Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7841
Analysis of Changes in Intercity Highway Traffic Travel Patterns under the Impact of COVID-19
Published 2021-01-01“…The unprecedented COVID-19 pandemic impacts negatively on the security and development of human society. Comparison and analysis of intercity highway travel patterns before and during the COVID-19 pandemic can bring vital insights for the prevention and control of the pandemic. …”
Get full text
Article -
7842
Anomaly detection in virtual machine logs against irrelevant attribute interference.
Published 2025-01-01“…Virtual machine logs may contain some abnormal logs that indicate security risks or system failures of the virtual machine platform. …”
Get full text
Article -
7843
-
7844
Issues of arms control in transatlantic relations (1963–1975)
Published 2024-07-01“…Against the backdrop of the rapid degradation and destruction of the international security architecture dating back to the Cold War, the problems of arms control in general and the proliferation of nuclear weapons in particular assume new significance. …”
Get full text
Article -
7845
Theoretical and numerical study of profit in agricultural sector model using wavelet method
Published 2025-03-01“…Agriculture is crucial in India’s economy and society, supporting rural livelihood and national food security. India is one of the world’s largest agricultural producers, with diverse crops and farming practices. …”
Get full text
Article -
7846
Gridlocked Streets or Simply Disinterested? Urban Youth and Unconventional Political Participation in Zimbabwe’s Second Republic
Published 2024-12-01“…The pervasive use of lawfare and state security apparatus continues to deter young people from exercising their constitutional rights as outlined in Sections 58 (freedom of assembly and association), and 59 (freedom to demonstrate and petition). …”
Get full text
Article -
7847
-
7848
General Data Protection Regulation Compliance and Privacy Protection in Wearable Health Devices: Challenges and Solutions
Published 2024-12-01“…Key themes were identified through thematic analysis, focusing on consent management, data minimization, encryption, and privacy-by-design strategies.Results: The review found that security breaches and informed consent are the most significant challenges in ensuring GDPR compliance. …”
Get full text
Article -
7849
Development of problem-based learning practicum modules for the dangerous goods course
Published 2023-12-01“…Providing Dangerous Goods material aims to discover how to handle and pack dangerous goods under predetermined regulations, not to endanger flight safety and security. However, the cadets felt that the Dangerous Goods course was challenging due to the lack of modules and difficulty understanding the very thick Dangerous Goods book. …”
Get full text
Article -
7850
Revenue policy features as an important direction of social policy
Published 2020-01-01“…The author rightly notes, that the income policy is aimed at solving such important tasks as helping vulnerable groups of the population by resorting to the use of the social security system and leveling the inflationary processes that affect the income and savings of citizens. …”
Get full text
Article -
7851
Family Green Financial Education Based on Local Wisdom: Exploring the Values of Coastal Communities’ Local Wisdom in Promoting Green Financial Literacy
Published 2025-01-01“…The findings reveal that the coastal communities of the Batang Hari River integrate local wisdom into their financial and resource management, prioritizing long-term security and sustainability. They view saving and asset ownership as essential for future stability and employ eco-friendly practices such as using durable goods, organic fertilizers, and sustainable fishing methods. …”
Get full text
Article -
7852
Model-Based Design, HIL Testing, and Rapid Control Prototyping of a Low-Cost POC Quadcopter with Stability Analysis and Control
Published 2022-01-01“…Unmanned aerial vehicles (UAVs), particularly quadcopters, have several medical, agriculture, surveillance, and security applications. However, the use of this innovative technology for civilian applications is still very limited in low-income countries due to the high cost, whereas low-cost controllers available in the market are often tuned using the hit and trial approach and are limited for specific applications. …”
Get full text
Article -
7853
-
7854
MARIJUANA USE WITHIN THE CONSTRUCTION WORKFORCE: THEORETICAL CONSIDERATIONS AND A RESEARCH PROPOSAL
Published 2017-12-01“…The social determinants of health negatively associated with work (the reasons why people drink or take recreational drugs) can be readily identified in construction work with temporary contracts, long working hours, and a lack of employment security for work within high-pressure and high-hazard environments. …”
Get full text
Article -
7855
Numerical Simulation of Tide and Tidal Current in Mangrove Creek
