Suggested Topics within your search.
Suggested Topics within your search.
- Management 58
- Public administration 10
- Marketing 9
- methods 9
- Hospitality industry 8
- Personnel management 8
- Tourism 8
- Entrepreneurship 7
- Information technology 7
- Project management 7
- Educational leadership 6
- Industrial management 6
- Leadership 6
- Organizational behavior 6
- Politics and government 6
- Purchasing 6
- Risk management 6
- School management and organization 6
- Economic conditions 5
- Finance 5
- History 5
- Industrial procurement 5
- Natural resources 5
- Study and teaching 5
- Communication in management 4
- Database management 4
- Decision making 4
- Moral and ethical aspects 4
- Nursing 4
- Planning 4
-
46781
Etiology of Community Acquired Pneumonia at a Tertiary Care Hospital
Published 2024-06-01“…Background: Data regarding etiological profile of community acquired pneumonia are sparse, and a variation is seen in studies from different parts of India, hence underlining the need for local data for better patient management. Methods: Retrospective database analysis was done. …”
Get full text
Article -
46782
Research on network slicing security for 5G mMTC
Published 2022-02-01“…With the emergence of new 5G business, architecture and technology, more and more researchers pay attention to security issues and potential security risks.Massive machine type communication is one of the three major application scenarios of 5G.It provides high performance such as large connection and low power consumption.Due to factors such as limited resources of MTC equipment, it may also weaken the security of 5G networks.At the same time, different scenarios and applications have obvious demands for network performance, service quality and security level.The flexibility of 5G networking is realized by network slicing technology.It meets the diversity and customization of 5G network services, but also brings new security threats.5G commercial rapid development.The number of IoT devices has increased exponentially.In order to ensure that 5G networks provide more efficient and safe on-demand services, it is particularly important to study the security mechanism and strategy of network slicing for 5G mMTC application scenarios.Therefore, the characteristics and security requirements of 5G mMTC were analyzed.The main security threats of network slicing were listed.In view of the above security requirements and threats, the contribution and deficiency of existing security schemes around the aspects of specific network slice authentication, slice security isolation, security management and arrangement were summarized and expounded.And the future research in this field was prospected.A SM2-based secondary authentication and security isolation model for 5G mMTC network slicing was proposed.This model framework meeted the efficiency of large-scale authentication for 5G devices and users by introducing batch authentication and pre-authentication mechanisms.By hierarchical encryption of different communication data, the security isolation between 5G mMTC network slices was realized.The performance and security of the model were also analyzed.…”
Get full text
Article -
46783
-
46784
Novel validity indices for dynamic clustering and an Improved Dynamic Fuzzy C-Means
Published 2025-03-01Get full text
Article -
46785
-
46786
Cesarean section and the gestational duration of subsequent pregnancies: A nationwide register-based cohort study.
Published 2025-01-01“…<h4>Conclusions</h4>The survival model handles bias related to management differences between the exposure and reference groups better than standard logistic regression, making it the statistical method of choice when conducting studies on this research topic. …”
Get full text
Article -
46787
Robust Optimization of Alginate-Carbopol 940 Bead Formulations
Published 2012-01-01Get full text
Article -
46788
-
46789
-
46790
The Importance of Wetlands for the Conservation of Birds in Tigray National Regional State (Northern Ethiopia)
Published 2024-01-01“…Therefore, community-based conservation initiatives should be implemented to mitigate these threats. Moreover, wetland management policies should be established to safeguard wetlands and their biological resources.…”
Get full text
Article -
46791
Synthesis of CeO2-Fe2O3 Mixed Oxides for Low-Temperature Carbon Monoxide Oxidation
Published 2022-01-01Get full text
Article -
46792
Variation of Leaf Area Index (LAI) under Changing Climate: Kadolkele Mangrove Forest, Sri Lanka
Published 2022-01-01“…This research presents a comprehensive understanding of Kadolkele mangrove forest under future droughts; thus, alarming relevant authorities to develop management plans to safeguard these critical ecosystems.…”
Get full text
Article -
46793
A Systematic Review of Knowledge, Attitude, and Perception Towards Electroconvulsive Therapy (ECT) in Africa
Published 2025-01-01“…Joan Abaatyo,1,2 Mark Mohan Kaggwa3,4 1Department of Psychiatry, Uganda Christian University, Kampala, Uganda; 2King Ceasor University, Kampala, Uganda; 3Department of Psychiatry and Behavioural Neurosciences, McMaster University, Ontario, ON, Canada; 4Forensic Psychiatry Program, St Joseph’s Healthcare Hamilton, Ontario, CanadaCorrespondence: Joan Abaatyo, Email joandux@gmail.comBackground: Despite growing evidence showing ECT’s efficacy and efficiency in the management of severe mental health conditions, the knowledge, attitude, and perceptions (KAP) towards ECT vary around the globe. …”
Get full text
Article -
46794
Mortality risk during heatwaves: An evaluation of effects by heatwaves characteristics in Serbia
Published 2024-01-01Get full text
Article -
46795
Multi-user collaborative access control scheme in cloud storage
Published 2016-01-01“…In MCA-F scheme, hierarchical encryption is adopted,a part of decrypting computation is transferred to a cloud server to decrease the computational cost on users when decrypting.In allusion to the simultaneous write-data access control of multiple users, a method is designed to manage semi-stored modified data submitted by menders. …”
Get full text
Article -
46796
Lithuanian's book publishing houses in West Europe in 1945-1952
Published 2024-08-01“…Many of the owners and managers of Lithuanian publishing houses began this work only in emigration, but the book publishing traditions that had been established in Lithuania were carried over to Western Europe. …”
Get full text
Article -
46797
Diasporas and Armed Conflicts: beyond Being “Third Party”
Published 2021-06-01“…This unit played an essential role in the Civil War in Laos, as it managed to restrain the onslaught of the superior forces of the Patet Lao Front and troops from North Vietnam. …”
Get full text
Article -
46798
Correlates for the severity of suicidal risk in participants with common mental disorders with comorbid chronic medical conditions in rural primary healthcare settings in India
Published 2023-06-01“…Conclusion: The severity of depression, higher disability scores, and lower social support were found to be independent correlates of mod-high suicidal risk. Screening, managing depression, and facilitating social support for patients with chronic medical illness in PHC settings may reduce suicidal risk.…”
Get full text
Article -
46799
-
46800