Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7141
Reclaiming the Narrative: A Critical Discourse Analysis of Donald Trump's 2024 Super Tuesday Campaign Speech
Published 2024-12-01“…The analysis also demonstrates how Trump employs a problem-solution structure to portray himself as the sole solution to issues like immigration, economic instability, and national security. The study further contextualizes Trump's rhetoric within broader discursive practices, showing how the speech resonates with populist themes of institutional distrust and nationalism. …”
Article -
7142
Dinâmica espacial da produção de mandioca no Paraná, Brasil
Published 2020-12-01“…An important food source, cassava has great relevance in food security in tropical regions. Brazil is the fourth largest cassava producer in the world. …”
Get full text
Article -
7143
Leveraging Blockchain and AI for Pharma Supply Chain Efficiency
Published 2024-12-01“…Blockchain technology, with its ability to create immutable records, can enhance transparency, traceability, and security across the supply chain. This can help in tracking the journey of drugs from raw materials to the final product, reducing the risk of counterfeiting and ensuring quality. …”
Get full text
Article -
7144
A Double-Layer Optimization Method for Cascading Failure Prevention Considering Transient Stability
Published 2024-01-01“…In terms of algorithms, the paper uses the Extended Particle Swarm Optimization (EPSO) algorithm with higher precision and accuracy to solve the inner model and innovatively introduced the Practical Dynamic Security Region (PDSR), which uses PSASP software for offline calculation and online application, as a dynamic analysis method to quickly realize transient stability constraint to solve the outer model. …”
Get full text
Article -
7145
The Impact of Suicide Attacks on Voting Behavior: The Case of November 2015 Early Elections
Published 2018-10-01“…Terror aims to disrupt peace and security of countries. Suicide attacks, a form of terrorism is carried out in many parts of the world today. …”
Get full text
Article -
7146
PROJECT MANAGEMENT PRACTICES AND PROJECTS SUCCESS AMONG DEVELOPING ECONOMIES– AN EGYPTIAN COMPARATIVE STUDY
Published 2024-09-01Get full text
Article -
7147
Addressing Depletion in Alluvial Aquifers
Published 2025-01-01“…The vast alluvial aquifers of the Indo-Gangetic Plain are vital for the country’s food security and livelihoods of millions. However, abstraction far exceeds natural recharge, resulting in a gradual decline. …”
Get full text
Article -
7148
Young investors, precariousness, and the maturing asset economy
Get full text
Article -
7149
Fatigue crack paths under the influence of changes in stiffness
Published 2015-12-01“…Regions with differing stiffness also arise from ribs, grooves or boreholes. Since secure findings on the propagation behaviour of fatigue cracks are essential for the evaluation of the safety of components and structures, the growth of cracks near changes in stiffness has to be considered, too. …”
Get full text
Article -
7150
The evolution of ASEAN's language policies: A diachronic analysis of official documents and website.
Published 2025-01-01“…The study reveals three key insights: 1) The evolution of the ASEAN official website can be categorized into three distinct stages. 2) A consistent use of the collective pronoun "we" in the statements highlights the emphasis on cooperation and progress across economic and political-security domains. 3) The ASEAN community has persistently upheld its values, fostering an ASEAN identity and a genuine ASEAN community throughout its development. …”
Get full text
Article -
7151
Encounter Risk Analysis of Rainstorm and Tide Base on Different Sampling Method
Published 2024-01-01“…Waterlogging disaster in tide-affected area usually occurs under the influence of rainstorm and tide level.In the process of risk analysis of rainstorm and tide level,different sample methods will affect the risk probability results.Taking Zhong-Zhu union catchment as an example,based on annual maximum series sampling method and peak over threshold sampling method combined with Copula function,the risk analysis results indicate that:①Sample data obtained based on peak over threshold sampling method has a larger sample size,which contains more rainstorm events than sample data obtained based on annual maximum series sampling method,and these rainstorm events tend to encounter high tide;②On the basis of containing more effective sample information,the frequency analysis results obtained by peak over threshold sampling method are more accurate and with much more security from the perspective of waterlogged drainage;③The joint distribution of rainstorm and tide based on peak over threshold sampling method showed a better fitting degree,and the probability of encountering unexpected events is larger as a result of annual maximal series sampling method omitted some effective sample information.…”
Get full text
Article -
7152
Deep Learning Integration in PAPR Reduction in 5G Filter Bank Multicarrier Systems
Published 2024-11-01Get full text
Article -
7153
The effectiveness of coercive measures in motivating vaccination: Evidence from China during the COVID-19 pandemic
