Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8581
Designing and Launching a System for Presenting Marine Charts and Spatial Information (Native Marine Web Service)
Published 2023-09-01“…,Which have sometimes been sanctioned for Iran, by Iranian sailors will bring special security-technical problems. The production and publication of nautical charts is the most important infrastructure of hydrographic knowledge.none of which have achieved the desired result, and at best, they were satisfied with the ability to load grid layers in one system. …”
Get full text
Article -
8582
Modern State and civil society: promising directions and forms of interaction in the field of public administration
Published 2023-10-01“…The promising directions of interaction between the modern State and civil society, which are divided into separate forms, include interaction of the State with members of diasporas through various institutions and practices, interaction of the State with civil society institutions formed by higher education students, interaction of the State with civil society in the field of environmental security of the State.…”
Get full text
Article -
8583
Java deserialization gadget chain discovery method based on hybrid analysis
Published 2022-04-01“…Java deserialization vulnerabilities have become a common threat to Java application security nowadays.Finding out the gadget chain determines whether this type of vulnerability can be exploited.Due to the large code space of Java applications and dependent libraries and the polymorphism of Java itself, manual analysis of Java deserialization gadget chains consumes a lot of time and effort and it is highly dependent on the experienced knowledge.Therefore, it is crucial to study how to efficiently and accurately automate the discovery of gadget chains.Java deserialization gadget chain discovery method based on hybrid analysis was proposed.Call graph based on the variable declaration type was constructed, and then the deserialization entry functions that may reach the dangerous functions were screened using the call graph analysis.The screened entry functions were used as the entry point of the hybrid information flow analysis.The hybrid information flow analysis was carried out for both pointer and tainted variables.The tainted objects created implicitly were marked.The tainted information and the pointer information were propagated simultaneously to construct the hybrid information flow graph.The reachability of external taint data propagation to the dangerous function was judged based on the hybrid information flow graph.The corresponding deserialization gadget chain was constructed according to the taint propagation path.The hybrid analysis took into account the efficiency of call graph analysis and the accuracy of hybrid information flow analysis.The corresponding static analysis tool, namely GadgetSearch, was implemented based on the proposed hybrid analysis method.In the experimental evaluation, GadgetSearch had lower false positive and lower false negative than the existing tool GadgetInspector on four datasets of Ysoserial, Marshalsec, Jackson historical CVE, and XStream historical CVE.Additionally, GadgetSearch also found multiple undisclosed gadget chains.The experimental results show that the proposed method can efficiently and accurately discover the Java deserialization gadget chain in multiple practical Java applications.…”
Get full text
Article -
8584
A lung nodule segmentation model based on the transformer with multiple thresholds and coordinate attention
Published 2024-12-01Get full text
Article -
8585
Practical skills of psychology bachelors in working with automated HR platforms
Published 2024-12-01“…Particular attention should be paid to improving data security, which is becoming critical when working with HR platforms, as employees’ personal data needs to be protected from unauthorized access. …”
Get full text
Article -
8586
Analysis of the Energy Complex Member of the EАEU Countries and the Formation of Groups-Technologies of its Digitalization
Published 2023-04-01“…It is concluded that digitalization of the electric power system on the technical side increases the energy security of the state and the competitiveness of the energy system on the world market, and on the economic side it helps to reduce costs at all stages of the entire technological cycle.…”
Get full text
Article -
8587
Integrating AutoGluon for Real-Time Monitoring and Classification of Dental Equipment Performance
Published 2025-01-01Get full text
Article -
8588
Socio-Adaptive Dimension of Students’ Personal Space
Published 2019-05-01“….; however, only a few pieces of research practically view the modal content of students' spatial organization within the limits of their social and adaptive security. Therefore, it is essential to develop empirical programs for studying the modal features of students' personal space in a socio-adaptive dimension. …”
