Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7901
Unpacking the doctoral journey in India: Supervision, social support, and institutional factors influencing mental health and research engagement
Published 2025-01-01“…Findings indicate that (a) supervisory support, (b) peer collaboration, and (c) financial security significantly reduce stress and enhance engagement, while insufficient support and competitive peer dynamics increase anxiety and disengagement. …”
Get full text
Article -
7902
Route Selection of Multimodal Transport Based on China Railway Transportation
Published 2021-01-01“…The advantage of multimodal transport is that it can deliver the goods to their destination in a reasonable combination of transport modes while ensuring security and punctuality. Multimodal transportation can effectively reduce logistics costs, improve logistics efficiency, and reduce environmental pollution. …”
Get full text
Article -
7903
GIS-Based Identification and Analysis of Optimal Evacuation Areas and Routes in Flood-Prone Zones of Swabi District, Pakistan
Published 2024-01-01“…Evacuation planning designates secure zones, moderate-risk areas, and high-risk zones, emphasizing the need for flexible and adaptable routes in response to evolving flood scenarios. …”
Get full text
Article -
7904
Construction and optimization of the watershed-scale ecological network based on network characteristic analysis: A case study of the Lancang River Basin
Published 2025-02-01“…The growth of socio-economic development and human activities markedly threatens the ecological security of river basins. Establishing a robust ecological network (EN) is a viable solution to this problem. …”
Get full text
Article -
7905
Water conservation assessment and its influencing factors identification using the InVEST and random forest model in the northern piedmont of the Qinling Mountains
Published 2025-02-01“…The results and conclusions of this study could provide scientific insights for water security and ecosystem management in the NPQM region.…”
Get full text
Article -
7906
Virtual Node-Driven Cloud–Edge Collaborative Resource Scheduling for Surveillance with Visual Sensors
Published 2025-01-01“…For public security purposes, distributed surveillance systems are widely deployed in key areas. …”
Get full text
Article -
7907
Forest Plundering in the Forest Management Unit (KPH) Randublatung, Blora Regency: Types of Plundering and the Involvement of External Community Actors
Published 2024-08-01“…These actions were often supported by security forces.…”
Get full text
Article -
7908
WGAN-DL-IDS: An Efficient Framework for Intrusion Detection System Using WGAN, Random Forest, and Deep Learning Approaches
Published 2024-12-01“…The rise in cyber security issues has caused significant harm to tech world and thus society in recent years. …”
Get full text
Article -
7909
Experience of Filipinos with Spinal Cord Injury in the Use of Assistive Technology: An Occupational Justice Perspective
Published 2020-01-01“…Exploring the experience of the participants in using AT yielded four themes, namely, (1) engaging in occupations despite limited opportunities, (2) going to various locations amidst an inaccessible environment, (3) striving towards inclusion in spite of attitudinal barriers, and (4) securing needs in light of unfavourable life conditions. …”
Get full text
Article -
7910
Geriatric Syndromes and Abandonment
Published 2023-12-01“…<br /><strong>Methods:</strong> a cross-sectional, descriptive, analytical and correlational study was carried out in the Family Medicine Unit No. 33 of the Mexican Social Security Institute of Tabasco. The sample was made up of 203 patients aged 60 and over, who attended Family Medicine and Continuing Medical Care consultations. …”
Get full text
Article -
7911
Surrogate Safety Analysis of Pedestrian-Vehicle Conflict at Intersections Using Unmanned Aerial Vehicle Videos
Published 2017-01-01“…However, it suffers from heavy labor work, high cost of maintenance, and even security restrictions. Data collection and processing remains a common challenge to traffic conflict analysis. …”
Get full text
Article -
7912
AnomLite: Efficient binary and multiclass video anomaly detection
Published 2025-03-01“…Anomaly detection in video surveillance is critical for ensuring public safety, as manual monitoring of numerous video feeds is often challenging and prone to human error. Security operators can struggle to maintain focus over prolonged periods, leading to missed events or delayed responses. …”
Get full text
Article -
7913
Micro-Expression Recognition Using Convolutional Variational Attention Transformer (ConVAT) With Multihead Attention Mechanism
Published 2025-01-01“…Micro-Expression Recognition is crucial in various fields such as behavioral analysis, security, and psychological studies, offering valuable insights into subtle and often concealed emotional states. …”
Get full text
Article -
7914
Utilizing hydrophobic sand to construct an air permeable aquiclude to enhance rice yields
Published 2025-01-01“…Abstract The Chinese government attaches great importance to the ecological restoration of abandoned open-pit mines, increasing the area of cultivated land, and ensuring food security. Soil reconstruction is a crucial step in ecological restoration of abandoned open-pit mines. …”
Get full text
Article -
7915
A Timer and Mixed Integer Linear Programming Load Shedding Scheme for Resilient DC Microgrids
Published 2025-01-01“…These improvements highlight the potential of the proposed scheme to support robust, secure, and resilient DC microgrid operation.…”
Get full text
Article -
7916
Variation in a single allele drives divergent yield responses to elevated CO2 between rice subspecies
Published 2025-01-01“…Our findings identify the indica DNR1 gene as a key breeding resource for sustainably enhancing nitrate uptake and rice yields in japonica varieties, potentially contributing to global food security as atmospheric CO2 levels continue to increase.…”
Get full text
Article -
7917
Effects of Elevated CO<sub>2</sub> on Maize Physiological and Biochemical Processes
Published 2025-01-01“…This balance is essential for optimizing maize cultivation for food security, biofuel production, and environmental sustainability.…”
Get full text
Article -
7918
Synergistic Effects of Salicylic Acid, Hydrogel, and Sulphur Sources for Boosting the Yield of Rapeseed under Limited Irrigation
Published 2025-01-01“…Recent studies have explored methods to improve water use efficiency, and this study focuses on applying bioregulators to increase rapeseed yield under water-limited conditions, thereby contributing to food security and sustainability. A field experiment was conducted at the Agricultural Research Farm of Lovely Professional University during the 2021–2022 and 2022–2023 rabi seasons. …”
Get full text
Article -
7919
New challenges and problems of the nancial market in the open bank system conditions
Published 2018-09-01“…The implementation of Open Banking Standard in real time will allow to open access for the consumer to more personalized information resources, and services will be provided through a secure open service in order to more effectively manage personal finances. …”
Get full text
Article -
7920
A Lightweight Anti-Unmanned Aerial Vehicle Detection Method Based on Improved YOLOv11
Published 2024-12-01“…Research on anti-UAV (anti-unmanned aerial vehicle) detection techniques is essential, since the widespread use of UAVs, while improving convenience, poses several hidden risks to privacy, security, air control, etc. This paper focuses on the challenges of long-distance UAV identification and proposes a lightweight anti-UAV detection method based on improved YOLOv11. …”
Get full text
Article