Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6801
Synthesis of antifungal imines as inhibitors of ergosterol biosynthesis
Published 2025-12-01“…Ensuring a safe and secure supply of nutritious food for the ever growing global population necessitates the development of new eco-friendly fungicides to increase global food output by minimizing plant disease losses. …”
Get full text
Article -
6802
The global implications of a Russian gas pivot to Asia
Published 2025-01-01“…How this regional conflict impacts the future of natural gas markets is subject to three interconnected factors: (i) Russia’s strategy to regain markets for its gas exports; (ii) Europe’s push towards increased liquified natural gas (LNG) and the pace of its low carbon transition; and (iii) China’s gas demand and how it balances its climate and energy security objectives. A scenario modelling approach is applied to explore the potential implications of this geopolitical crisis. …”
Get full text
Article -
6803
Regulatory challenges in ai-based diagnostics: Legal implications of ai use in medical diagnostics
Published 2025-01-01“…The research results indicated that algorithmic bias, data security, and the requirement for stringent rules to guarantee the ethical and safe application of AI are the primary obstacles. …”
Get full text
Article -
6804
A systematised review and evidence synthesis on the broader societal impact of vaccines against Salmonella
Published 2025-02-01“…Despite variations in study design, methodology, and study quality, salmonellae infections were largely associated with negative broader societal impacts, including detriments in childhood physical development (very weak association), childhood educational development (strong to very strong association), household security (moderate association), public health spending (moderate association), and national income (moderate to strong association). …”
Get full text
Article -
6805
Optimal SES Selection Based on SVD and Its Application to Incipient Bearing Fault Diagnosis
Published 2018-01-01“…To distinguish the incipient fault of bearing before it steps into serious failure is the main task of condition monitoring and fault diagnosis technology which could guarantee the reliability and security of rotating machinery. The early defect occurring in the REB is too weak and manifests itself in heavy surrounding noise, thus leading to the inefficiency of the fault detection techniques. …”
Get full text
Article -
6806
Application of Computer-Based Techniques for Monitoring Animal Health, Behavior and Welfare: A Review
Published 2025-01-01“…Advances in machine learning, IoT, and blockchain have further expanded capabilities, enabling predictive insights and ensuring data security and transparency. These technologies support early disease detection, facilitate better decision-making, and reduce human labor, addressing both productivity and welfare standards. …”
Get full text
Article -
6807
Stingless Bee Honey Farming and Farmer Empowerment in Sawahlunto City, West Sumatra, Indonesia
Published 2025-01-01“…Interviews with farmers, local officials, and researchers revealed that honey production significantly enhances farmers’ incomes, diversifies agricultural activities, and improves food security. Ecological benefits, such as enhanced pollination and biodiversity conservation, were also acknowledged. …”
Get full text
Article -
6808
Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version
Published 2015-01-01“…Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. …”
Get full text
Article -
6809
An examination of the enhanced photocatalytic performance of PEO coatings applied on Mg alloys: A review
Published 2024-11-01“…Of the various strategies for securing nanoparticles to a substrate, photocatalytic coatings have emerged as a promising solution to overcome the common limitations associated with powdered forms. …”
Get full text
Article -
6810
Source-independent quantum random number generators with integrated silicon photonics
Published 2025-01-01“…Our research paves the way for integrated SI-QRNGs, providing a cost-effective and robust secure QRNG module for next-generation communications.…”
Get full text
Article -
6811
Unveiling Islamophobia: navigating its presence in Sweden
Published 2025-12-01“…Political and media narratives often manufacture immigration as a social problem, framing the construction of meaning through the discourses of cultural differences as social, political and security problems. Of specific concern is how Muslims and immigrants from predominantly Muslim countries are perceived as the undesirable ‘Other’. …”
Get full text
Article -
6812
"CYCLIST ON THE MARSH": LESSONS AND PROSPECTS OF THE LAST EU ENLARGEMENT
Published 2013-08-01“…Specific historic experience of the applicants pre-determined a considerable specialty of west-European fashioned democratic regimes in those countries, weakness of consensus and tolerance culture which has already rooted itself in the West-European society, and which has to a considerable degree secured stable development of Western Europe over the last decades. …”
Get full text
Article -
6813
Trust evaluation model of cloud user based on behavior data
Published 2018-05-01“…The user authentication can provide a certain degree of security, but when the user information was leaked, this method will not be effective. …”
Get full text
Article -
6814
Mitigating the implementation of SDGs program no. 13 in Indonesia: An overview of social dynamics and local wisdom
Published 2025-01-01“…The review explores key sectors including waste management, forest fire prevention, population dynamics, food security, and urban planning. Findings highlight that while local wisdom-based practices like “Tri Hita Karana” and customary land-use regulations are effective in mitigating environmental damage, scaling these approaches across diverse communities remains a challenge. …”
Get full text
Article -
6815
Operational Risk Assessment for International Transport Corridor: A Case Study of China-Pakistan Economic Corridor
Published 2019-01-01“…The risk management and control should focus on these three types of risks and strengthen the security management along the route. Strengthen policy docking and communication, maintain political stability, and strengthen antiterrorism cooperation.…”
Get full text
Article -
6816
Analysis of attacks on device manager in software-defined Internet of Things
Published 2017-08-01“…Although being the one that performs one of the most crucial services, the device managers in current primary controllers have a big security issue as they do not include any device verification, authentication, or authorization routines. …”
Get full text
Article -
6817
A dual benchmarking study of facial forgery and facial forensics
Published 2024-12-01“…Abstract In recent years, visual facial forgery has reached a level of sophistication that humans cannot identify fraud, which poses a significant threat to information security. A wide range of malicious applications have emerged, such as deepfake, fake news, defamation or blackmailing of celebrities, impersonation of politicians in political warfare, and the spreading of rumours to attract views. …”
Get full text
Article -
6818
Analysis of cyber incidents in Senegal from 2005 to 2023
Published 2024-12-01“…Based on the findings, the author recommends, inter alia, improved Senegalese government monitoring and reporting of cyber threats, with an emphasis on cooperation between the state’s Computer Security Incident Response Team (CSIRT-Senegal, or SNCSIRT) and the CSIRT-Universitaire established by tertiary institutions in the country. …”
Get full text
Article -
6819
Trust and Distrust in a Democratic State of Law
Published 2024-12-01“…The key task of public administration, aimed at inspiring and intensifying trust, is to obtain and secure the common good in the state on the basis of, and within the limits of, the applicable legal regulations, which at the same time set out the methods and scope of social protection in the individual spheres of operation of the legislative, executive, and judicial authorities.…”
Get full text
Article -
6820
ASSESSMENT AND ANALYSIS OF DIGITAL TRANSFORMATION OF REGIONAL ECONOMIC SYSTEMS OF THE RUSSIAN FEDERATION: METHODOLOGICAL APPROACHES AND THEIR APPROBATION
Published 2020-02-01“…A distinctive aspect of the proposed algorithm is the orientation of the developed tools to study the five main directions of digitalization, defined by the Order of the Government of the Russian Federation of July 28, 2017 (No. 1632-r): regulatory regulation, personnel for the digital economy, formation of research competencies and technological foundations, information infrastructure, information security. Based on the results of the study, the main qualitative and quantitative characteristics have been identified, that assess the development of the digital economy in the constituent entities of the Russian Federation at the present stage of development; a toolkit has been offered, that allows you to determine key areas of regional policy aimed at intensifying the processes of digitalization of business processes.…”
Get full text
Article