Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7041
Study on the Bearing Capacity and Engineering Performance of Aeolian Sand
Published 2020-01-01“…Therefore, the physical and mechanical characteristics of the sand are different from those of other regions, and it has a loose soil structure, large pores, and a low bearing capacity. To ensure the security and applicability of engineering, it is necessary to study the engineering characteristics of aeolian sand. …”
Get full text
Article -
7042
Structural and Dynamic Changes in International Trade in Agricultural Products in Ukraine
Published 2024-03-01“…The peculiarities of key directions of Ukraine's agro-industrial market under martial law and its place in the global food security system are described. The article also examines the structure of Ukraine's trading partners, which have been revised since the beginning of the war. …”
Get full text
Article -
7043
Role of E-cadherin in epithelial barrier dysfunction: implications for bacterial infection, inflammation, and disease pathogenesis
Published 2025-02-01“…E-cadherin, an essential component of adherens junctions, has emerged as a pivotal molecule that secures epithelial homeostasis. Lately, its pleiotropic role beyond barrier function, including its involvement in immune responses, has become more evident. …”
Get full text
Article -
7044
Deep features fusion for user authentication based on human activity
Published 2023-07-01“…Abstract The exponential growth in the use of smartphones means that users must constantly be concerned about the security and privacy of mobile data because the loss of a mobile device could compromise personal information. …”
Get full text
Article -
7045
Anti‐freezing electrolyte modification strategies toward low‐temperature aqueous zinc‐ion batteries
Published 2024-12-01“…Abstract Due to the availability of zinc resources, and reduced security risks, aqueous zinc‐ion batteries (AZIBs) are potential contenders for next‐generation energy storage systems. …”
Get full text
Article -
7046
The role of the accountant in preventing money laundering
Published 2024-01-01“…The inclusion of illegally acquired income in legal financial flows not only undermines the economic and monetary system, but also undermines the political stability and security of the state. The concern about money laundering has become one of the main preoccupations of governments and financial sector regulatory bodies around the world. …”
Get full text
Article -
7047
A REAL TIME FACE RECOGNITION SYSTEM USING ALEXNET DEEP CONVOLUTIONAL NETWORK TRANSFER LEARNING MODEL
Published 2021-10-01“…In various applications such as access control system, security, attendance management etc., it has been widely used for authentication and identification purposes. …”
Get full text
Article -
7048
Skillful seasonal predictions of continental East-Asian summer rainfall by integrating its spatio-temporal evolution
Published 2025-01-01“…Abstract Skillful seasonal climate prediction is critical for food and water security over the world’s heavily populated regions, such as in continental East Asia. …”
Get full text
Article -
7049
Effectiveness of Mobile Health Services in Remote Papua under Indonesia’s Minister of Health Regulation No. 90 of 2015
Published 2024-12-01“…Key strategies to address these issues include securing stable funding, enhancing workforce capacity, leveraging digital technologies, and fostering community engagement. …”
Get full text
Article -
7050
A cyanobacteria-derived intermolecular salt bridge stabilizes photosynthetic NDH-1 and prevents oxidative stress
Published 2025-02-01“…The salt bridge and transmembrane helix 16, both situated at the C-terminus of NdhF1, collaboratively secure the linkage between NdhD1 and NdhB, akin to a cramping mechanism. …”
Get full text
Article -
7051
Blockchain-Facilitated Cybersecurity for Ubiquitous Internet of Things with Space–Air–Ground Integrated Networks: A Survey
Published 2025-01-01“…Fourth, we provide a guideline on when blockchain technology could be useful for IoT and SAGIN and what types of blockchain could be useful to enhance the security of ubiquitous IoT in SAGIN.…”
Get full text
Article -
7052
Countermeasures to Avoid Noncooperation in Fully Self-Organized VANETs
Published 2014-01-01“…The secure and efficient exchange of information in vehicular ad hoc networks (VANETs) involves more challenges than in any other type of ad hoc networks. …”
Get full text
Article -
7053
Mbamois women and land tenure: a study of the actors in the Mbam-And-Inoubou Division (Centre, Cameroon)
Published 2025-01-01“… Context and background In rural regions, a striking reality emerges : many women, trapped in an overwhelming financial dependency, are engaged in fierce battles to secure a tiny plot of land where they can carry out their essential activities (agriculture). …”
Get full text
Article -
7054
Edge or Cloud Architecture: The Applicability of New Data Processing Methods in Large-Scale Poultry Farming
Published 2025-01-01“…The transmission and analysis of data collected on birds and the farming environment in large-scale production environments using digital tools on a secure platform are not straightforward. In our on-site research, we have investigated two architectures, a cloud-based processing architecture and an edge computing-based one, in large-scale poultry farming circumstances. …”
Get full text
Article -
7055
CASTWED: continuous authentication combining smart terminal with wearable devices in mobile satellite communication system
Published 2017-08-01“…Wearab1e devices,such as smart watches or smart brace1ets,have been growing rapid1y wor1dwide.These devices with various sensors have the abi1ity to perceive the circumstance and user's biometric features,which can be used to continuous1y authenticate a user's identity.However,these features have not been studied to identify a specific user in mobi1e sate11ite communication system yet,due to its 1ow data transfer rate and unacceptab1e de1ay.To so1ve this prob1em,continuous authentication combing smart termina1 with wearab1e devices(CASTWED)was studied in mobi1e sate11ite communication system,the security of CASTWED was a1so theoretica11y ana1yzed.Simu1ation experiments show that the CASTWED scheme can provide simu1taneous on1ine authentication service for 100 000 users via 60 Mbit/s Ku wave band.…”
Get full text
Article -
7056
INVESTIGATING THE COST EFFECTIVENESS OF BIODIESEL DISTRIBUTION IN INDONESIA
Published 2023-05-01“… The implementation of biodiesel in Indonesia has been regarded as one of the main strategies to improve country’s energy security equally and equitably. However, as the largest archipelago country in the world, the activity in distributing their biodiesel production bears a key problem. …”
Get full text
Article -
7057
Fast Frequency Control Strategy Based on Worst-Case Network Attack Perception
Published 2024-12-01“…Furthermore, the strategy is easy to implement, highly adaptable, and suitable for the complex and dynamic operational environment of power systems, providing strong support for the secure and stable operation of smart grids.…”
Get full text
Article -
7058
Pitfalls of PTOs in land ownership and control: Rethinking access for rural development in South Africa
Published 2024-11-01“…These alternative strategies prioritise rural local empowerment, strengthen tenure security, and foster inclusive decision-making processes.…”
Get full text
Article -
7059
Effect Improved for High-Dimensional and Unbalanced Data Anomaly Detection Model Based on KNN-SMOTE-LSTM
Published 2020-01-01“…This model can continuously filter out and securely generate samples to improve the performance of the model through kNN discriminant classifier and avoid the blindness and limitations of the SMOTE algorithm in generating new samples. …”
Get full text
Article -
7060
Community Participation in Programme Planning for Universal Health Coverage in India: An exploratory study
Published 2025-02-01“…Traditional Indian society is cut across by rigid religion and caste lines, and the appropriate role for each caste group has been a serious obstacle in securing complete community participation. This study employed a quantitative exploratory survey design aimed at understanding public health professionals' perceptions of community participation in healthcare planning. …”
Get full text
Article