Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1901
Trade-off between computation time and solution quality for integrated generation and transmission expansion planning with N-1 security criterion
Published 2025-03-01Subjects: Get full text
Article -
1902
Effective Safety and Security Measures in the Prevention of Various Crimes in Selected Ordinary, Public Secondary Schools: A Participatory Framework Approach
Published 2024-12-01Subjects: “…safety and security…”
Get full text
Article -
1903
AN ECONOMIC EVALUATION OF THE PERFORMANCE EFFICIENCY OF CONSERVATION AGRICULTURE AND FOOD SECURITY PROJECTS USING LOGISTIC REGRESSION IN IRAQ FOR THE 2022-2023 SEASON
Published 2024-12-01“…This research involved an economic evaluation of the performance efficiency of conservation agriculture and food security projects using logistic regression in Iraq for the 2022-2023 agricultural season. …”
Get full text
Article -
1904
Artificial noise-aided robust secure information and power transmission scheme in heterogeneous networks with simultaneous wireless information and power transfer
Published 2019-03-01Subjects: “…physical layer security…”
Get full text
Article -
1905
Evaluation of Network Security Service Provider Using 2-Tuple Linguistic Complex q-Rung Orthopair Fuzzy COPRAS Method
Published 2022-01-01“…However, many enterprises lack the necessary resources to secure information security, and selecting the best network security service provider has become a real issue for many enterprises. …”
Get full text
Article -
1906
Enhancing Tenure Security: A Case Study of the Social Forestry Scheme in the State Forestry Corporation, Malang District, East Java
Published 2024-03-01Subjects: Get full text
Article -
1907
A Collaborative Data Network for the Asia Oceania Region Enabled by Emerging Technologies to Foster Innovation in a Secure and Open Environment
Published 2025-01-01“…To ensure ownership is always clear, and subsequent use of data is tracked, we harness blockchain technology alongside smart contracts and decentralised identifiers to allow secure discovery and sharing. The use of blockchain will ensure the information about each dataset (metadata, provenance, and access rights) is immutably connected to each dataset. …”
Get full text
Article -
1908
-
1909
Improvement of the conceptual principles of activity of the Ministry of Internal Affairs of Ukraine as a subject of the formation and development of the internal security environment of the state
Published 2024-06-01Subjects: “…security environment…”
Get full text
Article -
1910
Ecological security driving mechanisms and optimization of zoning in Chinese urban agglomerations: A case study of the central plains urban agglomeration
Published 2025-02-01Subjects: “…Ecological security…”
Get full text
Article -
1911
-
1912
Secure Communication Scheme Based on a New 5D Multistable Four-Wing Memristive Hyperchaotic System with Disturbance Inputs
Published 2020-01-01“…In addition, the circuit implementation scheme is also proposed. Then, a secure communication scheme based on the proposed 5D multistable FWMHS with disturbance inputs is designed. …”
Get full text
Article -
1913
A Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services
Published 2024-12-01“…With such a wide range of characteristics, new security and privacy concerns arise. Due to the safe transmission, arrival, and access, as well as the availability of medical devices, security creates new issues in the area of healthcare. …”
Get full text
Article -
1914
-
1915
Enhancing aviation control security through ADS-B injection detection using ensemble meta-learning models with Explainable AI
Published 2025-01-01“…The increasing use of Automatic Dependent Surveillance-Broadcast (ADS-B) technology in flight control systems has created many serious concerns.These weaknesses threaten the security and safety of our aviation industry. Therefore, to enhance aviation control security and better deal with these problems, this research focuses on developing a strong ADS-B injection detection system. …”
Get full text
Article -
1916
Research on optimization of emergency supplies customs clearance strategy from the perspective of public health security based on Chinese trade data
Published 2025-01-01“…BackgroundThis study is significant for improving the accuracy of Customs’ cross-border supervision of emergency supplies and ensuring the timely clearance of these essential goods.MethodsTo ensure both the convenience and security of Customs oversight regarding emergency supplies, this study first systematically collects and organizes representative data on the import and export trade of these supplies. …”
Get full text
Article -
1917
“Sustainable security” through river enlargements: A political ecology of nature-based solutions and flood control in the Rhone Valley, Switzerland
Published 2023-10-01“…The largest ongoing river training project in Switzerland, the so-called Third Correction of the Rhone in the Valais, builds on nature-based solutions (river enlargements and renaturation) while official documents and discourses also refer to an ill-defined notion of “sustainable security” and the goal of controlling floods. Drawing on qualitative data from stakeholder interviews and analysis of official documents, this paper examines the concept of sustainable security, as it is applied to the river project in terms of a balance between security and environmental concerns, the relationship between the three pillars of sustainability, and the opportunities of the population to debate the spatial development of the Rhone Valley. …”
Get full text
Article -
1918
The impact of staple crop price instability and fragmented policy on food security and sustainable development: a case study from Bangladesh
Published 2025-02-01Subjects: “…Food security…”
Get full text
Article -
1919
A secure and energy-efficient routing using coupled ensemble selection approach and optimal type-2 fuzzy logic in WSN
Published 2025-01-01“…This research contributes significantly to the WSN field by providing a comprehensive routing solution that integrates energy conservation, security, and QoS, ultimately extending the lifespan of WSNs and boosting confidence in critical applications, paving the way for implementation scenarios that require secure, low-power, and real-time data transmission.…”
Get full text
Article -
1920
An Intelligent Big Data Security Framework Based on AEFS-KENN Algorithms for the Detection of Cyber-Attacks from Smart Grid Systems
Published 2024-06-01“…Here, an AdaBelief Exponential Feature Selection (AEFS) technique is used to efficiently handle the input huge datasets from the smart grid for boosting security. Then, a Kernel based Extreme Neural Network (KENN) technique is used to anticipate security vulnerabilities more effectively. …”
Get full text
Article