Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8541
Evaluating the validity of self-reported smoking in Mexican adolescents
Published 2015-10-01Get full text
Article -
8542
TRANSNATIONAL THREATS AND FOREIGN POLICY SHIFTS: INVESTIGATING THE IMPACT OF GLOBALIZATION ON WEST AFRICAN COUNTRIES
Published 2024-08-01“…Therefore, the findings revealed that globalisation, while promoting economic growth, cultural interaction, and technical progress in West Africa states, has also given rise to non-state actors like terrorists and has disruptive consequences for sovereignty and national security. Therefore, the paper concluded that it is necessary for West Africa nations to establish efficient governance systems, regional collaboration platforms, and policies that capitalise on the advantages of globalisation while minimising its negative consequences. …”
Get full text
Article -
8543
RESIDENTS’ COMPLIANCE WITH BUILDING SETBACKS IN IBADAN NORTH LOCAL GOVERNMENT AREA OF OYO STATE, NIGERIA
Published 2024-08-01“…The majority of the setbacks that were converted to other uses in low residential areas was used for security post (81.6%) while the largest proportion (35.4%) in medium and high-density areas (15.7%) were used for shop construction. …”
Get full text
Article -
8544
TIBW: Task-Independent Backdoor Watermarking with Fine-Tuning Resilience for Pre-Trained Language Models
Published 2025-01-01“…This work provides a secure and reliable IP protection mechanism for NLP models, ensuring watermark integrity across diverse applications.…”
Get full text
Article -
8545
From the guest editors
Published 2013-07-01“…Specifically, he co-authored a textbook in Mathematical Biology in 2001 (second edition in 2012); a volume (with Harvey Thomas Banks) on the use of mathematical models in homeland security published in SIAM's Frontiers in Applied Mathematics Series (2003); and co-edited volumes in the Series Contemporary Mathematics entitled ``Mathematical Studies on Human Disease Dynamics: Emerging Paradigms and Challenges'' (American Mathematical Society, 2006) and Mathematical and Statistical Estimation Approaches in Epidemiology (Springer-Verlag, 2009) highlighting his interests in the applications of mathematics in emerging and re-emerging diseases. …”
Get full text
Article -
8546
Insider threat detection based on operational attention and data augmentation
Published 2023-06-01“…In recent years, there has been an increased focus on the issue of insider threats.Insider threats are a major cause security breaches in organizations and pose an ongoing challenge.By analyzing the existing insider threat data, it was identified that the biggest challenge in insider threat detection lies in data imbalance and the limited number of labeled threat samples.In the Cert R4.2 dataset, which is a classic dataset for insider threat detection, there are over 3.22 million log data, but only 7,423 are marked as malicious operation logs.Furthermore, most of the operation types in the logs are not related to malicious behavior, and only two types of operations are highly correlated with malicious behavior, such as leaking company data, creating interference in the detection process.To address this challenge, a data processing framework was designed based on operational attention and data augmentation.Anomaly evaluation was first performed on operations by the framework, and operations with low anomaly scores were then masked.This makes the model better focus on operations related to malicious behavior, which can be considered as a hard attention mechanism for operations.Next, the characteristics of the insider threat dataset were analyzed, and three rules were designed for data augmentation on malicious samples to increase the diversity of samples and alleviate the substantial imbalance between positive and negative samples.Supervised insider threat detection was regarded as a time-series classification problem.Residual connections were added to the LSTM-FCN model to achieve multi-granularity detection, and indicators such as precision rate and recall rate were used to evaluate the model.The results indicate superior performance over existing baseline models.Moreover, the data processing framework was implemented on various classic models, such as ITD-Bert and TextCNN, and the results show that the methods effectively improve the performance of insider threat detection models.…”
Get full text
Article -
8547
Burden of scabies in a Ghanaian penitentiary.
