Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7321
An Efficient FPGA Implementation of Optimized Anisotropic Diffusion Filtering of Images
Published 2016-01-01“…Digital image processing is an exciting area of research with a variety of applications including medical, surveillance security systems, defence, and space applications. …”
Get full text
Article -
7322
Transmutation Strategy Using Thorium-Reprocessed Fuel ADS for Future Reactors in Vietnam
Published 2013-01-01“…Nuclear power is believed to be a key to the energy security for a developing country like Vietnam where the power demanding increases rapidly every year. …”
Get full text
Article -
7323
INFLUENCE OF POTATO AND PEA PROTEIN FINING ON THE CHROMATIC PROFILE FEATURES OF RARA NEAGRA WINE
Published 2024-09-01“…Due to food security issues associated to use of animal proteins and the rising demand for non-animal-based fining agents, the wine industry is becoming more interested in developing alternatives to conventional protein fining. …”
Get full text
Article -
7324
An effect of dynamic logistics capabilities on courier’s business performance
Published 2024-01-01“…As a result, the main result points out that the positive correlation between dynamic logistics capabilities and business performance strengthens the relationship evidence in the literature that dynamic logistics capabilities contribute to business performance, that is, sales growth, delivery reliability and security.…”
Get full text
Article -
7325
Histological demonstration of gonad development in the banana shrimp, Fenneropenaeus merguiensis
Published 2025-01-01“…The genetic diversity of the banana shrimp Fenneropenaeus merguiensis is at risk because of over-harvesting, which consequently reduces food security. This endangerment is exacerbated because this species is not commonly cultivated by farmers. …”
Get full text
Article -
7326
A Comparative Study of Convolutional Neural Network and Transformer Architectures for Drone Detection in Thermal Images
Published 2024-12-01“…The widespread growth of drone technology is generating new security paradigms, especially with regard to the unauthorized activities of UAVs in restricted or sensitive areas, as well as illegal and illicit activities or attacks. …”
Get full text
Article -
7327
Analysis of a No Equilibrium Linear Resistive-Capacitive-Inductance Shunted Junction Model, Dynamics, Synchronization, and Application to Digital Cryptography in Its Fractional-Ord...
Published 2017-01-01“…Finally, a cryptographic encryption scheme with the help of the finite-time synchronization of fractional-order chaotic no equilibrium LRCLSJ models is illustrated through a numerical example, showing that a high level security device can be produced using this system.…”
Get full text
Article -
7328
Thermal Environment inside a Tunnel after Thermobaric Explosion
Published 2017-01-01“…The outstanding thermal damage effect of thermobaric explosive (TBX) is enhanced in closed or semiclosed spaces, which may pose a serious threat to the security of people sheltered in tunnels or other protective engineering. …”
Get full text
Article -
7329
Combating antibiotic resistance: mechanisms, challenges, and innovative approaches in antibacterial drug development
Published 2025-01-01“…This review provides valuable insights for researchers and developers aiming to combat antibiotic resistance and advance the development of robust antibacterial therapies for future health security.…”
Get full text
Article -
7330
Review of models for estimating 3D human pose using deep learning
Published 2025-02-01“…The review identifies key applications of HPE in industries like healthcare, security, and entertainment. Our findings suggest that while deep learning models have made significant strides, challenges in handling occlusion, real-time estimation, and generalization remain. …”
Get full text
Article -
7331
Formation of the International Trade Community Based on Resource Dependence and Network Theory
Published 2023-09-01“…Purpose: Business communities significantly promote free trade and trade security, so joining the business community is essential for long-term development. …”
Get full text
Article -
7332
Developing Halal Tourism Based on Local Wisdom in Religious Area of Sis Aljufri
Published 2024-08-01“…Overall, the development of halal tourism in the Sis Aljufri Religious Area has shown significant progress, particularly in enhancing products and services, securing government support, and improving infrastructure. …”
Get full text
Article -
7333
Analysis of Techno–Economic and Social Impacts of Electric Vehicle Charging Ecosystem in the Distribution Network Integrated with Solar DG and DSTATCOM
Published 2025-01-01“…The study aims to maximize the technical, financial, and social benefits while ensuring that all security constraints are met. To assess the financial viability of the proposed model over a 10-year horizon, a detailed economic analysis comprising installation cost, operation, and maintenance cost is conducted. …”
Get full text
Article -
7334
The voice of people’s perspective on the future of health resilience post pandemic hits: A numerically scaled survey in 19 provinces in Indonesia
Published 2025-01-01“…The purpose of this study is to investigate the perspective of Indonesians regarding previous pandemics that have impacted the country’s health security. This study was conducted using a cross-sectional design. …”
Get full text
Article -
7335
Structural Characterization of Functional Ingredient Levan Synthesized by Bacillus siamensis Isolated from Traditional Fermented Food in Thailand
Published 2020-01-01“…The rising global population continues to threaten the world’s food security. The discovery of new technologies to produce food of nutritional and functional properties is urgently needed. …”
Get full text
Article -
7336
Machine Learning-Driven Adaptive Modulation for VLC-Enabled Medical Body Sensor Networks
Published 2024-11-01“…Visible Light Communication, a key optical wireless technology, offers reliable, high-bandwidth, and secure communication, making it a promising soloution for a variety of applications. …”
Get full text
Article -
7337
Load Invariant CC and CV Modes for Static/Dynamic Wireless Charging System With Half-Bridge Multi-Leg Converter Topology
Published 2025-01-01“…Resonant Inductive Power Transmission (RIPT) is an advanced Wireless Power Transfer (WPT) technology, emerging as a secure and efficient solution for Electric Vehicle (EV) charging. …”
Get full text
Article -
7338
Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model
Published 2021-01-01“…Despite the growing popularity of machine learning models in the cyber-security applications (e.g., an intrusion detection system (IDS)), most of these models are perceived as a black-box. …”
Get full text
Article -
7339
On Robust Assembly of Flexible Flat Cables Combining CAD and Image Based Multiview Pose Estimation and a Multimodal Robotic Gripper
Published 2024-01-01“…Furthermore, the assembly tasks include the releasing and securing of FFCs from cable connectors, where the system is successful in 200 out of 200 trials. …”
Get full text
Article -
7340
Real-Time Optimization of RISC-V Processors Based on Branch Prediction and Division Data Dependency
Published 2025-01-01“…Whether a processor can meet the real-time requirements of a system is a crucial factor affecting the security of real-time systems. Currently, the methods for evaluating hardware real-time performance and the quality of real-time performance are not comprehensive. …”
Get full text
Article