Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1641
Development of face image recognition algorithm using CNN in airport security checkpoints for terrorist early detection
Published 2025-01-01Subjects: “…airport security…”
Get full text
Article -
1642
Multi-hop broadcast message dissemination in vehicular ad hoc networks: A security perspective review
Published 2017-11-01“…Among these issues, those related to security are of particular importance. In this article, the main security issues of broadcast message dissemination in vehicular ad hoc networks are discussed. …”
Get full text
Article -
1643
-
1644
N − 1 Security Criteria Based Integrated Deterministic and Probabilistic Framework for Composite Power System Reliability
Published 2024-01-01“…In this paper, N − 1 security criteria based reliability of the composite power system (CPS) is proposed using an integrated deterministic and probabilistic framework (D-P) considering outage of the transmission line. …”
Get full text
Article -
1645
Studying the Common Chapter on the Competences of the Islamic Council Parliament and the Supreme National Security Council on the Issue of JCPOA
Published 2024-09-01Subjects: Get full text
Article -
1646
Approach of information security assessment for ATM system based on improved BP model of artificial neural network
Published 2011-01-01Subjects: Get full text
Article -
1647
Theorizing International Politics of Research, Science, and Technology: Implications for Global Governance, National Security, and Economic Growth
Published 2023-07-01“… This article examines the value of understanding the international politics surrounding research, science and technology (RST) in today‟s world.It encompasses intricate connections between nations, international organizations, and multinational enterprises,which is essential for economic growth, social development, and national security.The significance of elements like anarchy, capitalism, welfare, and security that influences the global politics of RST is highlighted in the essay.In order to counteract technology misuse, the authors stress the significance of establishing ethical standards. …”
Get full text
Article -
1648
The Impact of Peatland Damage and Its Influence on Food Security Policy in Sungai Apit Sub-District in 2023
Published 2025-01-01Subjects: Get full text
Article -
1649
A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks
Published 2013-05-01“…However, they have serious limitations in terms of security and usability. First, even though they are enhancements of other works, they still have several security flaws, such as vulnerability against parallel session, privileged-insider, and gateway-node bypassing attacks and lack of mutual authentication between user station and gateway node. …”
Get full text
Article -
1650
Religion and Public Policy: Digital-Based Islamic Political Economy and Human Security on Covid-19 Handling
Published 2022-07-01Subjects: Get full text
Article -
1651
End-Edge Collaborative Lightweight Secure Federated Learning for Anomaly Detection of Wireless Industrial Control Systems
Published 2024-01-01“…With the wide applications of industrial wireless network technologies, the industrial control system (ICS) is evolving from wired and centralized to wireless and distributed, during which eavesdropping and attacking become serious problems. To guarantee the security of wireless and distributed ICS, this article establishes an end-edge collaborative lightweight secure federated learning (LSFL) architecture and proposes an LSFL anomaly detection strategy. …”
Get full text
Article -
1652
A Blockchain-Assisted Federated Learning Framework for Secure and Self-Optimizing Digital Twins in Industrial IoT
Published 2025-01-01“…Optimizing digital twins in the Industrial Internet of Things (IIoT) requires secure and adaptable AI models. The IIoT enables digital twins, virtual replicas of physical assets, to improve real-time decision-making, but challenges remain in trust, data security, and model accuracy. …”
Get full text
Article -
1653
Deep learning–based resource allocation for secure transmission in a non-orthogonal multiple access network
Published 2022-06-01Get full text
Article -
1654
Ukraine-Russian Federation Relations within the Concepts of Security Dilemma and Responsibility To Protect (R2P)
Published 2023-07-01Subjects: “…international security…”
Get full text
Article -
1655
Recent advancements in durable and self-healing oil well cement: A pathway to secure carbon sequestration
Published 2025-02-01“…The integrity of the cement sheath in storage wells is essential to secure the subsurface CO2 storage, however, acidic CO2 can erode the cement sheath over time, leading to chemical and mechanical damages of cement, risking CO2 leakage. …”
Get full text
Article -
1656
Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain
Published 2019-09-01“…Moreover, hybrid blockchain provides advantages of interoperability, transparency traceability, and universal access. The formal security analysis of the proposed scheme is proved in the standard model, and informal security assures that our scheme provides resistance against possible attacks. …”
Get full text
Article -
1657
SYNERGY BETWEEN THE YOUTH AND A SECURED NATION: AN ATTEMPT TO DEVELOP NIGERIA THROUGH POLITICS AND ELECTORAL REMINISCENCE
Published 2024-05-01“…The study thereby recommends that; godliness, provision of employment opportunities by the government, secured borders, good parental care etc will improve on the security state of the nation. …”
Get full text
Article -
1658
Enhancing Secure Medical Data Communication Through Integration of LSB and DCT for Robust Analysis in Image Steganography
Published 2025-01-01“…Steganography enhances data security by embedding information seamlessly within digital channels. …”
Get full text
Article -
1659
Multidimensional comparative analysis of the number of students in Poland with the view to the demographic crisis and its impact on social security
Published 2024-12-01Subjects: Get full text
Article -
1660
2003 Handbook of Employment Regulations Affecting Florida Farm Employers and Workers: Social Security and Medicare [Federal]
Published 2003-07-01“… The purpose of Social Security and Medicare is to provide social benefits to qualified workers who retire, become disabled, and/or require medical assistance. …”
Get full text
Article