Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7861
La politique nationale de réconciliation et de relocalisation des populations déplacées dans le Liban d’après-guerre
Published 2022-01-01“…Such a policy on a nation-wide scale could only be elaborated and implemented by the state, since it required important financial resources, specific legislation and even security measures. A ministry and a fund for the displaced were created in 1992 to ensure the return of all displaced people in Lebanon. …”
Get full text
Article -
7862
Lentil plant disease and quality assessment: A detailed dataset of high-resolution images for deep learning researchMendeley Data
Published 2025-02-01“…By leveraging this dataset, researchers can explore innovative approaches to tackle challenges in lentil farming, contributing to sustainable agricultural practices and food security. Moreover, the dataset serves as a valuable resource for training and testing machine learning algorithms tailored to agricultural settings, facilitating advancements in automated agricultural technologies. …”
Get full text
Article -
7863
Spatio-temporal Distribution Characteristics and Future Trend Analysis of Extreme Climate Indices in Nenjiang River Basin over the Past 60 Years
Published 2025-01-01“…The study of extreme climate change in the Nenjiang River Basin is of great significance for ensuring ecological security and agricultural production. Based on the observation data such as daily temperature and precipitation from 12 meteorological stations in the Nenjiang River Basin between 1960 and 2020, this paper selects 26 extreme climate indices. …”
Get full text
Article -
7864
Human Capital Accounting and Financial Performance of Manufacturing Firms in Nigeria
Published 2025-01-01“…Research was undertaken from the Security and Exchange Commission platform on listed manufacturing firms spanning from 2010-2019. …”
Get full text
Article -
7865
Negotiations on a Ceasefire in the Process of Resolving an International Conflict: Theory and Practice
Published 2024-12-01“…In this context, creating conditions for ending the active phase of military actions seems to be an important and urgent task ensuring the end of a dangerous military crisis that has destroyed the foundations of European security.…”
Get full text
Article -
7866
Drought and Wetness Variability and the Respective Contribution of Temperature and Precipitation in the Qinghai-Tibetan Plateau
Published 2021-01-01“…Quantifying drought and wetness fluctuations is of great significance to the regional ecological environment and water resource security, especially in the fragile Qinghai-Tibetan Plateau (QTP). …”
Get full text
Article -
7867
Hybrid Botnet Detection Based on Host and Network Analysis
Published 2020-01-01“…Botnet is one of the most dangerous cyber-security issues. The botnet infects unprotected machines and keeps track of the communication with the command and control server to send and receive malicious commands. …”
Get full text
Article -
7868
Gender and affiliation differences in topic selection in U.S. congressional speeches
Published 2018-12-01“…The analyses showed that there are overall gender and affiliation differences in topic selection by the male and female politicians in the 113th Congress, some confirming the trend of long-standing prevalence of home-related references in women’s speeches, and death and religion references in men’s speeches, others marking a social shift for some of the categories compared to previous studies on the topic, such as the increasing share of references to work, money achievement in women’s speeches, as well as women’s preference for security, and men’s preference for competitiveness, as signaled by their lexical choices. …”
Get full text
Article -
7869
Prevention or Promotion? Predicting Author's Regulatory Focus
Published 2023-09-01“…For instance, some people seek growth and show eagerness, whereas others prefer security and are vigilant. The concept of regulatory focus is employed in psychology, to explain and predict this goal-directed behavior of humans underpinned by two unique motivational systems – the promotion and the prevention system. …”
Get full text
Article -
7870
Effective Combination of Advancing Transplantation Date with High-Yielding Cultivars for Paddy Rice Could Increase the Yield Potential Under Climate Warming in China
Published 2025-01-01“…Rice is one of the main grains in the world, the stability of its production and supply is directly related to global food security. Based on field observation data from 2000 to 2012 and a biophysical process-oriented CERES-Rice crop model at three typical sites, we investigated the effects of cultivar improvement, different transplanting dates and their interactions on rice yield potential in the major paddy rice production areas of China. …”
