Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7341
Oath-Taking, Peacebuilding and Conflict Resolution in Traditional African Society: The Izzi Example
Published 2024-12-01“…Over the ages, African men have continued to search for peace and security in their immediate environment. Hence, to ensure that man lives safely and peacefully, the forefathers of different African societies invented the culture of oath-taking as a means of survival. …”
Get full text
Article -
7342
Genome editing of an African elite rice variety confers resistance against endemic and emerging Xanthomonas oryzae pv. oryzae strains
Published 2023-06-01“…Bacterial leaf blight (BB) of rice, caused by Xanthomonas oryzae pv. oryzae (Xoo), threatens global food security and the livelihood of small-scale rice producers. …”
Get full text
Article -
7343
The Exploitation of Nanotechnology in Herbicides and Bioherbicides: A Novel Approach for Sustainable Weed Management
Published 2025-01-01“…The growing global demand for food security requires a paradigm shift towards sustainable agricultural practices, particularly in weed management. …”
Get full text
Article -
7344
Legal Protection of Innovations in the Regime of Commercial Secrets, Industrial Property: Comparative Analysis
Published 2020-06-01“…The legal regime of industrial property is a legal monopoly, as it provides the receipt of a security document (patent, declaratory patent). The trade secret regime is provided by a de facto monopoly, as it is ensured by the application of certain protective measures. …”
Get full text
Article -
7345
Research and Software Design of an Φ-OTDR-Based Optical Fiber Vibration Recognition Algorithm
Published 2020-01-01“…Distributed optical fiber vibration signal plays a significant role in the communication and safety of any perimeter security monitoring system. It uses light as an information carrier and optical fiber as a means of signal transmission and communication. …”
Get full text
Article -
7346
Perspectives on Soft Actor–Critic (SAC)-Aided Operational Control Strategies for Modern Power Systems with Growing Stochastics and Dynamics
Published 2025-01-01“…The ever-growing penetration of renewable energy with substantial uncertainties and stochastic characteristics significantly affects the modern power grid’s secure and economical operation. Nevertheless, coordinating various types of resources to derive effective online control decisions for a large-scale power network remains a big challenge. …”
Get full text
Article -
7347
Identification of Ecological Priority Areas Based on Nested-Scale Analysis: A Case Study of Metropolitan Nanjing, China
Published 2024-12-01“…Rapid urbanization has led to severe fragmentation of ecological spaces in high-density metropolitan regions, threatening urban ecological security and environmental well-being. While cities explore various restoration strategies, the systematic identification of ecological priority areas remains an urgent challenge, particularly due to the limitations of multi-scale evaluation methods. …”
Get full text
Article -
7348
A Multistory Building Evacuation Model Based on Multiple-Factor Analysis
Published 2019-01-01“…Emergency evacuation is an important issue in public security. To make a considerate plan, various situations are presented including blocking the accident area and letting the emergency access path available. …”
Get full text
Article -
7349
Open challenges and opportunities in federated foundation models towards biomedical healthcare
Published 2025-01-01“…This approach not only enhances the capabilities of FMs in medical diagnostics and personalized treatment but also addresses critical concerns about data privacy and security in healthcare. This survey reviews the current applications of FMs in federated settings, underscores the challenges, and identifies future research directions including scaling FMs, managing data diversity, and enhancing communication efficiency within FL frameworks. …”
Get full text
Article -
7350
Comprehensive dataset from high resolution UAV land cover mapping of diverse natural environments in Serbia
Published 2025-01-01“…Abstract This study highlights the vital role of high-resolution (HR), open-source land cover maps for food security, land use planning, and environmental protection. …”
Get full text
Article -
7351
Niqivut (our food)—dimensions of Inuit country food harvesting and significance in Arctic Canada: bountiful, seasonal, “soul food”
Published 2025-01-01“…A holistic understanding of the diversity and seasonality of harvesting is needed to support Inuit food sovereignty and security. Our goals were (a) to develop a broader understanding of the diversity and seasonality of harvesting country food across varied geographic contexts in Arctic Canada, and (b) further document the significance and benefits of country food as part of Inuit food sovereignty and systems across a range of communities. …”
Get full text
Article -
7352
Employer Branding and Brand Building in the Aviation Industry
Published 2025-01-01“…To build customer loyalty, airlines should focus on meeting diverse needs based on travel types, offering memorable experiences, and ensuring website security. By strengthening their brand, companies can enhance their attractiveness to job seekers, boost employee and customer satisfaction and loyalty, and improve overall business performance.…”
Get full text
Article -
7353
A hybrid machine learning model for intrusion detection in wireless sensor networks leveraging data balancing and dimensionality reduction
Published 2025-02-01“…Abstract Intrusion detection systems are essential for securing wireless sensor networks (WSNs) and Internet of Things (IoT) environments against various threats. …”
Get full text
Article -
7354
Abnormal Respiratory Sounds Classification Using Deep CNN Through Artificial Noise Addition
Published 2021-11-01“…A couple of decades back, doctors depended on their hearing to distinguish symptomatic signs in lung audios by utilizing the typical stethoscope, which is usually considered a cheap and secure method for examining the patients. Lung disease is the third most ordinary cause of death worldwide, so; it is essential to classify the RS abnormality accurately to overcome the death rate. …”
Get full text
Article -
7355
Intervention Protocol to Address the Difficult Airway. An Alternative for the Anesthesiologist’s Performance
Published 2012-02-01“…<p><strong>Background</strong>: The ability to secure the airway in a variety of patients and clinical circumstances constitutes an essential domain for the health team. …”
Get full text
Article -
7356
THE LIMIT OF LAND REGULARISATION AS POVERTY ALLEVIATION STRATEGY IN INFORMAL SETTLEMENTS: EMPIRICAL EVIDENCE FROM LAGOS, NIGERIA
Published 2015-06-01“… Some studies have linked land titling to economic growth and poverty alleviation through access to credit facilities, housing improvement and security against eviction. However, many other studies have equally argued otherwise. …”
Get full text
Article -
7357
Regulating Working Hours in the Transition to Flexible Work
Published 2024-12-01“…The findings offer recommendations for reforming Ukraine’s labor laws, aligning them with global trends, and advancing education in labor law and social security disciplines.…”
Get full text
Article -
7358
Prediction of power generation and maintenance using AOC‐ResNet50 network
Published 2024-10-01“…Due to the obvious intermittency and volatility of photovoltaic power generation, integration of large‐scale photovoltaic power generation into the power grid can cause certain impacts on the security and stability of the grid. Photovoltaic power prediction is essential to solve this problem, as it can improve the quality of photovoltaic grid connection, optimize grid scheduling, and ensure the safe operation of the grid. …”
Get full text
Article -
7359
A learning‐based approach to regression analysis for climate data–A case of Northeast China
Published 2025-01-01“…Precipitation is an important climatic feature for agricultural development and food security, and the study of precipitation and its associated climatic factors is important for the analysis of global change. …”
Get full text
Article -
7360
Towards understanding the character of quality sampling in deep learning face recognition
Published 2022-09-01“…Such choice of the data is related to its public availability when existing document compliant face image collections are hardly accessible due to security and privacy issues. Such inconsistency between the training data and deploy scenario may lead to a leak in performance in biometric systems, which are developed specifically for dealing with ID document compliant images. …”
Get full text
Article