Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8601
Application of Classical and Genomic Cryptography on Textual Dataset
Published 2024-12-01“…Cryptology is one of the methods used when sharing confidential or private data over any communication network that poses a security risk. It is applied to restrict access, minimize or completely prevent dangerous situations. …”
Get full text
Article -
8602
Finding influential nodes in complex networks based on Kullback–Leibler model within the neighborhood
Published 2024-06-01“…Abstract As a research hot topic in the field of network security, the implementation of machine learning, such as federated learning, involves information interactions among a large number of distributed network devices. …”
Get full text
Article -
8603
Managing agricultural water use in the Western United States: A search for efficient climate adaptation institutions
Published 2025-03-01“…The contribution of this work is to fill a gap in previous research by assessing the economic performance of various water trading arrangements for adapting to water shortages. We secured U.S. Department of Agriculture data on irrigation water use patterns in the central part of the Rio Grande Basin of the American Southwest to support formulation of a mathematical model predicting water use patterns to assess impacts on farm income associated with a range of water shortages and water trading arrangements for adapting to these shortages. …”
Get full text
Article -
8604
Human drone interaction in delivery of medical supplies: A scoping review of experimental studies.
Published 2022-01-01“…Users must become integral part of the whole development process of medical drone services to reduce concerns, and to improve security, usability and usefulness of the system. Human drone interaction should be developed according to the identified categories of human drone interaction by using demand- and technology-driven approaches.…”
Get full text
Article -
8605
Advancing Sustainable Development Goals through Earth Observation Satellite Data: Current Insights and Future Directions
Published 2025-01-01“…For example, Sentinel data support both marine ecosystem monitoring (SDG 14) and climate adaptation (SDG 13), while Landsat data contribute to food security (SDG 2) and water resource management (SDG 6). …”
Get full text
Article -
8606
War and Peace of Peter the Great
Published 2021-12-01“…Petersburg, the transfer of the capital to it, the construction of a defensive system at the mouth of the Neva all this was aimed at securing the mouth of the Neva for Russia. Russia agreed to the conclusion of a peace, according to which it received only Ingria and Karelia – the old Russian provinces.After the victory under Poltava in 1709, a new struggle for peace began. …”
Get full text
Article -
8607
Factors influencing academic staff satisfaction and continuous usage of generative artificial intelligence (GenAI) in higher education
Published 2025-02-01“…The social influence did not correlate positively with the use of GenAI. Security and privacy were positively associated with staff satisfaction. …”
Get full text
Article -
8608
Integrating artificial intelligence and Internet of Things (IoT) for enhanced crop monitoring and management in precision agriculture
Published 2024-01-01“…Developing robust AI models and IoT devices for varied agricultural conditions, creating user-friendly interfaces for farmers, and addressing privacy and security concerns are essential. Addressing these gaps can enhance the effectiveness and adoption of AI and IoT in precision agriculture, leading to more sustainable and productive farming practices.…”
Get full text
Article -
8609
Process of effective management of the Eurasian transport system on the terms of integration
Published 2023-12-01“…Ensuring stability, security and prosperity in the Eurasian region meets interests of many states, primarily Russia and China, as well as their closest partners. …”
Get full text
Article -
8610
Batch-in-Batch: a new adversarial training framework for initial perturbation and sample selection
Published 2025-01-01Get full text
Article -
8611
Simultaneous Classification of Objects with Unknown Rejection (SCOUR) Using Infra-Red Sensor Imagery
Published 2025-01-01“…Recognizing targets in infra-red images is an important problem for defense and security applications. A deployed network must not only recognize the known classes, but it must also reject any new or <i>unknown</i> objects without confusing them to be one of the known classes. …”
Get full text
Article -
8612
Public Perception of Genetically Modified Organisms and the Implementation of Biosafety Measures in Kenya
Published 2024-01-01“…Fifty-seven percent of the respondents indicated GMOs and genetically modified (GM) foods are a solution to food security in Africa. A majority believe that the introduction of GMO technology and the use of GM food is beneficial (52.3%). …”
Get full text
Article -
8613
-
8614
Philosophical Ideas of Arne Næss in the Humanitarian Diplomacy of Norway
Published 2015-06-01“…The author of the arcticle makes it a point to show on separate examples to what extend the ideas of Næss A. are compatible with the basic principles of Norway's contemporary humanitarian diplomacy - humanity, neutrality, impartiality and independence, - as well as with the aims put forward by Norway in this respect which are to encure the needed with the necessery security and assistance; to finance humanitarian actions based on the international principles of humanity, neutrality, impartiality and independence; to prepare international community to responses to global humanitarian challenges of the future; to prevent and respond to humanitarian crises and participate in eleminating their aftermath. …”
Get full text
Article -
8615
Effects of intravaginal curcumin gels combined with electroporation on vulvovaginal candidiasis
Published 2025-01-01Get full text
Article -
8616
Reversible data hiding scheme based on enhanced image smoothness
Published 2022-06-01“…With the prosperity of Internet technology and the popularity of social networks, reversible data hiding technology has been widely adopted in concealed information transmission of medical and military fields with its advantages on secret information recovery.Traditional reversible data hiding schemes mainly focus on the enhancement of embedding capacity and the reduction of the distortion rate of stego image, but pay less attention to the understanding of image details with the human eyes.Thus, it is difficult to resist hidden information detection methods.To solve the above challenge, a reversible data hiding algorithm was proposed, which ensured the visual quality of the stego image in the process of data hiding through the image visual smoothness enhancement.Specifically, the original image was divided into reference area and non-reference area.The secret data was embedded through the translation of the difference, which was calculated according to the predicted pixel value and the original pixel value of the non-reference area.To guarantee the visual quality of the image, smoothing mechanism was constructed, in which a Gaussian filter was utilized as a template to filter the predicted value and to add the filter difference into the cover image without loss.The pixel value of the reference region was used as edge information for lossless restoration of the original image.The filtering coefficient in Gaussian function was exploited as the embedded key to ensure the security of secret information.Simulation results regarding a large number of classical image data sets illustrated that the visual smoothness of stego image processed by this scheme was effectively enhanced with lower distortion rate, higher embedding rate, and higher embedding and extraction efficiency.In a typical circumstance, the similarity between the generated stego image and the Gaussian filter image can reach 0.9963.The PSNR and the embedded capacity can be up to 37.346 and 0.3289 BPP, respectively.…”
Get full text
Article -
8617
-
8618
Neural Networks Application for the Data of PID Controller for Acrobot
Published 2022-01-01“…The purpose of this method is to increase the security of the system against the attack of hackers on facilities of the automatic control system. …”
Get full text
Article -
8619
The concept and significance of forensic characteristics of the unlawful seizure of enterprise, institution or organisation property
Published 2023-12-01“…This criminal offence causes economic losses to both business entities and the state as a whole, reduces the level of economic security and, as a result, the level of investment, discredits the work of government agencies, undermines the authority of the state at the international level, etc. …”
Get full text
Article -
8620
A small object detection model in aerial images based on CPDD-YOLOv8
Published 2025-01-01Get full text
Article