Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2541
The Small Wars Doctrine of the US Marine Corps and Colonial Experience of the European Powers
Published 2023-12-01“…The findings broaden the understanding of the modern leading powers’ approaches to internal security models transfer, as well as of its limits.…”
Get full text
Article -
2542
Speeding Violation Type Prediction Based on Decision Tree Method: A Case Study in Wujiang, China
Published 2019-01-01“…This study is approved by the Traffic Police Brigade of Wujiang Public Security Bureau and aims to explore the characteristic of the speeding violation behaviour and attempt to make an effective prediction about it. …”
Get full text
Article -
2543
Artificial Intelligence in Pediatric Epilepsy Detection: Balancing Effectiveness With Ethical Considerations for Welfare
Published 2025-01-01“…However, ethical considerations around privacy, data security, and model bias remain crucial for responsible AI integration. …”
Get full text
Article -
2544
2.5D Inductive Intertwined Frequency Selective Surface for Band-Pass and High Miniaturization Applications
Published 2025-01-01Get full text
Article -
2545
-
2546
Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks
Published 2024-12-01“…Finally, it is shown that the scheme is secure by analyzing encryption/decryption private keys, ciphertext quantum state sequences during transmission, plaintext quantum state sequence, and the result after computations on the plaintext quantum state sequence.…”
Get full text
Article -
2547
Semantic Tokenization-Based Mamba for Hyperspectral Image Classification
Published 2025-01-01Get full text
Article -
2548
-
2549
ASD-YOLO: a lightweight network for coffee fruit ripening detection in complex scenarios
Published 2025-02-01Get full text
Article -
2550
-
2551
Tea Growing and Socio-Economic Development of Small Holder Farmers: A Case Study of Rushoroza Kabale District.
Published 2025“…The study findings indicated that there were contributions of tea growing to welfare they included; poverty alleviation, food security, illiteracy level, financial support, capital base, collateral security, and illiteracy level. …”
Get full text
Thesis -
2552
A Green′s function for a convertible bond using the Vasicek model
Published 2002-01-01“…We consider a convertible security where the underlying stock price obeys a lognormal random walk and the risk-free rate is given by the Vasicek model. …”
Get full text
Article -
2553
Usefulness of 3-Dimensional Flexible Endoscopy in Esophageal Endoscopic Submucosal Dissection in an Ex Vivo Animal Model
Published 2019-01-01“…The degree of sense of security using 3D vision (3.67 [0.82]) was significantly higher than that using 2D vision (2.67 [0.52]) in trainees (P=.04), but was equivalent in experts. …”
Get full text
Article -
2554
Nurturing care during COVID-19: a rapid review of early evidence
Published 2022-06-01“…A relatively large number of studies examined child safety and security and indicate a reduction in maltreatment referrals. …”
Get full text
Article -
2555
Attaching artificial Achilles and tibialis cranialis tendons to bone using suture anchors in a rabbit model: assessment of outcomes
Published 2025-01-01“…Study Design Metal suture anchors with braided composite sutures of varying sizes (United States Pharmacopeia (USP) size 1, 2, or 5) were used to secure artificial tendons replacing both the Achilles and tibialis cranialis tendons in 12 female New Zealand White rabbits. …”
Get full text
Article -
2556
Impact of nurturing care educational videos focusing on children with nutritional problems aged 6-23 months on mothers' knowledge and child growth
Published 2024-12-01“…Results: The intervention group showed significant improvements in nurturing care knowledge (p = 0.012), responsive caregiving (p = 0.018), and safety and security (p = 0.006). A significant difference in safety and security was observed between groups at posttest 1 (p = 0.020). …”
Get full text
Article -
2557
Anomaly Detection in Network Traffic Using Advanced Machine Learning Techniques
Published 2025-01-01“…Anomaly detection in network traffic is a critical aspect of network security, particularly in defending against the increasing sophistication of cyber threats. …”
Get full text
Article -
2558
An encryption algorithm for multiple medical images based on a novel chaotic system and an odd-even separation strategy
Published 2025-01-01“…To simultaneously augment security and optimize encryption efficiency, we undertake a dual-pronged approach. …”
Get full text
Article -
2559
TM-Chain: TCB Measurement Management Using Cloud Blockchain for IoT Devices
Published 2025-01-01“…In the IoT era, RA is an important security feature because verifiers make critical decisions based on the RA result. …”
Get full text
Article -
2560
An Improved Deep Belief Network IDS on IoT-Based Network for Traffic Systems
Published 2022-01-01“…The security challenges such as privacy, scalability, authenticity, trust, and centralization thwart the quick adaptation of the smart services; hence, effective solutions are needed to be in place. …”
Get full text
Article