Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8981
Intelligent Ensemble Deep Learning System for Blood Glucose Prediction Using Genetic Algorithms
Published 2022-01-01Get full text
Article -
8982
Localization and detection of deepfake videos based on self-blending method
Published 2025-01-01“…Abstract Deepfake technology, which encompasses various video manipulation techniques implemented through deep learning algorithms-such as face swapping and expression alteration-has advanced to generate fake videos that are increasingly difficult for human observers to detect, posing significant threats to societal security. Existing methods for detecting deepfake videos aim to identify such manipulated content to effectively prevent the spread of misinformation. …”
Get full text
Article -
8983
Formation of Russian magistracy: implementation of the digital economy requests in the educational process
Published 2020-02-01“…As the main results, information on the use of modern educational technologies in the preparation of Russian undergraduates has been given – a conclusion has been made about the small distribution of on-line education and network programs in universities.The research data characterizing the degree of digital competencies of Russian graduate students have been adduced: information search and processing, use of IT technologies, information security, ability to work with «big» data. It has been noted, that these skills are well developed among modern students, but the participation of universities in their development is low. …”
Get full text
Article -
8984
Wind Energy Resource Prediction and Optimal Storage Sizing to Guarantee Dispatchability: A Case Study in the Kenyan Power Grid
Published 2022-01-01“…Thus, after their installation and integration into the grid, they impose a new challenge for the secure, reliable, and economic operation of the system. …”
Get full text
Article -
8985
Comparative analysis of the concepts of “law enforcement agencies” and “discretionary powers” in the international legal systems
Published 2024-12-01“…An important part of the study is an assessment of how national legal systems interpret the powers of law enforcement agencies, including the police, prosecutors and other state institutions that contribute to law enforcement and security. Particular attention is paid to how these powers affect the efficiency and effectiveness of law enforcement, as well as the ability of law enforcement officers to make decisions in real, often unpredictable situations. …”
Get full text
Article -
8986
A Novel Rapeseed Mapping Framework Integrating Image Fusion, Automated Sample Generation, and Deep Learning in Southwest China
Published 2025-01-01“…Rapeseed mapping is crucial for refined agricultural management and food security. However, existing remote sensing-based methods for rapeseed mapping in Southwest China are severely limited by insufficient training samples and persistent cloud cover. …”
Get full text
Article -
8987
Risks-based Stand Normality for Sustainable Yield Forest Plantation in Perum Perhutani
Published 2013-07-01“…In any situation, either secure or insecure, teak forest plantations encounter high risks due to ecological and social disturbances, causing degradation and decrease their normality in terms of areas and standing stock. …”
Get full text
Article -
8988
Determinants of Seed Distribution System: The Case of Womberma District, North West Ethiopia
Published 2021-01-01“…Bread wheat also known as common wheat is one of the most important crops for food security and job opportunities for many smallholders as well as the urban population in Ethiopia. …”
Get full text
Article -
8989
Geospatial monitoring and analysis of agricultural drought to identify hotspots and risk assessment for Senegal
Published 2025-02-01“…Agricultural drought, characterized by insufficient soil moisture crucial for crop growth, poses significant challenges to food security and economic sustainability, particularly in water-scarce regions like Senegal. …”
Get full text
Article -
8990
Classifying IoT Botnet Attacks With Kolmogorov-Arnold Networks: A Comparative Analysis of Architectural Variations
Published 2025-01-01“…The integration of KAN-based models into existing cybersecurity frameworks can enhance the detection and mitigation of sophisticated botnet threats, thus contributing to more resilient and secure IoT ecosystems.…”
Get full text
Article -
8991
Displacing the Christian Theodicy of Hell: Yi Kwangsu’s Search for the Willful Individual in Colonial Modernity