Article -
8589
Digital literacy model to improve the marketing skills of micro, small, and medium enterprises women with a community-based educational approach
Published 2024-07-01“…The main challenges faced are difficulties adapting to digital technology and concerns about digital security. Most respondents still rely on conventional marketing methods and feel less confident managing digital marketing campaigns. …”
Get full text
Article -
8590
-
8591
-
8592
Employee Performance Evaluation Using A New Preferential Voting Process
Published 2020-11-01“…Twelve performance evaluation indicators extracted from the research background by experts in four categories with the titles of service compensation system in the first category; Job security, perceived organizational justice, perceived organizational support, and physical working conditions in the second category; Job characteristics, job clarity and ability of employees in the third category and job feedback, job stress, organizational citizen behaviour and motivation in the fourth category were ranked and documented using a linear optimization model based on the goal programming and policy. …”
Get full text
Article -
8593
Conflicts between indigenous and scientific concepts of landscape management for wildlife conservation: human-chimpanzee politics of coexistence at Bossou, Guinea
Published 2014-02-01“…The stated goals of the swidden preparation campaign was to secure land for subsistence purposes, but it is thought that the main driving factor was maintaining the right to decide matters like the allocation of tourism income, which the government research institute was attempting to usurp. …”
Get full text
Article -
8594
Effects of infield rainwater harvesting methods and organic manure in improving soil chemical properties and maize production in low rainfall area of Zimbabwe
Published 2025-12-01“…It can be concluded that the use of IP + P integrated with cattle manure + compost improves maize yields in smallholder farming environments in semi-arid areas and achieves food security.…”
Get full text
Article -
8595
Youth and the pandemic: health information imaginaries and practices while navigating COVID-19 in Nigeria
Published 2025-01-01“…The pandemic’s impacts included mental health issues and economic hardship, particularly in a country lacking social security or welfare plans. Following a low vaccination rate among participants, the data revealed vaccine lethargy, “vaccinformation void,” vaccine misinformation, vaccine distrust, and vaccine inaccessibility, due to various reasons and factors at play. …”
Get full text
Article -
8596
Effective factors on variations of wheat production in climatic regions of Fars province
Published 2020-06-01“…Therefore, a deeper understanding of the impact of regional climate change on production ensures global food security. Wheat is one of the most strategic crops and examining different aspects of its production is a necessity of every agricultural community. …”
Get full text
Article -
8597
Minimum Dietary Diversity Score and Associated Factors among Pregnant Women at Alamata General Hospital, Raya Azebo Zone, Tigray Region, Ethiopia
Published 2019-01-01“…Multivariate analysis revealed that being government employees (AOR = 4.87, CI: 1.70–13.95), merchant (AOR = 4.67, CI: 1.81–12.05), secured food (AOR = 3.85, CI: 2.12–6.97), and eating three meals and above (AOR = 2.66, CI: 1.47–4.82) were significantly associated with high MDDS among pregnant women. …”
Get full text
Article -
8598
Geography of Sand and Gravel Mining in the Lower Mekong River
Published 2013-12-01“…Currently, the most important issue in the Mekong basin is certainly the threat to the delta coastline because of its importance in terms of food security for the growing populations of Vietnam and Cambodia. …”
Get full text
Article -
8599
Geopolitics of Connectivity: The EU in Central Asia
Published 2024-12-01“…First, critical geopolitics will be operationalized with an emphasis on analytical categories such as discourse, hegemony, identity and ontological security. Thereafter, drawing upon the long-standing academic tradition of considering the EU as a geopolitical actor, the paper clarifies how, under the sway of the ongoing debate on strategic sovereignty (autonomy), the EU deploys the logic of inclusion and exclusion in its relations with third countries. …”
Get full text
Article -
8600
Addressing technology-mediated stigma in sexual health-related digital platforms: Insights from design team members.
Published 2025-02-01“…., pop-up notifications, infographics, and video-based testimonials, and avoiding the use of cookies or other security-risk features) and non-functional design considerations (i.e., adopting an interprofessional and collaborative approach to design, educating software designers on domain knowledge about stigma, and ensuring consistent user testing of content). …”
Get full text
Article