Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6761
Suture Repair and Suspensory Button Fixation of Avulsion Fracture of the Fibular Styloid (Arcuate Fracture)
Published 2025-01-01“…If the fixation system is not sufficient to secure the various stabilities of the knee, it will fail and cause significant knee instability. …”
Get full text
Article -
6762
Analysis of solar photovoltaic module parks in Ukraine: Forecasting their further operation and end-of-life management
Published 2025-01-01“…The war in Ukraine has further underscored the importance of solar energy for the country’s energy security and resilience. However, with the majority of PV capacity installed only recently and with a finite lifespan, Ukraine will soon face significant volumes of decommissioned PV modules requiring processing, utilization, or reuse. …”
Get full text
Article -
6763
Nonexposure Accurate Location K-Anonymity Algorithm in LBS
Published 2014-01-01“…Experimental results show that our algorithms are more secure than the existent cloaking algorithms, need not have all the users reporting their locations all the time, and can generate smaller ASR.…”
Get full text
Article -
6764
Upaya Irlandia dalam Mengimplementasikan Renewable Energy Directive untuk Pemenuhan Energi Terbarukan 2030
Published 2023-07-01“…Penelitian ini menggunakan metode kualitatif, dengan menggunakan teori keamanan energi (energy security). Sumber data diperoleh dari studi terdahulu atau yang sering disebut kajian literatur atau kajian pustaka. …”
Get full text
Article -
6765
Seeking victims’ perspective on remedy: the case of Brasil Verde Farm’s workers
“…The workers’ narratives – collected through oral history methodology, during a fieldtrip to Piauí, in March 2016 –, help to overcome the ongoing debate on remedy studies related to the discourse of victims’ “wants and needs”, and reveal that any reparation measure that intend to promote social emancipation has to deal with the absences of the right to participation, security, adequate standards of living, health, adequate housing, education, and also access to land.…”
Get full text
Article -
6766
AFM-DViT: A framework for IoT-driven medical image analysis
Published 2025-02-01“…The AFM-DViT model offers an effective solution for secure and efficient medical image analysis in IoT-enabled environments.…”
Get full text
Article -
6767
Application of edge-cloud collaborative intelligence technologies in power grids
Published 2021-03-01“…With the continuous development of the Internet of things on electricity (IoTE) and large-scale deployment of intelligent edge devices, an explosively increasing amount of data are being generated at the network edge.The efficient, fast and secure processing and analysis of the massive edge located data brings great challenges for the traditional cloud computing-based intelligence technologies.Instead, edge-cloud collaborative intelligence (ECCI) technologies can significantly outperform the cloud computing-based intelligence in terms of the network bandwidth saving, delay reduction and privacy protection, and therefore have shown a great potential in boosting the development of power grids.To investigate the application of ECCI in power grids, the concept and research progress of ECCI were firstly introduced.The characteristics and advantages of ECCI were summarized and its applicability in the power grids were discussed.Secondly, the key technologies of ECCI applications for power grids were discussed and the solutions based on ECCI technologies for two typical scenes were proposed respectively.Finally, a brief discussion of future work was given.…”
Get full text
Article -
6768
Coordinative Discourse of Strategic Sovereignty Tilting the European Union’s Institutional Balance
Published 2022-11-01“…The article uses the cases of the EU industrial, trade policy, and the common security and defense policy to demonstrate the changing institutional balance.The results of the study show that the main institutional beneficiary of "strategic sovereignty" is the European Commission. …”
Get full text
Article -
6769
A Chromosome level assembly of pomegranate (Punica granatum L.) variety grown in arid environment
Published 2025-01-01“…Pomegranates can tolerate arid climates and are considered among the fruits that will play a major role in food security. However, the genomics resources of pomegranate growing in arid regions are scarce. …”
Get full text
Article -
6770
Ruling the streets: the policing of protest and political violence in Madrid during the Second Republic, 1931-1936
Published 2025-02-01“…The incoherent alternation of both repertoires followed politically motivated criteria and fostered an escalation of violence that increased the number of victims and obstructed the democratisation of the security apparatus. …”
Get full text
Article -
6771
Impact of Foreign Direct Investment in the Agricultural Sector on the Socio-Economic Development of Zambia Republic
Published 2024-12-01“…To address this problem, the Zambian Government has taken the path of promoting economic diversification, with agriculture being one of the most viable options due to its ability to create jobs, ensure food security and contribute to gross domestic product (GDP) by adding value and increasing output. …”
Get full text
Article -
6772
THE PREFERENCES OF CHOOSING TAXI-HAILING MODE ATTRIBUTES THROUGH THE BWS-CASE 1
Published 2024-03-01“…The results indicate that security and reassurance are the most crucial attributes when deciding this transportation mode, followed by accessibility. …”
Get full text
Article -
6773
Detection method of LDoS attack based on ACK serial number step-length
Published 2018-07-01“…Low-rate denial of service (LDoS) attack is a potential security threat to big data centers and cloud computing platforms because of its strong concealment.Based on the analysis of network traffic during the LDoS attack,statistical analysis was given of ACK packets returned by the data receiver to the sender,and result reveals the sequence number step had the characteristics of volatility during the LDoS attack.The permutation entropy method was adopted to extract the characteristics of volatility.Hence,an LDoS attack detection method based on ACK serial number step permutation entropy was proposed.The serial number was sampled and the step length was calculated through collecting the ACK packets that received at the end of sender.Then,the permutation entropy algorithm with strong time-sensitive was used to detect the mutation step time,and achieve the goal of detecting LDoS attack.A test-bed was designed and built in the actual network environment for the purpose of verifying the proposed approach performance.Experimental results show that the proposed approach has better detection performance and has achieved better detection effect.…”
Get full text
Article -
6774
An improved lightweight ConvNeXt for rice classification
Published 2025-01-01“…As a major food crop widely grown around the world, the seed type of rice plays a key role in ensuring food security and optimizing agricultural productivity. …”
Get full text
Article -
6775
The Sudan conflict: A catalyst for the spread of infectious diseases in displaced populations
Published 2025-02-01“…Timely, coordinated responses are essential to mitigate health risks and protect global health security. This crisis highlights the critical need for sustained efforts to safeguard public health in conflict zones.…”
Get full text
Article -
6776
From forensic chemistry: an educational experience
Published 2024-10-01“…In this way, it contributes to generating awareness about safety and security, ethics, and the professional responsibilities of chemists. …”
Get full text
Article -
6777
Linear gate bounds against natural functions for position-verification
Published 2025-01-01“…The scheme is feasible for a prover with linear classical resources and $O(1)$ quantum resources, and secure against sub-linear quantum resources.…”
Get full text
Article -
6778
Reconfigurable Antenna Assisted Intrusion Detection in Wireless Networks
Published 2013-10-01“…The results show that the proposed scheme can add an additional layer of security that can significantly alleviate many vulnerabilities and threats in current fixed wireless networks.…”
Get full text
Article -
6779
Japan’s Foreign Policy Shifting in 2022
Published 2024-07-01“…This article examines Japan's significant foreign policy changes in 2022, focusing on three crucial documents: the National Security Strategy (NSS), the National Defence Strategy (NDS), and the Medium-Term Defence Force Buildup Program (MTDP), issued on December 6, 2022. …”
Get full text
Article -
6780
Application of IoT and blockchain technology in the integration of innovation and industrial chains in high-tech manufacturing
Published 2025-04-01“…The framework leverages blockchain technology to ensure data transparency and security, while smart contracts automate exception handling to enhance efficiency. …”
Get full text
Article