Published 2021-01-01“…Mangrove coast is one of the typical coasts in low latitude area.Mangrove is widely distributed in southern coastal cites of China,which is of great significance for tide resistance,shoal reinforcement,environmental protection and ecological security.However,mangrove hydrodynamics develops slowly in estuarine and coastal research.This paper establishes a two-dimensional hydrodynamic numerical model based on high-resolution scheme and ‘slot method’ to simulate and study the hydrodynamic characteristics of small-scale mangrove creek,and builds a simplified theoretical model based on water conservation to explore the relationship between maximum velocity and tide level.The results show that:The tidal current asymmetry in the creek is mainly affected by the incident tidal wave,and the topography in the creek cannot cause the alternation of asymmetric nature of tidal current;The mangrove is favorable for the flow structure in the creek to maintain the tidal flat and gather the materials;Mangrove has significant impact on the decrease of the longitudinal velocity on the tidal flat,but little effect on the transverse velocity;The density of natural mangrove has little effect on the velocity,and the increase of width of the deep channel promotes the flood-dominated tidal velocity;The tide level at maximum velocity is related to the depth-width ratio of the deep channel,the slope of the tidal flat and the scale of the deep channel,and affected by the flood-ebb time-asymmetry;The influence by tidal flat slope mainly comes from the change of tidal prism in the creek.The flood tide process is mainly controlled by the incident tidal wave at the entrance,while the ebb tide process is mainly affected by the volume of tidal prism in the creek.…”
Get full text
Article -
7856
واقع استخدام شبکة التواصل الاجتماعى الفیسبوک فى الأرشیفات الوطنیة العربیة والأجنبیة : دراسة تحلیلیة مقارنة...
Published 2018-04-01“…The study found that the existence of Arabarchives on internet is almost weak, and that some Arab archives do not use themeans of social communication in general due to lack of financial and humanresources and legal risks and security risks.The foreign archives update their face book pages almost daily ,whichmakes it logical to users to visit these pages on a regular basis ,and thecontinuity and updating of the update shows the importance given by the nationalarchives of its presence on face book unlike Arabic archives.The study also found that the Arab archives method is linked to web 1,and that the presence of Arab archives on the social networking site face book isan important presence of existence only on face book and does not reflect thehistorical value found in the Arab national archives.…”
Get full text
Article -
7857
Evaluasi Kebijakan Spasial Perlindungan Lahan Pertanian Pangan Berkelanjutan di Kecamatan Kaliwungu Kabupaten Kendal
Published 2021-01-01“…Researchers recommend that the socialization, cooperation between agencies and the implementation of activities to protect sustainable agricultural land should be carried out quickly, carefully and precisely in order to achieve food security in Kaliwungu District in particular and Indonesia in general.…”
Get full text
Article -
7858
An Analysis on Determinants of Cash and L/C Export: Findings from Türkiye’s Export
Published 2024-04-01“…The use of a letter of credit payment method by banks serves a protective role, enabling the parties to engage in trade more securely. While the expenses linked to this approach are sometimes viewed as challenging for the involved parties, it is considered a significant enabler, particularly in new trade alliances. …”
Get full text
Article -
7859
Constructing method of opaque predicate based on type conversion and operation of floating point numbers
Published 2023-10-01“…With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, software security has become a focal point in industry research.Code obfuscation is a common software protection technique used to hinder reverse engineering.It aims to make program analyzing and understanding more difficult for attackers while preserving the original program functionality.However, many existing code obfuscation techniques suffer from performance loss and poor concealment in pursuit of obfuscation effectiveness.Control flow obfuscation, particularly opaque predicate obfuscation, is widely used to increase the difficulty of code reverse engineering by disrupting the program’s control flow.A method was proposed to address the limitations of existing code obfuscation techniques.It utilized the phenomenon of precision loss that occurred during type conversion and floating-point number operations in computers.Under certain conditions, this method produced operation results that contradict common sense.By performing forced type conversion, addition, and multiplication with selected decimal numbers, a series of opaque predicates can be constructed based on the statistical analysis of their operation results.This approach achieved code obfuscation with high concealment, good generality, reversibility, and low overhead compared to traditional opaque predicates.Experimental verification demonstrates that this method significantly slows down attackers’ reverse engineering efforts and exhibits good resistance to dynamic analysis techniques such as symbolic execution.…”
Get full text
Article -
7860
Access to Healthcare in Rural Communities: A Bibliometric Analysis
Published 2023-12-01“…However, in the subsequent years of 2020 to 2022, there was a slight decline of 3 percent in the volume of U.S. publications. Australia secured the second position in terms of publications within the aforementioned timeframe of 2015 to 2022. …”
Get full text
Article