
6696
Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram
Published 2024-08-01“…Starting from five aspects—algorithm security, feasibility, privacy bias, data utility, and user experience, an indicator system was established. …”
Get full text
Article -
6697
Review of Digital Construction of UHV Projects Based on Building Information Modeling Technology
Published 2025-02-01“…As major national infrastructure projects, UHV projects are key to ensuring power grid security, promoting energy consumption, and optimizing resource allocation. …”
Get full text
Article -
6698
Interpersonal Cognitive Distortions: What is the Role of Childhood Trauma and Attachment?
Published 2023-10-01“…These findings provide evidence that childhood trauma, mediated by anxious attachment, might contribute to interpersonal cognitive distortions in adulthood. However, secure and avoidant attachment had no statistically meaningful direct impact on interpersonal cognitive distortions. …”
Get full text
Article -
6699
A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing
Published 2016-01-01“…Experiments show that our scheme is secure and feasible.…”
Get full text
Article -
6700
Evaluating Türkiye’s Influence in the Somali Peace Process: Positive or Negative Peace?
Published 2024-12-01“…The findings suggest that Türkiye’s multi-faceted engagement in Somalia (humanitarian aid, development cooperation, and security sector reform) generally aligns with the positive peace paradigm. …”
Get full text
Article