Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6781
Design of an Uninterrupted Power Supply with Li-Ion Battery Pack: A Proposal for a Cost-Efficient Design with High Protection Features
Published 2021-06-01“…Besides, li-ion batteries require a safe and secure ground to reach the best performance and decrease the explosion risk. …”
Get full text
Article -
6782
The Influence of Intrinsic Motivation and Supportive Leadership on Innovative Behavior through Career Sustainability and Psychological Safety of Employees in E-Commerce Companies i...
Published 2025-01-01“…This study examines the influence of intrinsic motivation and supportive leadership on the innovative behavior of employees in Indonesian e-commerce companies, with career sustainability and psychological security as mediation. The data was collected through surveys of employees at Shopee, Tokopedia, Bukalapak, Blibli, and Lazada. …”
Get full text
Article -
6783
Money Laundering Practices and Singapore’s Steps Against Indonesian Tax Amnesty
Published 2025-01-01“…The implementation of those policies is classified as a two-pronged sword because it also ensures the privacy and security of corrupt money investments from other countries. …”
Get full text
Article -
6784
Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks
Published 2014-01-01“…However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). …”
Get full text
Article -
6785
Exploring the relationship between learning emotion and cognitive behaviors in a digital game
Published 2024-09-01“…The study demonstrates that high‐level learners maintained a high level of insightful emotion throughout the game, excelled at constructing strategic formations to control more significant chessboard areas, and preferred to reserve powerful pieces until the end to secure a winning advantage. Conversely, low‐level learners exhibit a predominant level of neutral emotion, especially during unrelated behaviors, and struggle to maintain a strategic overview, focusing instead on smaller, immediate gains, which hamper the application of deeper strategies.…”
Get full text
Article -
6786
Money Laundering Practices and Singapore’s Steps Against Indonesian Tax Amnesty
Published 2025-01-01“…The implementation of those policies is classified as a two-pronged sword because it also ensures the privacy and security of corrupt money investments from other countries. …”
Get full text
Article -
6787
Touristic destination image in light of the service dominant logic of marketing
Published 2018-07-01“…Results indicate that values related to self-respect, security and excitement influence the assessment of some TDI components, and that the last four constructs influence the likelihood of individuals to visit or to recommend the destinations.…”
Get full text
Article -
6788
Adaptive Coordinated Variable Speed Limit between Highway Mainline and On-Ramp with Deep Reinforcement Learning
Published 2022-01-01“…This research provides insights into the management of highway capacity so as to secure traffic efficiency and reliability for the merging zone.…”
Get full text
Article -
6789
DETECTION AND RECOGNITION OF IRAQI LICENSE PLATES USING CONVOLUTIONAL NEURAL NETWORKS
Published 2025-01-01“…Multiple agencies worldwide have quickly and widely adopted the recognition of a vehicle license plate technology to expand their ability in investigative and security matters. License plate helps detect the vehicle's information automatically rather than a long time consuming manually gathering for the information. …”
Get full text
Article -
6790
The Rare Coincidence: Nonrecurrent Laryngeal Nerve Pointed by a Zuckerkandl's Tubercle
Published 2012-01-01“…Anatomical and embryological variations of the inferior laryngeal nerve (ILN), of the thyroid gland itself and unusual relations between ILN and the gland threaten operation security are discussed. The patient with toxic multinodular goiter is treated with total thyroidectomy. …”
Get full text
Article -
6791
An Analysis of the Social Wellbeing of Youth in Turkey Based on the “2017 Global Youth Wellbeing Index”
Published 2023-12-01“…The ‘2017 Global Youth Wellbeing Index’ (GYWI) is an international index explaining the social wellbeing status of the youth of different countries in terms of ‘civil participation’, ‘economic opportunities’, ‘education’, ‘health’, ‘information and communication technologies’, ‘safety and security’, and ‘gender equality’. In the current study, the social wellbeing of the youth in Turkey was analyzed on the basis of the data related to the specified domains of this index. …”
Get full text
Article -
6792
Implementation of Static Line Voltage Stability Indices for Improved Static Voltage Stability Margin
Published 2019-01-01“…This paper presents an approach for enhancing the static voltage stability margin and reducing the power losses of the system with voltage security-constrained optimal power flow (VSC-OPF) that is based on static line voltage stability indices. …”
Get full text
Article -
6793
« Conquérir la galère. » Espace public et discipline de l’intime chez des femmes sans papiers en Île-de-France
Published 2024-11-01“…The violence of the disciplinary system engendered by undocumented situation leads to a subjective revolution for undocumented women and puts emotional security and decision-making sovereignty in tension. …”
Get full text
Article -
6794
Forearm multimodal recognition based on IAHP‐entropy weight combination
Published 2023-01-01“…Abstract Biometrics are the among most popular authentication methods due to their advantages over traditional methods, such as higher security, better accuracy and more convenience. The recent COVID‐19 pandemic has led to the wide use of face masks, which greatly affects the traditional face recognition technology. …”
Get full text
Article -
6795
Transformation of business under the influence of artificial intelligence
Published 2024-01-01“…Research results of Forbes Advisor (2023) indicate that the most common use of AI is in Customer Service, Cyber Security, Digital Personal Assistants, Customer Relationship Management (CRM), etc. …”
Get full text
Article -
6796
Distributionally Robust Self-Scheduling Optimization with CO2 Emissions Constraints under Uncertainty of Prices
Published 2014-01-01“…As a major energy-saving industry, power industry has implemented energy-saving generation dispatching. Apart from security and economy, low carbon will be the most important target in power dispatch mechanisms. …”
Get full text
Article -
6797
Efficiency and Progressivity Measures of the Flat Tax with a Special Focus on Bosnia and Herzegovina
Published 2015-12-01“…Progressivity indicators are very low and are a result of the flat PIT and flat social security contributions (hereafter: SSCs). Finally, for the case of Bosnia and Herzegovina (B&H), efficiency and progressivity measures can be enhanced indicating that PIT reforms should be brought together with SSCs reforms. …”
Get full text
Article -
6798
Passive biometric electronic lock via UHF RFID
Published 2021-04-01“…A biometric lock design method was proposed based on the internal features of human body, namely PBLock.It used the backscattered RF signals to collect the impedance characteristics of human fingertips through the contact between human fingers and tags.The advantage of such authentication method is that the human impedance was not easy to be stolen, and it was fully integrated with the hardware characteristics of the device (RFID tags), which greatly increased the difficulty for the attacker to copy and clone.To ensure the availability and efficiency of the system, an optimization authentication mechanism was proposed by cutting tag antenna, which effectively improved the impedance sensitivity.Moreover, the feasibility of passive drive was discussed by using the electromagnetic energy advantage of RFID system.Through a large number of experimental evaluations, the authentication accuracy of PBLock can reach 96%, and the average time cost of a single authentication is 1.4 seconds.Some attack models were presented based on practical environment.The results show that PBLock can effectively prevent counterfeiting attack, impersonation attack and replay attack, which provides an opportunity for the secure application of new biometric electronic locks.…”
Get full text
Article -
6799
Recent Web Platforms for Multi-Omics Integration Unlocking Biological Complexity
Published 2024-12-01“…Finally, the paper proposes directions for future research and development, emphasizing the importance of more advanced, user-friendly, and secure platforms that can better serve comprehensive healthcare needs.…”
Get full text
Article -
6800
Farmers’ intentions to adopt Triple S for sweetpotato seed conservation
Published 2024-12-01“…This constrains the crop’s potential to contribute to food security. Triple S (sand, storage, sprouting) is a root-based technology addressing seed scarcity. …”
Get full text
Article