Get full text
Article -
7871
Re-Analyzing of Consequences and Methods of Climatological Changes Managements (Case Study: Iran’s Central Basin)
Published 2020-12-01“…Human beings can only provide security and the community with knowledge and management against its negative consequences. …”
Get full text
Article -
7872
Adversarial detection based on feature invariant in license plate recognition systems
Published 2024-12-01“…The presence of adversarial samples poses a significant threat to the application of deep neural networks, especially in security-sensitive scenarios like license plate recognition systems. …”
Get full text
Article -
7873
Noise-attention-based forgery face detection method
Published 2023-08-01“…With the advancement of artificial intelligence and deep neural networks, the ease of image generation and editing has increased significantly.Consequently, the occurrence of malicious tampering and forgery using image generation tools is on the rise, posing a significant threat to multimedia security and social stability.Therefore, it is crucial to research detection methods for forged faces.Face tampering and forgery can occur through various means and tools, leaving different levels of forgery traces during the tampering process.These traces can be partly reflected in the image noise.From the perspective of image noise, the noise components reflecting tampering traces of forged faces were extracted through a noise removal module.Furthermore, noise attention was generated to guide the backbone network in the detection of forged faces.The training of the noise removal module was supervised using SRM filters.In order to strengthen the guidance of the noise removal module, the noise obtained by the noise removal module was added back to the real face image, forming a pair of supervised training samples in a self-supervised manner.The experimental results illustrate that the noise features obtained by the noise removal module have a good degree of discrimination.Experiments were also conducted on several public datasets, and the proposed method achieves an accuracy of 98.32% on the Celeb-DF dataset, 92.61% on the DFDC dataset, and more than 94% on the FaceForensics++ dataset, thus proving the effectiveness of the proposed method.…”
Get full text
Article -
7874
“NEW PERIPHERY” AS A FACTOR FOR STRENGTHENING THE POSITIONS OF ISRAEL IN THE MIDDLE EAST
Published 2016-04-01“…The "periphery doctrine" was a grand strategy, meant to attain the major political-security goal of countering Arab hostility through relations with alternative regional powers and potential allies. …”
Get full text
Article -
7875
Europol’s Counter-Terrorism Role: over 25 Years of Partnership
Published 2024-10-01“…Value: The value of this article lies in its practical insights offering an internal perspective from a seasoned security practitioner focusing on operational and institutional realities as opposed to theoretical frameworks. …”
Get full text
Article -
7876
Interest Rate and Loan Portfolio Performance of Commercial Banks in Uganda: Case of Stanbic Bank.
Published 2023“…The findings show that the effect of prime lending on loan portfolio performance is that Central bank rate and collateral security have non-significant effects on loan portfolio performance. …”
Get full text
Thesis -
7877
Is Aquaculture a Success? Evidence from Africa
Published 2023“…Since its introduction in Africa, however, changes have been seen as it has contributed to food security and malnutrition and improved livelihoods by creating jobs and generating income. …”
Get full text
Article -
7878
The Effect of Poverty on The Social Welfare of Households in Kyanamira Sub-County Kabale District.
Published 2023“…The study concluded by recommending a multifaceted approach. including income diversification, improved education 11ccess, healthcare infrastructure enhancement, targeted food security interventions, and vocational training to empower youth and enhance employment opportunities. …”
Get full text
Thesis -
7879
INSTITUTIONAL INNOVATIONS AND FINANCIAL INCLUSION AMONG RURAL HOUSEHOLDS IN UGANDA,
Published 2024“…As more clients choose mobile banking, the report advises banking institutions to develop measures to improve security in the platform. The report also advises making these platforms straightforward and simple to use in order to attract more users to the business. …”
Get full text
Article -
7880
An Automated Voice Control Home System Using Arduino and Bluetooth Module Hc-05.
Published 2024“…Also, it suggests that Google Cloud Messaging be integrated to control our lighting system from the Internet as well as introduce security-sensitive functionality on the voice application.…”
Get full text
Thesis