Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
9401
Prisoners in the community: the open prison model in Catalonia
Published 2021-02-01“…Abstract Open prisons are low-security penitentiary institutions in which life conditions are less strict than in closed prisons, and where prisoners have more contact with the outside world. …”
Get full text
Article -
9402
Challenges of Engineering Skillsets Essential for Driving Circularity of Smart Cities
Published 2025-01-01Get full text
Article -
9403
EXPLORING THE INFLUENCES ON DISPLACED CITIZENS' DECISION TO REPATRIATE: A CLASSIFICATION OF POSITIVE AND NEGATIVE FACTORS
Published 2024-12-01“…Positive factors include the improvement in the security situation, government programmes for displaced persons and the prospects for economic growth in the country as it begins to recover. …”
Get full text
Article -
9404
Effects of moss restoration on surface runoff and initial soil erosion in a temperate vineyard
Published 2025-02-01“…<p>Soil erosion threatens soil fertility and food security worldwide, with agriculture being both a cause and a victim. …”
Get full text
Article -
9405
Analysis of community older adult care facility construction and demand differentiation based on residential area and population attribute differences
Published 2025-02-01“…To explore the differences in the needs of older adult people in the community for older adult care services, this study selected three basic needs: life care, medical security, and cultural and entertainment, as the primary indicators of community older adult care needs. …”
Get full text
Article -
9406
Agricultural land use conflict identification and land degradation risk analysis from the perspective of spatial matching in the Ili River Valley
Published 2024-12-01“…[Objective] This study aimed to accurately identify agricultural land use conflicts and related potential land degradation risks, and provide a scientific reference for the rational allocation of land resources, optimization of agricultural production spatial layout, and protection of healthy and sustainable agricultural development and national food security. [Methods] In this study, a diagnosis and recognition method for agricultural land use conflicts was constructed from the perspective of spatial matching, and the types, intensity, and spatial distribution patterns of agricultural land use conflicts were quantitatively described. …”
Get full text
Article -
9407
Slope Aspect Differentiation of Pisha Sandstone Slide Erosion and Its Response to Meteorological Factors
Published 2024-12-01“…[Objective] As a typical mode of gravity erosion in the Pisha sandstone area, debris sliding has become a significant source of coarse sand material within gullies, seriously threatening the ecological security of the basin. Clarifying the erosion mechanisms in this region is of great importance for the ecological protection and high-quality development strategy of the Yellow River Basin. …”
Get full text
Article -
9408
Laryngeal cancer diagnosis based on improved YOLOv8 algorithm
Published 2025-01-01Get full text
Article -
9409
Health commodity management information system (Dagu-2 Software) implementation status in public health facilities of South-western Oromia, Ethiopia: a mixed method study
Published 2025-01-01“…To ensure an effective healthcare system, leveraging technology tools and securing stakeholder support through training are essential.…”
Get full text
Article -
9410
Salicylic acid confers cadmium tolerance in wheat by regulating photosynthesis, yield and ionic homeostasis
Published 2025-01-01“…Abstract Wheat (Triticum aestivum L.) productivity and quality can be threatened by soil cadmium (Cd) contamination, posing a concern to food security. Salicylic acid (SA) is an endogenously produced signaling molecule that activates the defense system imparting abiotic stress tolerance in plants. …”
Get full text
Article -
9411
Rice blast incidence and morphological variation of Magnaporthe oryzae, Cav. in Ebonyi State, Nigeria
Published 2024-11-01Get full text
Article -
9412
Mobile health in communication disorders: willingness to use, attitude, advantages, and challenges from the perspective of patients
Published 2025-01-01“…Addressing challenges such as inadequate technological infrastructure and data security is crucial for successful implementation.…”
Get full text
Article -
9413
-
9414
-
9415
FEAR OF SOCIAL ALIENATION OF LOVE AS GENDER CHARACTERISTICS
Published 2019-06-01“…The considered phenomenon of the fear of alienation of love is interpreted as the result of the ontological and gender alienation of a person who has lost a sense of security (due to the collapse of the value universe) and plunged into a continuous interindividual rivalry.…”
Get full text
Article -
9416
The Shiism Dimension in Iran's Relations with Europe: The Example of Germany-France-United Kingdom
Published 2023-12-01“…In this context, Iranian Shiism, which creates a socio-cultural system different from other civilizations around it, has become the main determinant on the security and foreign policy of today's Iran by intertwining with Persian nationalism since the reign of Shah Ismail. …”
Get full text
Article -
9417
-
9418
SAR-PATT: A Physical Adversarial Attack for SAR Image Automatic Target Recognition
Published 2024-12-01“…Deep neural network-based synthetic aperture radar (SAR) automatic target recognition (ATR) systems are susceptible to attack by adversarial examples, which leads to misclassification by the SAR ATR system, resulting in theoretical model robustness problems and security problems in practice. Inspired by optical images, current SAR ATR adversarial example generation is performed in the image domain. …”
Get full text
Article -
9419
Super-twisting sliding mode control of grid-side inverters for wind power generation systems with parameter perturbation
Published 2025-04-01“…Wind power generation systems (WPGSs) utilizing permanent magnet synchronous generators (PMSGs) are increasingly mandated to deliver more consistent, secure, and efficient electrical power to the grid under unpredictable weather circumstances. …”
Get full text
Article -
9420
Blockchain Technology Applications in Healthcare Supply Chains—A Review
Published 2024-01-01“…Blockchain’s features like security, traceability, transparency, cost efficiency etc. can help bring supply chain transparency, health record management and prevent drug counterfeiting. …”
Get full text
Article