Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7281
On Facial Expression Recognition Benchmarks
Published 2021-01-01“…There are several applications of facial expressions in diverse fields including medicine, security, gaming, and even business enterprises. Thus, currently, automatic facial expression recognition is a hotbed research area that attracts lots of grants and therefore the need to understand the trends very well. …”
Get full text
Article -
7282
CAUSES OF PROLIFERATION OF SMALL ARMS AND LIGHT WEAPON ON NATION BUILDING ON THE PEOPLE OF UROMI (1970-1991)
Published 2023-08-01“…Government’s monopoly of arms and the security forces would be overwhelmed and unorganized groups and armed militias will constitute threat to the development of citizens of not only Esanland in Edo State but Nigeria as a whole. …”
Get full text
Article -
7283
Research on Information Fusion of Computer Vision and Radar Signals in UAV Target Identification
Published 2022-01-01“…The small size, sluggish flying speed, low flight altitude, and low electromagnetic intensity of unmanned aerial vehicles (UAVs) have put enormous strain on air traffic management and airspace security. It is urgent to achieve effective UAV target detection. …”
Get full text
Article -
7284
ANNULMENT OF A TRADEMARK FOR BAD FAITH
Published 2024-05-01“…Since in such cases, the name intended to be used as a trademark has already been unlawfully secured, interested parties may request its annulment, provided that the bad faith of the applicant is duly sustained with arguments and proofs. …”
Get full text
Article -
7285
Nonradiologist Physician Comprehension of Artificial Intelligence Utilization in Medical Imaging in Saudi Arabia
Published 2024-12-01“…Consultants and residents are comfortable acting on radiology reports, and privacy and security are continually maintained. Most participants were comfortable with the hybrid approach to radiological reporting.…”
Get full text
Article -
7286
Loading on a Rigid Target from Close Proximity Underwater Explosions
Published 2012-01-01Get full text
Article -
7287
Influence of the Angular Position of a New Tunnel on Movement in the Surrounding Existing Tunnel
Published 2024-12-01“…As a result, these elements could affect planning and security objectives.…”
Get full text
Article -
7288
Design of a GSM Based Energy Meter Monitoring and Tamper Detection System.
Published 2023“…The project therefore predicts encouraging results in residential consumers’ power monitoring and theft detection that will help utilities to improve the reliability, security and operation of the power network.…”
Get full text
Thesis -
7289
Financial Innovations And Financial Inclusion Among Commercial Banks in Uganda
Published 2023“…As more clients choose mobile banking, the report advises banking institutions to develop measures to improve security in the platform. The report also advises making these platforms straightforward and simple to use in order to attract more users to the business. …”
Get full text
Article -
7290
Metabolomics profiling reveals p-aminobenzoic acid enhances resistance to Fusarium head blight in wheat
Published 2025-02-01“…Abstract Fusarium head blight (FHB) not only causes severe yield losses but also mycotoxin contamination in wheat, posing a serious threat to food security and public health. The mechanisms of resistance to FHB in wheat are critical for effective prevention and control of the pathogen. …”
Get full text
Article -
7291
LKM: A LDA-Based -Means Clustering Algorithm for Data Analysis of Intrusion Detection in Mobile Sensor Networks
Published 2015-10-01“…Intrusion detection system (IDS) is a kind of active network security technology to protect network from attacks. …”
Get full text
Article -
7292
Improving VANETs Connectivity with a Totally Ad Hoc Living Mobile Backbone
Published 2015-01-01“…The vehicular ad hoc network (VANET) for intelligent transportation systems is an emerging concept to improve transportation security, reliability, and management. The network behavior can be totally different in topological aspects because of the mobility of vehicular nodes. …”
Get full text
Article -
7293
Strained two-dimensional tungsten diselenide for mechanically tunable exciton transport
Published 2024-12-01“…Abstract Tightly bound electron-hole pairs (excitons) hosted in atomically-thin semiconductors have emerged as prospective elements in optoelectronic devices for ultrafast and secured information transfer. The controlled exciton transport in such excitonic devices requires manipulating potential energy gradient of charge-neutral excitons, while electrical gating or nanoscale straining have shown limited efficiency of exciton transport at room temperature. …”
Get full text
Article -
7294
Trade-off or synergy? The impacts of coal energy consumption on compound system vulnerability: A perspective from coal resource base assessment
Published 2025-01-01“…The management partition will be divided into five zones and the capacity reduction trajectory into advancing, developmental, and stable phases, aims to ensure national energy security and foster sustainable coordinated development in the region.…”
Get full text
Article -
7295
Recognition of Reconstructed Frontal Face Images Using FFT-PCA/SVD Algorithm
Published 2020-01-01“…Modern face recognition modules/algorithms have been successful in many application areas (access control, entertainment/leisure, security system based on biometric data, and user-friendly human-machine interfaces). …”
Get full text
Article -
7296
Decentralisation and beyond: The impact of blockchain on global economies, banking, and governance
Published 2024-01-01“…While blockchain offers solutions for critical digital needs such as user verification, data security, and intellectual property management, its widespread adoption remains constrained by a limited understanding of its benefits. …”
Get full text
Article -
7297
Blinding HT: Hiding Hardware Trojan signals traced across multiple sequential levels
Published 2022-01-01“…However, there may be Hardware Trojans (HTs) in IP cores, which will cause critical security problem. There are already many HT detection methods which claim to detect all publicly available HT benchmarks. …”
Get full text
Article -
7298
Understanding ChatGPT: Impact Analysis and Path Forward for Teaching Computer Science and Engineering
Published 2025-01-01“…In this paper, common classroom problems and their respective responses from ChatGPT in the domains of Computer Science, Cyber Security, Data Science, and Electrical Engineering are analyzed to determine the categories of queries for which ChatGPT offers reliable responses and those for which it may be factually incorrect. …”
Get full text
Article -
7299
Data on insect biodiversity in a Chinese potato agroecosystem from DNA metabarcoding
Published 2025-01-01“…Abstract Potato (Solanum tuberosum) is a staple crop important in global food security. As a leading potato producer, China faces significant challenges from insect pest infestations that compromise yield and quality. …”
Get full text
Article -
7300
Research on Intelligent Monitoring and Protection Equipment of Vital Signs of Underground Personnel in Coal Mines: Review
Published 2024-12-01“…With the development of technology, the application of intelligent security technology in coal mine safety has broad prospects. …”
Get full text
Article