Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7661
Nutritional value and antioxidant activity of ora-pro-nobis, tamarillo and green banana biomasses
Published 2024-12-01“… The consumption of unconventional food plants (UFP) can be a strategy to promote food and nutritional security, for which it is necessary to know their nutritional composition. …”
Get full text
Article -
7662
Transit Station Congestion Index Research Based on Pedestrian Simulation and Gray Clustering Evaluation
Published 2013-01-01“…Firstly, platform, stair, transfer tunnel, auto fare collection (AFC) machine, and security check machine were chosen as key traffic facilities through large amounts of field investigation. …”
Get full text
Article -
7663
Assessment of Soil Heavy Metal Pollution and Phytoremediation Potential of Dominant Species in Water-Level-Fluctuation Zone of Large Reservoir
Published 2025-01-01“…The results have guiding significance for the management and remediation of soil heavy metal pollution in global reservoir areas, further promoting global ecological security and sustainable development.…”
Get full text
Article -
7664
Sustainability decision-making in poultry slaughterhouses: A comparative analysis of AHP and fuzzy AHP
Published 2025-06-01“…The chicken meat industry is vital for global food security and economic growth but faces significant sustainability challenges, especially in balancing economic, environmental, and social aspects. …”
Get full text
Article -
7665
Impacts and challenges of industry 4.0 in manufacturing: a systematic literature review
Published 2022-12-01“…Additionally, six potential challenges faced by manufacturing in adopting digital transformation were found: (i) management, (ii) government, (iii) implementation, (iv) workforce, (v) operation, and (vi) security. The results indicated that accurate understanding of the concepts and scope of Industry 4.0 are under construction and that knowledge sharing will be decisive in shaping the future of the transition from current business models to smart manufacturing. …”
Get full text
Article -
7666
Decision making about increased building automation – barriers, drivers and motivation factors
Published 2025-01-01“…An important knowledge barrier was found as knowledge is needed for decisions about investments, use of BMS and decisions regarding IT security, such as handling of data. A key conclusion is the need for a facilitator, as knowledge is needed for decisions about BMS investments and for its use. …”
Get full text
Article -
7667
Application and Thinking of Deep Learning in Predicting Lateral Cervical Lymph Node Metastasis of Papillary Thyroid Cancer
Published 2025-01-01“…With the establishment and sharing of large datasets, automated annotation, algorithm optimization, and resolution of data security issues, deep learning is expected to accurately predict lateral neck lymph node metastasis in PTC. …”
Get full text
Article -
7668
Next-generation neutron detection using a 6Li glass scintillator composite
Published 2025-01-01“…Abstract Neutron detectors are crucial in fundamental science, nuclear security, safeguards, and civil applications. 3He-filled gas proportional counters are the gold standard for thermal neutron detection, prized for their efficiency, neutron/gamma discrimination, and stability; however, the scarcity of 3He has prompted the search for alternatives. …”
Get full text
Article -
7669
Position Verification in Connected Vehicles for Cyber Resilience Using Geofencing and Fuzzy Logic
Published 2024-01-01“…Position verification is essential in connected and autonomous vehicle technology to enable secure vehicle-to-everything communication. Previous attempts to verify location information have used specific hardware, traffic parameters, and statistical model-based techniques dependent on neighbouring vehicles and roadside infrastructure and whose judgements can be influenced by untrustworthy entities. …”
Get full text
Article -
7670
Long-Gauge Fiber Optic Sensors: Strain Measurement Comparison for Reinforced Concrete Columns
Published 2025-01-01“…Long-gauge fiber optic sensors, securely mounted on the concrete surface near the tensile side, were found to accurately measure both large and small deformations, outperforming LVDTs. …”
Get full text
Article -
7671
Carob (Ceratonia siliqua L.) cultivation, processing, and industrial applications: A review
Published 2024-12-01“…Carob's unique properties and diverse applications position it as a valuable resource with the potential to address contemporary challenges in food security, sustainable production, and environmental consciousness.…”
Get full text
Article -
7672
Digital Cognitive Behavioral Therapy for the Average Person in Developing Countries
Published 2024-12-01“…The results reveal that only 5% of individuals seek in-person therapy often, with 68% having limited knowledge of online mental health resources. 77% of survey participants have never used online mental health resources and express concerns about privacy and security. Based on the findings and literature review the study guides the development of strategies to enhance access to DCBT resources. …”
Get full text
Article -
7673
Newton Raphson based optimizer for optimal integration of FAS and RIS in wireless systems
Published 2025-03-01“…In modern wireless networks, the integration of Reconfigurable Intelligent Surface (RIS) and Fluid Antenna System (FAS) technologies offers a promising solution to the critical challenges such as signal attenuation, interference management, and security enhancement. This paper presents an application of a novel population-based metaheuristic algorithm of Newton Raphson Based Optimizer (NRBO) to efficiently integrating of FAS and RISs in wireless systems. …”
Get full text
Article -
7674
Cryo-EM structure of Sudan ebolavirus glycoprotein complexed with its human endosomal receptor NPC1
Published 2025-02-01“…Abstract Sudan ebolavirus (SUDV), like Ebola ebolavirus (EBOV), poses a significant threat to global health and security due to its high lethality. However, unlike EBOV, there are no approved vaccines or treatments for SUDV, and its structural interaction with the endosomal receptor NPC1 remains unclear. …”
Get full text
Article -
7675
A Method for Trust Quantification in Cloud Computing Environments
Published 2016-02-01“…In such environments, ownership and control over the data may lead to potential conflict between the protection of data and the provision of services. Thus, cloud security has received a great deal of attention in recent years. …”
Get full text
Article -
7676
Recent Research Progress on Ground-to-Air Vision-Based Anti-UAV Detection and Tracking Methodologies: A Review
Published 2025-01-01“…Integrating this novel aerial traffic into existing airspace frameworks presents unique challenges, particularly regarding safety and security. Consequently, there is an urgent need for robust contingency management systems, such as Anti-UAV technologies, to ensure safe air traffic. …”
Get full text
Article -
7677
BIM-Based Machine Learning Application for Parametric Assessment of Building Energy Performance
Published 2025-01-01“…To improve energy efficiency, proper building design should be secured at the early design phase. Digital tools are currently available for performing energy assessment analyses and can efficiently handle complex and technically demanding buildings. …”
Get full text
Article -
7678
Influence of Cleats-Surface Interaction on the Performance and Risk of Injury in Soccer: A Systematic Review
Published 2017-01-01“…Bladed studs can be considered less secure by increasing plantar pressure on lateral border. …”
Get full text
Article -
7679
Identifying and understanding the nonlinear behavior of memristive devices
Published 2024-12-01“…Abstract Nonlinearity is a crucial characteristic for implementing hardware security primitives or neuromorphic computing systems. …”
Get full text
Article -
7680
Machine Learning-Based Detection of Anomalies, Intrusions, and Threats in Industrial Control Systems
Published 2025-01-01“…Advanced preventive measures are necessary because, despite their significance, many ICS continue to rely on outdated technologies with few security features. This paper proposes a machine learning (ML)-based approach to anomaly detection in ICS communication networks, focusing on techniques such as 1D Convolutional Neural Networks (CNNs), Long Short-Term Memory (LSTM) networks, Support Vector Machines (SVMs), and Isolation Forest (iForest) algorithms. …”
Get full text
Article