Published 2025-12-01“…Governments worldwide have implemented mandates, restrictions, and other coercive measures to secure adequate vaccine coverage, with the COVID-19 pandemic providing numerous examples. …”
Get full text
Article -
7154
Research on the tourism service quality evaluation of Gongbei Lingnan community under the perspective of SERVQUAL theory
Published 2025-01-01“…The survey results show that the second-level dimension factors under the tangible, reliability, assurance, and security dimensions significantly impact tourist satisfaction. …”
Get full text
Article -
7155
Sulla (ri)articolazione della “marocchinità” nel Marocco contemporaneo, tra festivalizzazione del dissenso giovanile e revival sufi
Published 2024-06-01“…After September 11, 2001, and following terrorist attacks in Casablanca, the Moroccan monarchy was engaged in redefining a field of the sacred, which involved the neutralization of Salafist tendencies and their replacement with a Sufism deemed harmless and incapable of threatening the nation's spiritual security. The monarchy's discursive strategies required and still require the elaboration of public representations of virtue, particularly of the principle of democratic citizenship, central in the transitional discourses of today's Moroccan state, performed within the framework of national and international festivals. …”
Get full text
Article -
7156
Privilege separation of data sharing scheme using attribute-based encryption
Published 2014-11-01“…Attribute-based encryption (ABE),which can provide fine-grained access control and flexible one-to-many encryption,has been envisioned as an important data sharing approach to achieve privacy preserving in the distributed environment.However,the flourish of the data sharing approach using attribute-based encryption still hinges upon how to fully understand and manage the challenges facing in the distributed environment,especially the veracity of the data.In fact,all of the existing data sharing schemes allow data owner to modify data without restrictions,in which the veracity of the data has been questioned and that cannot satisfy the demands of practical application sometimes,such as personal electronic medical records or assessment systems.A data sharing scheme with privilege separation is presented,in which the veracity of the data can be ensured and the flexible access control can be provided.Based on RSA-based proxy encryption,a new efficient privilege separation mechanism is introduced to ensure the veracity of the data; exploiting attribute-based encryption,the data owner can define the access policy to achieve fine-grained access control.Detailed security analysis shows that the proposed data sharing scheme can provide the data confidentiality to achieve privacy preserving.In addition,the performance analysis demonstrates the scheme’s effectiveness in terms of the computation costs.…”
Get full text
Article -
7157
Novel hybrid strong and weak PUF design based on FPGA
Published 2021-04-01“…Physically unclonable function (PUF) can produce intrinsic keys with characteristics of randomness, uniqueness and tamper-proof by exploiting the process deviations which can not be avoided in the chip manufacturing process.A novel hybrid strong and weak PUF (SWPUF) circuit design based on field-programmable gate array(FPGA) was proposed after the investigation of the PUF circuit structures and principles.To address the limitation of designing strong-PUF and weak-PUF discretely, SWPUF could be configured into two topologies conveniently depending on the Hamming Weight (HW) of the challenges.In addition, the statistical characteristics of the responses could be further improved by a XOR-decorrelation technique.The proposed SWPUF was implemented on a Xilinx Artix-7 FPGA (28nm technology), and a self-built test platform was set up by using Matlab and MicroBlaze microcontroller.Experimental results show that the SWPUF has good performances of randomness (96.98%), uniqueness (99.64%) and reliability (96.6%).Logic register analysis also shows that the SWPUF has a better anti-attack capability than the traditional Arbiter-PUF in the case of with small HW, and can be used in the information security, such as key storage (especially to weak PUF) and device authentication (especially to strong PUF).…”
Get full text
Article -
7158
-
7159
Nosocomial infection in the intensive care unit. 1997-2002.
Published 2005-04-01“…The rates of mortality associated to infection stayed low and the lethality suffered a on decreased in the studied period, however the pneumonias associated to the ventilation mechanics stayed high with an average of 24, 6 for every 1000 patient days and to the closing of the 2002 the service you will find in the area of security of the endemic channel.<span style="font-family: Calibri;"><strong><span style="font-size: 10pt">K</span></strong></span>…”
Get full text
Article -
7160
Current food trade helps mitigate future climate change impacts in lower-income nations.
Published 2025-01-01“…Managing the risk of climate change for national food security requires a global perspective, considering not only how national production is affected, but also how climate change affects trading partners.…”
Get full text
Article