Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7801
Investigation of Parameters of Fused Deposition Modelling 3D Prints with Compression Properties
Published 2022-01-01“…Three-dimensional (3D) printing has been attracting a great deal of attention in recent years in many application fields, for example, in the aerospace, construction, industry, art, education, protection, security, and medical fields. Printing methods, materials, and parameters influence the performance quality and determine the application sector of 3D prints. …”
Get full text
Article -
7802
Can Sensory- and Attachment-Informed Approaches Modify the Perception of Pain? An Experimental Study
Published 2021-01-01“…Pain perceptions of individuals using either a sensory-informed (weighted modality) or an attachment-informed (secure base priming) coping strategy were compared with those of individuals using no designated coping strategy. …”
Get full text
Article -
7803
Online Traffic Accident Spatial-Temporal Post-Impact Prediction Model on Highways Based on Spiking Neural Networks
Published 2021-01-01“…Traffic accident management as an approach to improve public security and reduce economic losses has received public attention for a long time, among which traffic accidents post-impact prediction (TAPIP) is one of the most important procedures. …”
Get full text
Article -
7804
STATISTICAL ANALYSIS OF DEVELOPMENT TRENDS IN GLOBAL RENEWABLE ENERGY
Published 2016-06-01“….), as evidenced by the inclusion of the development of this segment in the state energy strategies and the revision of existing approaches to energy security. The analysis of the use of renewable energy, its contribution to value added of countries-producers is of a particular interest. …”
Get full text
Article -
7805
Mitigating the effects of climate change in children’s outdoor play environments
Published 2024-12-01“…Analysis was conducted with manifest content analysis.Results Four themes with supporting categories; 1: a new design paradigm for outdoor play environments, 2: a need for updated regulation- and security guidelines for outdoor play environments, 3: nature-based play environments are more climate change resilient, and 4: maintenance and construction of nature-based outdoor play environments. …”
Get full text
Article -
7806
Establishing A Personal Data Protection Agency for E-Commerce in Indonesia
Published 2024-12-01“… The rapid growth of e-commerce in Indonesia has led to a significant increase in the collection and processing of personal data, raising concerns regarding data security and privacy rights. This study analyzes the urgency of establishing a Personal Data Protection Agency (LPDP) specifically for e-commerce users in Indonesia, considering the increasing risks to personal data in the digital marketplace. …”
Get full text
Article -
7807
Reducing Postharvest Loss of Stored Grains Using Plant-Based Biopesticides: A Review of Past Research Efforts
Published 2022-01-01“…One of the main challenges regarding food security is postharvest loss due to insect pests. The overall postharvest grain losses for sub-Saharan Africa could be as high as US$4 billion/year. …”
Get full text
Article -
7808
Determining the crop planting calendar using T-test observation and Zoning Agro Climati and agricultural with Hotelling test in Kermanshah province
Published 2020-06-01“…According to research, the station is under study, corn crop water demand in the months of June, July, August and September not secure and High temperature areas due to reduced need frequent in the months of May and June and in the lowlands due to a sharp increase in flowering time, seed maintenance and handling problems during the growing season makes this crop. …”
Get full text
Article -
7809
Carlos Castillo-Chavez: A century ahead
Published 2013-07-01“…Sixteen years ago, I travelled to Cornell University with my colleague at the National Security Agency (NSA) Barbara Deuink to meet Carlos and hear about his vision to expand the talent pool of mathematicians in our country. …”
Get full text
Article -
7810
Survey on adversarial attacks and defense of face forgery and detection