Published 2024-01-01“…Therefore, we aimed to assess the burden of scabies and ascertain if prevalence was high enough to warrant mass drug administration (MDA) with ivermectin in a medium security prison in central Ghana.<h4>Methods</h4>We conducted a cross-sectional study in December 2022 and recruited inmates at the Kumasi central prison in Ghana. …”
Get full text
Article -
8548
About a concept of creating a social network users information aggregation and data processing system
Published 2019-02-01“…The developed universal system is based on the information technology of data warehousing, and it has the following aspects: an expandable complex subject area, the integration of stored data that come from various sources, the invariance of stored data in time with mandatory labels, relatively high data stability, the search for necessary trade-off in data redundancy, modularity of individual system units, fl and extensibility of the architecture, high security requirements vulnerable data.The proposed system organizes the process of collecting data and filling the database from external sources. …”
Get full text
Article -
8549
Corneal Debridement Combined with Intrastromal Voriconazole for Recalcitrant Fungal Keratitis
Published 2018-01-01“…Corneal debridement combined with intrastromal voriconazole is a secure and effective treatment for recalcitrant fungal keratitis.…”
Get full text
Article -
8550
Realizacja prawa człowieka do żywności: uwagi wstępne na temat oceny bezpieczeństwa żywnościowego
Published 2022-03-01“…Celem pracy jest analiza realizacji prawa do żywności w różnych krajach oraz określenie wyzwań związanych z interpretacją wartości globalnego wskaźnika bezpieczeństwa żywnościowego (Global Food Security Index, GFSI). Liczba osób niedożywionych zwiększa się w Afryce Subsaharyjskiej i Południowej Azji, a jednocześnie rośnie udział osób z nadwagą w Ameryce Północnej i Europie. …”
Get full text
Article -
8551
An Exploratory Investigation of Chatbot Applications in Anxiety Management: A Focus on Personalized Interventions
Published 2024-12-01“…However, limitations persist, such as the lack of human empathy, ethical and privacy concerns related to data security, and technical challenges in understanding complex human emotions. …”
Get full text
Article -
8552
ECONOMIC SANCTIONS AS A CONCEPT OF POWER POLITICS
Published 2018-07-01“…Such an asymmetry fuels a debate between those who consider sanctions as an effective and legitimate instrument (US, EU and other developed states) and those who believe that only the UN Security Council can be a legal source of sanctions, while others are illegal (supported by Russia, China and several dozens of developing countries). …”
Get full text
Article -
8553
Development and implementation of an electronic health record system for use in humanitarian emergencies, disaster response, and conflict zones.
Published 2025-01-01“…Ongoing and future work in adapting electronic health records to international humanitarian response will emphasize data security, patient privacy, equity, and the rapid translation of electronic health data to improve population health. …”
Get full text
Article -
8554
Special criminology measures for preventing unvoluntary leaving a military unit or place of service
Published 2023-10-01“…This problem can have a negative impact on the effectiveness of military operations, the security of the country and trust in the representatives of the military management and defense sector. …”
Get full text
Article -
8555
Why do people use a mobile wallet? The case of fintech companies in Jordan
Published 2024-04-01“…Meanwhile, perceived value, security, privacy, and social influence had a moderate effect. …”
Get full text
Article -
8556
The blue revolution: sustainable water management for a thirsty world
Published 2025-01-01“…Abstract The twenty-first century presents critical challenges to global water resources, with rising consumption, scarcity, and security issues threatening human well-being and ecosystem health. …”
Get full text
Article -
8557
Combating land degradation for sustainable smallholder agriculture and food sovereignty in Ghana’s Volta Region
Published 2025-01-01“…It offers valuable insights for policymakers and practitioners, underscoring the urgent need for targeted interventions to address land degradation while supporting sustainable agriculture and food security in Ghana and similar contexts.…”
Get full text
Article -
8558
Semi-in-situ cutting force measurement of a jigsaw
Published 2025-03-01“…A measurement rig was designed to securely mount the saw, the load cell, and the inductive sensors needed for speed measurements, making it possible to measure cutting forces accurately under different working conditions. …”
Get full text
Article -
8559
Autophagy: A New Avenue and Biochemical Mechanisms to Mitigate the Climate Change
Published 2024-01-01Get full text
Article -
8560
Spatiotemporal analysis of urban expansion and its impact on farmlands in the central Ethiopia metropolitan area
Published 2025-01-01“…Abstract Urban growth in sub-Saharan Africa presents significant challenges to sustainable development, food security, and environmental conservation. The rapid urban expansion and impact on agricultural land reduction in central Ethiopian metropolitan areas (Addis Ababa and Sheger city) exemplify these issues while simultaneously offering opportunities for sustainable development. …”
Get full text
Article