Published 2025-01-01“…Specifically, first, we will show that Yi’s Christian imaginary of hell is reformulated through the traditional imaginaries of hell in which, regardless of the existence of God’s sovereignty over the created order, the sufferings of sinners in hell function to secure social norms and orders. In doing so, we claim that the Christian imaginary of hell in <i>The Heartless</i> is relegated to a rhetorical means to beget the need for the self-awakening of the inner-self through which individual desires can be freed from the influences of Confucian morality as well as Christian theodicy. …”
Get full text
Article -
8992
Administrative and Legal Status of Law Enforcement Agencies as Subjects of Interaction with Financial Institutions in the Sphere of Combating the Legalization of Criminal Proceeds
Published 2019-12-01“…Such agencies are the National Anti-Corruption Bureau of Ukraine, the agencies of the Security Service, the National Police and Prosecutor’s Office, the State Bureau of Investigation, the tax police units of the State Fiscal Service of Ukraine. …”
Get full text
Article -
8993
Magnitude and Predictors of Dietary Diversity among HIV-Infected Adults on Antiretroviral Therapy: The Case of North-Western, Ghana
Published 2024-01-01“…Starchy staple foods and flesh food were the most consumed foods, while organ meats, dairy products, and eggs were eaten less. Having a secured salary paid job, not taking cotrimoxazole prophylaxis, and being a young adult were strong predictors of a high dietary diversity score. …”
Get full text
Article -
8994
Application of Blockchain Technology in Carbon Trading Market: A Systematic Review
Published 2025-01-01“…The rapid expansion of the market and the accompanying challenges underscore the need for blockchain technology (BCT), which offers a decentralised, secure, and tamper-proof system. Although several research publications have demonstrated the potential enhancements that BCT could contribute to the carbon market, no systematic review has yet examined the optimal implementation of BCT within the context of carbon trading and taxation. …”
Get full text
Article -
8995
NEW «PARASITIC CLASS»: ON THE CONCEPT OF MIKHAIL VOSLENSKY
Published 2024-12-01“…Particular attention is paid to the subordination of the security forces to party control through mechanisms of the Central Committee, which minimized risks to the nomenklatura system. …”
Get full text
Article -
8996
Combined application of vermicompost and mineral K fertilizer improves root yield of sweet potato [Ipomoea batatas (L.) Lam] in Southern Ethiopia
Published 2025-02-01“…Eventually, this has led to a decline in food security. Although the rate depends on many factors, organic inputs such as vermicomposts are suggested as alternatives or combined with mineral fertilizers. …”
Get full text
Article -
8997
Ottoman Approach to Shia and Sunni State Officers of Syria in the Examples of Fakhreddin Maanoğlu and Ali Canpolad between 1570s and 1630s
Published 2024-12-01“…In the meantime, we shall also shortly explore how the Ottoman formidable enemies of the time interpreted the religious sectarianism and identity politics for the sake of their own security and interests.…”
Get full text
Article -
8998
Eat a little and save a little: A qualitative exploration of acceptability of a potential savings intervention to reduce HIV risk among female sex workers in Western Kenya.
Published 2024-01-01“…Saving interventions to improve financial security have the potential to reduce HIV risk among FSWs.…”
Get full text
Article -
8999
A Cloud-Based Optimized Ensemble Model for Risk Prediction of Diabetic Progression—An Azure Machine Learning Perspective
Published 2025-01-01“…The experiment is performed and implemented in Microsoft’s Azure cloud, using Azure Machine Learning service, that leverages the advantages of cloud computing with respect to scalability, security and its potential integration possibilities into IoT-based smart healthcare systems.This aspect highlights its versatility and impact with respect to remote monitoring of patients as well. …”
Get full text
Article -
9000
Venezuela: Political Confrontation and the World Community
Published 2020-11-01“…The inability or unwillingness of external forces to reach compromise and to bring the parties to the negotiating table can pose a threat to peace and international security.As a result, Venezuela has become one of the most turbulent countries in the region. …”
Get full text
Article