Published 2023-08-01“…Face forgery and detection has become a research hotspot.Face forgery methods can produce fake face images and videos.Some malicious videos, often targeting celebrities, are widely circulated on social networks, damaging the reputation of victims and causing significant social harm.As a result, it is crucial to develop effective detection methods to identify fake videos.In recent years, deep learning technology has made the task of face forgery and detection more accessible.Deep learning-based face forgery methods can generate highly realistic faces, while deep learning-based fake face detection methods demonstrate higher accuracy compared to traditional approaches.However, it has been shown that deep learning models are vulnerable to adversarial examples, which can lead to a degradation in performance.Consequently, games involving adversarial examples have emerged in the field of face forgery and detection, adding complexity to the original task.Both fakers and detectors now need to consider the adversarial security aspect of their methods.The combination of deep learning methods and adversarial examples is thus the future trend in this research field, particularly with a focus on adversarial attack and defense in face forgery and detection.The concept of face forgery and detection and the current mainstream methods were introduced.Classic adversarial attack and defense methods were reviewed.The application of adversarial attack and defense methods in face forgery and detection was described, and the current research trends were analyzed.Moreover, the challenges of adversarial attack and defense for face forgery and detection were summarized, and future development directions were discussed.…”
Get full text
Article -
7811
Migration and mutation (MeTa) hybrid trained ANN for dynamic spectrum access in wireless body area network
Published 2025-03-01Get full text
Article -
7812
Constructing competing discourses on the Russo-Ukrainian war: journalistic translation in wartime
Published 2024-12-01“…The findings reveal that the former article portrays the war as Ukraine’s fight for independence and a battle to uphold international law, whereas the latter predominantly depicts it as territorial aggression that threatens global nuclear security. The former article employs a wide range of evaluative devices to underscore Russia’s brutality and condemn the delayed provision of Western weapons to Ukraine. …”
Get full text
Article -
7813
National Interest and European Law in the Legislation and Juridical Practice on Health Care Services – In the Light of the Reforms of the Hungarian Health Care System
Published 2015-03-01“… The priority of the national interest in the field of the health care policy is secured by the rules of the TFEU, the Charter of Fundamental Rights of the European Union and by the secondary law as well. …”
Get full text
Article -
7814
REGIONS IN INTERNATIONAL POLITICS: A FRAMEWORK FOR INTEGRATING SYSTEMIC, REGIONAL, DYADIC, AND MONADIC APPROACHES
Published 2018-11-01“…Regional powers objective try to create security and stability in their regional areas which increases the overall stability. …”
Get full text
Article -
7815
Analisis Penerimaan Hulu Talent Yayasan Hasnur Centre Menggunakan TAM
Published 2024-08-01“…TAM (Technology Acceptance Model) digunakan dalam pengujian setiap faktor yang memberikan pengaruh penerimaan Hulu Talent dengan 4 variabel utama, yaitu PU (Perceived Usefulness), PE (Perceived Ease of Use), BI (Behavioral Intention to Use), dan AU (Actual System Usage) kemudian menambahkan variabel SC (Security) untuk keamanan privasi dalam menjaga kepercayaan karyawan menggunakan sistem. …”
Get full text
Article -
7816
PROFILES AND PREFERENCES OF ON-LINE MILLENIAL SHOPPERS IN BULGARIA
Published 2014-05-01“…Like other regions of the world, concern about financial transactions security is a major barrier limiting the willingness to shop on-line in Bulgaria. …”
Get full text
Article -
7817
The German and Austrian Historiography on Russia's Participation in the Holy League War
Published 2021-12-01“…Russia was trying to secure its national interests in dealings with the European partners, which did not fit well with the relations between Vienna and Constantinople, Venice, and Constantinople, as well as the plans of Jan III Sobieski to compensate for the loss of Ukraine at the expense of the Danube lands. …”
Get full text
Article -
7818
Strength and Microfabric of Expansive Soil Improved with Rice Husk Ash and Lime
Published 2020-01-01Get full text
Article -
7819
Preventing and managing antimicrobial resistance in the African region: A scoping review protocol.
Published 2021-01-01“…<h4>Introduction</h4>Antimicrobial resistance (AMR) constitutes a significant threat to global health and food security, typically associated with high morbidity and mortality rate. …”
Get full text
Article -
7820
OUTBREAK OF TOBAMOVIRUSES AND POTEXVIRUSES ASSOCIATED WITH DISEASE EPIDEMICS IN TOMATO PRODUCTION AREA OF IRAQ
Published 2025-01-01“…The survey showed a presence of Tomato brown rugose fruit virus (ToBRFV), Tobacco mosaic virus (TMV), Pepper mild mottle virus (PMMoV), Cymbidium mosaic virus (CymMV), Odontoglossum ringspot virus (ORSV), Cucumber green mottle mosaic virus (CGMMV), Pepino mosaic virus (PepMV) and Potato virus X (PVX) in tomato fields in Iraq. ToBRFV secured the highest relative incidence in tomato fields (7 governorates) followed by PepMV and CymMV and PMMoV (6 out of 7 governorates) and CGMMV, TMV (5 governorates), and PVX (3 governorates). …”
Get full text
Article