Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7081
Improvement of Specific Multi-target Tracking Algorithm in Cross-domain Environment
Published 2025-01-01“…[Purposes] Multi-target tracking in the cross-domain environment of surveillance video is a very important and challenging task in intelligent security. The difficulties of this task lie in the frequent occlusion between the objects in video frame, the unknown start and end time of the trajectory, the too small sized targets, the interactions between the objects, the apparent similarity, and the camera angle changes. …”
Get full text
Article -
7082
From Maximization to Optimization: A Paradigm Shift in Rice Production in Thailand to Improve Overall Quality of Life of Stakeholders
Published 2014-01-01“…The system has resulted in good health conditions for the farmers and villagers, financial security, availability of extra time, and additional opportunities and freedom and hence in the improvement of their overall quality of life. …”
Get full text
Article -
7083
Stability analysis of the tunnel face adjacent to longitudinal stratigraphic interface using the upper bound theorem
Published 2025-01-01“…The secure condition of the tunnel face perpetually remains as a matter of substantial concern throughout the execution of tunnel-construction endeavors. …”
Get full text
Article -
7084
UAV Path Planning Based on Improved A∗ and DWA Algorithms
Published 2021-01-01“…This work proposes a path planning algorithm based on A∗ and DWA to achieve global path optimization while satisfying security and speed requirements for unmanned aerial vehicles (UAV). …”
Get full text
Article -
7085
A Novel Surgical Technique for Fixation of Recurrent Acromioclavicular Dislocations: AC Dog Bone Technique in Combination with Autogenous Semitendinosus Tendon Graft
Published 2017-01-01“…This is the first case in literature that utilizes the artificial dog bone ligament securing the autograft in an anatomic AC reconstruction.…”
Get full text
Article -
7086
Revolutionizing Agriculture: A Comprehensive Review of AI-Enabled Precision Irrigation and Water Quality Forecasting
Published 2024-12-01“…This review emphasizes AI's role in addressing water scarcity and optimizing irrigation in agriculture by utilizing different technologies to ensure sustainable water management and food security. Future researchers will find this review valuable for understanding AI's current impact on irrigation and identifying avenues for further innovation. …”
Get full text
Article -
7087
Carotid Baroreceptor Stimulation for the Treatment of Resistant Hypertension
Published 2011-01-01“…While accumulating evidence indicates that carotid baroreceptor stimulation exerts its benefits beyond blood pressure reduction, further research is necessary to assess the spectrum of beneficial effects and evaluate potential hazards, before the extraction of secure conclusions.…”
Get full text
Article -
7088
Assessing taxpayers’ satisfaction with tax administration e-services
Published 2024-12-01“…The results suggest that improving tax information’s usability, clarity, and security increases taxpayers’ confidence and satisfaction. …”
Get full text
Article -
7089
Signal theory based encryption of faster-than-Nyquist signals for fiber and wireless transmission
Published 2025-01-01“…The encryption is simple, fast and power efficient, and offers a solution for secure data transmission in existing and future communication networks.…”
Get full text
Article -
7090
“Big Challenges” and Regional Technical University: Values and Actions
Published 2020-03-01“…There is a distinction between civilization and globalist paradigms of Russia positioning, as well as a distinction between well-being and security as two strategies of values generalization. …”
Get full text
Article -
7091
Higher Education as Soft Power Potential of Russia
Published 2009-12-01“…At the same time the USA has secured the leading role in international education. …”
Get full text
Article -
7092
Operational Risk Assessment of Distribution Network Equipment Based on Rough Set and D-S Evidence Theory
Published 2013-01-01“…Therefore, scientific assessment of power distribution equipment operation risk is significant to the security of power distribution system. In order to get the satisfactory assessment conclusions from the complete and incomplete information and improve the assessment level, an operational risk assessment model of distribution network equipment based on rough set and D-S evidence theory was built. …”
Get full text
Article -
7093
The urgency of addressing zoonotic diseases surveillance: Potential opportunities considering One Health approaches and common European Data Spaces
Published 2025-04-01“…Consequently, this approach might foster data sharing from Member States by leveraging existing developments within data spaces in terms of, for example, data security. It could also support researchers and developers in accessing transdisciplinary, stratified, and quality-controlled data for their projects.…”
Get full text
Article -
7094
The fungicidal effect of Rosa Damascena Mill extracts against fungal infections invading Plants in Al Taif
Published 2025-01-01“…This data facilitate the contributing to the exploration of a more secure alternative to fungicides. Further, it will facilitate the development of regulatory approaches aimed at alleviating the detrimental consequences of fungal infections.…”
Get full text
Article -
7095
Improving wheat yield prediction through variable selection using Support Vector Regression, Random Forest, and Extreme Gradient Boosting
Published 2025-03-01“…Plant breeding centers, in their relentless pursuit of more productive and resilient wheat varieties, have generated vast data repositories that are fundamental to ensuring global food security. This study uses these data to develop a wheat grain yield (GY) prediction model, using machine learning techniques such as Random Forest (RF), Support Vector Regression (SVR), and Extreme Gradient Boosting (XGBoost). …”
Get full text
Article -
7096
Dynamic hierarchical quantum secret sharing protocol based on high-dimensional GHZ state
Published 2024-10-01“…The correctness of the proposed protocol was verified through mathematical proof. In addition, security analysis results showed that the proposed protocol could resist intercept-and-resend attack, measure-and-resend attack, entangle-and-measure attack, Trojan horse attack, as well as collusion attacks from internal participants.…”
Get full text
Article -
7097
The use of Telenomus remus (Nixon, 1937) (Hymenoptera: Scelionidae) in the management of Spodoptera spp.: potential, challenges and major benefits
Published 2022-01-01“…Abstract Spodoptera frugiperda (Smith, 1797) (Lepidoptera: Noctuidae), also known as fall armyworm (FAW) is a polyphagous pest which can cause significant losses and is considered a global threat to different crops and a risk to food security. Currently, in maize, the pest is predominantly controlled by pesticides or transgenic events. …”
Get full text
Article -
7098
Risk Assessment of an Existing Metro Tunnel in Close Proximity to New Shield Tunnels following Construction
Published 2022-01-01“…The threshold of indicators in the existing tunnel structure risk assessment system was determined based on the tunnel function and structure security. Then, we described the membership vector determination method, weight vector determination method, and comprehensive evaluation vector processing method. …”
Get full text
Article -
7099
Trade policy uncertainty and corporate financialization: strategic implications for non-financial firms in China
Published 2025-12-01“…This analysis emphasizes the significance of legislators in ensuring policy stability and fostering a secure business environment. Furthermore, the robustness of these results was sustained when alternative key variables and methodologies were applied.…”
Get full text
Article -
7100
Differentially Private Clustered Federated Load Prediction Based on the Louvain Algorithm
Published 2025-01-01“…To address the data heterogeneity and security issues encountered in load forecasting for smart grids, this paper proposes a load-forecasting framework suitable for residential energy users, which allows users to train personalized forecasting models without sharing load data. …”
Get full text
Article