Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8741
Case studies in adaptation: centring equity in global health education during the COVID-19 pandemic and beyond
Published 2023-04-01“…The COVID-19 pandemic disrupted all aspects of life globally and laid bare the pervasive inequities in access to education, employment, healthcare and economic security in both high-resource and low-resource settings. …”
Get full text
Article -
8742
Enhancing voice spoofing detection in noisy environments using frequency feature masking augmentation
Published 2025-03-01“…This technological evolution, however, introduces heightened security vulnerabilities such as voice spoofing attacks. …”
Get full text
Article -
8743
Temporal–Spatial Dynamics and Collaborative Effects of Cropland Resilience in China
Published 2025-01-01“…Cropland resilience is vital for ensuring national food security, promoting sustainable agricultural development, and adapting to global climate change. …”
Get full text
Article -
8744
Bleeding control of an injury to the infrarenal inferior vena cava and right external iliac vein by ipsilateral internal iliac artery and superficial femoral vein ligation after bl...
Published 2023-12-01“…This reduced the amount of bleeding, enabling us to secure the surgical field. We ultimately controlled the bleeding, and approximately 5 L of blood products were infused intraoperatively. …”
Get full text
Article -
8745
Age-Stage, Two-Sex Life Table of <i>Leptinotarsa decemlineata</i> (Coleoptera: Chrysomelidae) Experiencing Cadmium Stress
Published 2025-01-01“…This study holds valuable implications for more effective implementation of pest control strategies in the future, offering robust scientific evidence to support the safeguarding of food security.…”
Get full text
Article -
8746
The genomic pattern of insertion/deletion variations during rice improvement
Published 2024-12-01“…Abstract Background Rice, as one of the most important staple crops, its genetic improvement plays a crucial role in agricultural production and food security. Although extensive research has utilized single nucleotide polymorphisms (SNPs) data to explore the genetic basis of important agronomic traits in rice improvement, reports on the role of other types of variations, such as insertions and deletions (INDELs), are still limited. …”
Get full text
Article -
8747
Does heatwaves/above-average temperature increase interpersonal violent behavior? A scoping review
Published 2024-12-01“…., promoting green spaces and reducing pollution) and at the level of individual city institutions, which can monitor the phenomenon and take action, such as increasing the presence of security personnel in anticipation of periods of highest temperatures.…”
Get full text
Article -
8748
Understanding transmission pathways and integrated digital surveillance potential of antimicrobial resistance in Ethiopia in a One Health approach: a mixed-method study protocol
Published 2022-06-01“…The study’s data will be stored on a secure server known as Services for Sensitive Data hosted by the University of Oslo. …”
Get full text
Article -
8749
A file archival integrity check method based on the BiLSTM + CNN model and deep learning
Published 2025-03-01“…The findings set a new standard for archiving system integrity testing by showing the model’s dependability and security in several use scenarios.…”
Get full text
Article -
8750
Proximity-based solutions for optimizing autism spectrum disorder treatment: integrating clinical and process data for personalized care
Published 2025-01-01“…Rigorous data governance measures will ensure ethical and secure data management. This project will improve access to care, personalize treatments for better outcomes, shorten wait times, boost patient involvement, and raise ASD awareness, leading to better resource allocation. …”
Get full text
Article -
8751
Optimization and standardization of the work of a health care facility during a chemical accident
Published 2024-06-01“…It is established that the special management group, which includes representatives of various services, is of decisive importance in the effective management of a health care facility during a chemical incident: administration; communication department; security department; management of nurses and the department of infection control; human resources department; pharmacy; intensive care unit; department of engineering maintenance and repair; laboratory; kitchen; laundry; cleaning service and waste management. …”
Get full text
Article -
8752
A Novel AI-Based Integrated Cybersecurity Risk Assessment Framework and Resilience of National Critical Infrastructure
Published 2025-01-01“…The modern digital world is experiencing growing security risks, with cyber threats happening more often and becoming more complicated. …”
Get full text
Article -
8753
Validation of a scale based on the DigComp framework on internet navigation and cybersecurity in older adults
Published 2025-01-01“…This literacy refers to how they safely search for and manage information, as well as their competencies with regard to the security of their own devices. This scale was created through the adaptation of competencies 1.1, which consist of “browsing, searching and data filtering,” as well as 4.1, which considers “protecting devices,” from the DigComp model. …”
Get full text
Article -
8754
A Deep Learning-Based Approach for the Detection of Various Internet of Things Intrusion Attacks Through Optical Networks
Published 2025-01-01“…These results highlight XIoT’s capability to enhance IoT security by addressing real-world challenges, ensuring robust, scalable, and interpretable protection for IoT networks against sophisticated cyber threats.…”
Get full text
Article -
8755
Digital therapeutics in Korea: current status, challenges, and future directions – a narrative review
Published 2025-01-01“…The key challenges include underdeveloped regulatory frameworks, issues with data quality and security, and a lack of established reimbursement pathways. …”
Get full text
Article -
8756
Implementing sustainability frameworks at a product-level – Exploring the usability
Published 2025-02-01“…Based on the development of usability criteria and applying a waterfall selection process, we identified two frameworks (Food System Sustainable framework and Sustainable Nutrition Security framework) for further analysis. To test against usability, both frameworks were applied towards a case study of seven food products produced in Norway: milk, greenhouse tomatoes, greenhouse cucumbers, wheat, beef, sheep and pork. …”
Get full text
Article -
8757
Perceptions of cultural and provisioning ecosystem services and human wellbeing indicators amongst indigenous communities neighbouring the greater limpopo transfrontier conservatio...
Published 2025-01-01“…Overall, participants reported that both ESs contribute to their human wellbeing and livelihoods through life satisfaction, happiness, living standards, safety, security, and good health. Finally, this study's findings uniquely offer a baseline for these ESs accounting, demonstrating their direct and indirect benefits to indigenous communities' livelihoods and well-being.…”
Get full text
Article -
8758
Efficient Implementation of Mahalanobis Distance on Ferroelectric FinFET Crossbar for Outlier Detection
Published 2024-01-01“…Mahalanobis distance, the multivariate equivalent of the Euclidean distance, is used to detect the outliers in the correlated data accurately and finds widespread application in fault identification, data clustering, singleclass classification, information security, data mining, etc. However, traditional CMOS-based approaches to compute Mahalanobis distance are bulky and consume a huge amount of energy. …”
Get full text
Article -
8759
A Novel Mobility Concept for Terrestrial Wheel-Legged Lunar Rover
Published 2025-01-01“…This mobility concept offers the advantage of a self-locking function, which secures the leg positions even in the event of component failure - an improvement over systems with individual motors for each leg. …”
Get full text
Article -
8760
An action research study on the needs and perspectives of medical students and junior residents on peer physical examination guidelines to respect medical students’ autonomy and pr...
Published 2025-02-01“…Additionally, the need to take a balance between respecting students’ autonomy and securing model patients was noted. Conclusion Medical students and junior residents generally supported the PPE guidelines. …”
Get full text
Article