Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7821
-
7822
Redefining the Iranian Neighborhood Concept in Newly Developed Urban Contexts Based on Data Theory
Published 2022-03-01“…It also interconnects the seven core codes of “diversity and quality of urban services”, “neighborhood edge and boundary”, “safety and security”, “livelihood and economic position of the neighborhood”, “social status”, “social solidarity”, and “sense of belonging and the correlation with the location” with three selective codes “continuity and functional-spatial cohesion”, “socio-economic mobility”, and “socio-institutional cohesion, and dependency”, a new definition of the neighborhood can be found which is presented at the end of this article with the conceptual model.…”
Get full text
Article -
7823
Motivated by Design: A Codesign Study to Promote Challenging Misinformation on Social Media
Published 2024-01-01“…Our findings reveal four design considerations: creating secure and supportive environments, facilitating informed discussions through easy confrontation and access to reliable resources, leveraging recognition and social proof, and user support infrastructure. …”
Get full text
Article -
7824
Novel continuous identity authentication method based on mouse behavior
Published 2022-10-01“…With the rapid development of Internet technologies, security issues have always been the hot topics.Continuous identity authentication based on mouse behavior plays a crucial role in protecting computer systems, but there are still some problems to be solved.Aiming at the problems of low authentication accuracy and long authentication latency in mouse behavior authentication method, a new continuous identity authentication method based on mouse behavior was proposed.The method divided the user’s mouse event sequence into corresponding mouse behaviors according to different types, and mined mouse behavior characteristics from various aspects based on mouse behaviors.Thereby, the differences in mouse behavior of different users can be better represented, and the authentication accuracy can be improved.Besides, the importance of mouse behavior features was obtained by the ReliefF algorithm, and on this basis, the irrelevant or redundant features of mouse behavior were removed by combining the neighborhood rough set to reduce model complexity and modeling time.Moreover binary classification was adopted.The algorithm performed the training of the authentication model.During identity authentication, the authentication model was used to obtain a classification score based on the mouse behavior collected each time, and then the user’s trust value was updated in combination with the trust model.When the user’s trust value fell below the threshold of the trust model, it might be judged as illegal user.The authentication effect of the proposed method was simulated on the Balabit and DFL datasets.The results show that, compared with the methods in other literatures, this method not only improves the authentication accuracy and reduces the authentication latency, but also has a certain robustness to the illegal intrusion of external users.…”
Get full text
Article -
7825
Handling Multiple-Fuel Options in Economic Dispatch of Thermal Power Plants Through a Tight Model Applying Indicator Variables
Published 2025-01-01“…These thermal units can utilize various fuels, including coal, natural gas, and oil, which enhances both the economic performance and security of the overall energy system. Representing the fuel cost functions of these units with multiple fuels (MFs) as binary decisions involves adding binary variables to the economic dispatch (ED) problem. …”
Get full text
Article -
7826
Study of a Pathological E-Learning via Content Analysis on the Campus of the University of Tehran
Published 2024-12-01“…The advantage of this type of training for the educational organization in 4 categories (executive benefits, human resources, economic and educational-developmental) And the problems of this education were summarized by students in 3 general categories (learning problems, security and technology). Conclusions: Finally, it is recommended that officials and managers, by better understanding of the existing problems in the field of e-learning and solving them, can bring this type of education to their desired position in education in terms of quality and quantity.…”
Get full text
Article -
7827
Digital divide: how is Indonesian public service affected?
Published 2024-08-01“…The findings of the research point to a very low level of digital literacy in Indonesia, especially in terms of digital security. Mainly, the digital divide complicates the social exclusion of older generations, yet, in principle, digital technologies can help people in the older generation live better lives. …”
Get full text
Article -
7828
New Science Curriculum Based on Inquiry Based Learning - A Model of Modern Educational System in Republic of Macedonia
Published 2016-01-01“… The process of globalization, more progressive development of the scientific findings, new technology and the way of communicating with the new forms of literacy in which the most secure spot has been taken by the development of natural sciences in the spirit of sustainable development have been the reasons that make science and sustainable development an educational imperative. …”
Get full text
Article -
7829
Countering AI-powered disinformation through national regulation: learning from the case of Ukraine
Published 2025-01-01Get full text
Article -
7830
-
7831
Improving resilience of networked multi-energy carrier microgrids through proactive scheduling
Published 2025-04-01“…The proposed method adjusts microgrid scheduling to secure feasible islanding, maximize preparedness, and minimize operating costs and load shedding. …”
Get full text
Article -
7832
Application of deep learning for real-time detection, localization, and counting of the malignant invasive weed Solanum rostratum Dunal
Published 2025-01-01“…Solanum rostratum Dunal (SrD) is a globally harmful invasive weed that has spread widely across many countries, posing a serious threat to agriculture and ecosystem security. A deep learning network model, TrackSolanum, was designed for real-time detection, location, and counting of SrD in the field. …”
Get full text
Article -
7833
Design, Analysis, and Control of Biomedical Healthcare Modular Wheelchair with Posture Transformation
Published 2023-01-01“…This method is affordable, easily constructed, and highly secure.…”
Get full text
Article -
7834
Distributed Denial of Services (DDoS) attack detection in SDN using Optimizer-equipped CNN-MLP.
Published 2025-01-01“…The SDN has several security problems because of its intricate design, even with all its amazing features. …”
Get full text
Article -
7835
Comparing the rate of inpatient admissions of prison residents with COVID-19 to the general population in England in 2020/2021 using Hospital Episode Statistics data
Published 2024-04-01“…Hospital data highlight continuing challenges regarding high levels of violence and self-harm resulting in hospital admissions during a period when people were spending an increasing amount of time in their cells.Conclusions Despite efforts to minimise the spread of COVID-19 in secure settings, prison residents in England were significantly more likely to be hospitalised with a COVID-19 diagnosis relative to the general population during the first year of the pandemic. …”
Get full text
Article -
7836
Towards cooperative management of fatigue and vigilance in railway operations
Published 2024-01-01“…As the limitations of this system in detecting actual vigilance decrements is known from practitioners, we took upon ourselves to explore the opportunities offered by the recent developments, under the strict security constraint that characterises railway operations. …”
Get full text
Article -
7837
Evaluation and measurement of urban viability and factors affecting it (case study of Bojnourd city)
Published 2022-12-01“…Other findings of this study include the positive effect of citizenschr('39') sense of security and health on urban livability.…”
Get full text
Article -
7838
Analysis of Effective Factors on the way of spending of leisure time in Tehran (Case study: District 12 of Tehran)
Published 2021-03-01“…This study, using inferential statistical methods and SPSS software and statistical analysis such as correlation, regression and t-test, attempted to analyze the relationship between independent research variables (functional, security, aesthetic, transportation, economic, biological). …”
Get full text
Article -
7839
Prediction of Conductive Anomalies Ahead of the Tunnel by the 3D-Resitivity Forward Modeling in the Whole Space
Published 2021-01-01“…The prediction of water hazards before tunnel excavations becomes an urgent task for governments or enterprises to ensure security. The three-dimensional (3D) direct current (DC) resistivity method is widely used in the forward-probing of tunnels because of its low cost and highly sensitive response to water-bearing structures. …”
Get full text
Article -
7840
Dual Attention Dual-Resolution Networks for Real-Time Semantic Segmentation of Street Scenes
Published 2025-01-01Get full text
Article