Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2561
Challenges in Microgrids with Medium Voltage Circuit
Published 2025-01-01“…Effective coordination between protection devices and management systems ensures a rapid and selective response to faults, thereby enhancing microgrid security and facilitating efficient problem detection and resolution. …”
Get full text
Article -
2562
How Developments in Genebanks Could Shape Utilization Strategies for Domestic Animals
Published 2025-01-01“…Global geographical, climatic, and ecological diversity has given rise to a wealth of domestic animals, which are essential for food security and agricultural sustainability. Since the 1960s, these critical genetic resources have declined significantly due to overdevelopment, ecological degradation, and climate change, posing a serious threat to global food security. …”
Get full text
Article -
2563
The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database
Published 2016-03-01“…The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.…”
Get full text
Article -
2564
Motorcycle Engine Start System Using Fingerprint and Voice Command
Published 2023-06-01“…Making the starter engine system on this motorbike is to make it easier for users to turn on the motorbike without using a key so that they only use voice commands through an application found on an Android smartphone. In the security section, fingerprints are used as a substitute for manual ignition on motorbikes. …”
Get full text
Article -
2565
Protecting Medical Images Using a Zero-Watermarking Approach Based on Fractional Racah Moments
Published 2025-01-01“…This article introduces a new family of orthogonal moments, the fractional Racah moments (FrROMs), developed to meet the demands of copyright protection for medical images, a field requiring robust and secure methods that preserve the integrity of the original image. …”
Get full text
Article -
2566
Enhancing the Process of AES: A Lightweight Cryptography Algorithm AES for Ad-hoc Environments
Published 2022-12-01“…This algorithm will be modified to improve the security as well as reduce the amount of time and energy consumed in comparison with the original algorithm. …”
Get full text
Article -
2567
In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes
Published 2025-02-01“…In the rapidly evolving landscape of the Internet of Things (IoT) and Wireless Sensor Networks (WSN), the need for secure and efficient data transmission is paramount. …”
Get full text
Article -
2568
StegoEDCA: An Efficient Covert Channel for Smart Grids Based on IEEE 802.11e Standard
Published 2025-01-01“…These covert channels provide an innovative solution for securely transmitting large volumes of data within the smart grid.…”
Get full text
Article -
2569
Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game
Published 2016-01-01“…Security in mobile ad hoc networks (MANETs) is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. …”
Get full text
Article -
2570
Global agricultural trade architecture: contemporary triggers
Published 2024-12-01“…It has also been found that world agricultural commodity prices will stabilize in the medium term, which is an important factor in the food security of developing countries.…”
Get full text
Article -
2571
Authenticity at Risk: Key Factors in the Generation and Detection of Audio Deepfakes
Published 2025-01-01“…Detecting audio deepfakes is crucial to ensure authenticity and security, especially in contexts where audio veracity can have critical implications, such as in the legal, security or human rights domains. …”
Get full text
Article -
2572
Fuzzy logic based social trust computation scheme in Flying Ad-hoc network
Published 2025-03-01“…The Flying Ad Hoc Networks (FANETs) are becoming more popular in civic security, military, and multipurpose applications. …”
Get full text
Article -
2573
An Anonymous User Authentication with Key Agreement Scheme without Pairings for Multiserver Architecture Using SCPKs
Published 2013-01-01“…However, these schemes suffered from certain security problems or their cost consumption exceeded users’ own constrained ability. …”
Get full text
Article -
2574
Technologie energetycznego wykorzystania odpadów
Published 2011-06-01“…These benefits concern both environmental reasons, as well as freedom from conventional energy sources and increasing energy security. The article discusses the biogas technology and plasma technology as the most promising waste to energy technologies.…”
Get full text
Article -
2575
Measures against the financing of “lone wolves” and small terrorist cells in Europe
Published 2025-01-01“…The paper focuses on the emergence of new risks and threats to the European security system, such as the activity of “lone wolves” and small terrorist cells. …”
Get full text
Article -
2576
-
2577
Analisis Kualitas Performa Aplikasi Digital Banking X Menggunakan Framework ISO 25010
Published 2023-07-01“…The conclusion is that the critical characteristic is security, which can refer to the evaluation quality of performance X application. …”
Get full text
Article -
2578
HIV and the gut microbiome: future research hotspots and trends
Published 2025-02-01Get full text
Article -
2579
Desain Layanan E-Surat untuk Desa Waru Barat, Pamekasan, Madura menggunakan QR-Code
Published 2021-11-01“…The functionality testing showed the application successfully generated e-certificate along with the unique QR Code to secure and maintain the validity of the document. …”
Get full text
Article -
2580
Asymptotic hyperfunctions, tempered hyperfunctions, and asymptotic expansions
Published 2005-01-01Get full text
Article