Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2661
Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review
Published 2024-01-01“…The paper presents a systematic review of intrusion detection in Internet of Things (IoT) networks using multi-objective optimization algorithms (MOA), to identify attempts at exploiting security vulnerabilities and reducing the chances of security attacks. …”
Get full text
Article -
2662
Ungoverned Spaces and Menace of Herder-Farmer Conflictin Ondo State, South West Nigeria
Published 2023-03-01“…Drones can be deployed to monitor the operation of herders in the forests. Amotekun security outfit should be trained and adequately equipped with weapons for maximum delivery.…”
Get full text
Article -
2663
A Rectangular Planar Spiral Antenna for GIS Partial Discharge Detection
Published 2014-01-01Get full text
Article -
2664
Integrity of Best-Answer Assignments in Large Enrollment Classes; the role of Compulsory Attribution
Published 2024-12-01“…A unique feature that makes this method well-suited to large enrollment classes is the ability to secure and, when necessary, to delete stolen work, thereby precluding misappropriation. …”
Get full text
Article -
2665
A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks
Published 2014-01-01Get full text
Article -
2666
Breeding Maize (Zea mays L.) for Aluminum Tolerance through Heterosis and Combining Ability
Published 2024-01-01“…Soil acidity, a major threat to food security in developing countries, can cause a staggering 71% decline in maize (Zea mays L.) production. …”
Get full text
Article -
2667
An Analysis of the Legal Standard in the Fight Against Torture and Treatment of Prisoners under International Law: What Prospect for Application under Cameroonian Law?
Published 2020-02-01“…Cameroon in its compliance with the international standard set, has contributed enormously by enacting credible laws which varies from its constitution, criminal codes, and other relevant provision all in the aim of safeguarding and ensuring that this right should be treated with lots of human protection and security. Even though with efforts laid in place by the country through its various legal and institutional dispositions, prohibition and protection has continued to be considered as a nightmare, as we continue in experiencing violations of this fundamental right by those who were vested with the powers and competent in ensuring and securing this sacred right. …”
Get full text
Article -
2668
-
2669
Data Verification of Logical Pk-Anonymization with Big Data Application and Key Generation in Cloud Computing
Published 2022-01-01“…Anonymization of data is done at the point of collection in order to safeguard the data. More secure than K-Anonymization, Pk-Anonymization is the area’s first randomization method. …”
Get full text
Article -
2670
Federated Learning-Based Load Forecasting for Energy Aggregation Service Providers
Published 2025-01-01“…However,the required forecasting data are typically scattered among different energy suppliers,and owing to data security and privacy concerns,these suppliers are often unwilling to share their data. …”
Get full text
Article -
2671
Transboundary Water Resources Conflict Analysis Using Graph Model for Conflict Resolution: A Case Study—Harirud River
Published 2021-01-01“…One of the most important environmental issues today is the water crisis and the ensuing security challenges. Of these, transboundary waters pose the most significant security challenges. …”
Get full text
Article -
2672
ECONOMIC CRIME UNDER MARTIAL LAW IN UKRAINE
Published 2024-12-01“…Consequently, the prevailing national security and defence strategy falls short in ensuring the alignment of the Ukrainian security sector with the scientific and practical imperatives. …”
Get full text
Article -
2673
Analyzing Psychological Operations: A Case Study of Indo-Pak Hostility (2010-2024)
Published 2025-01-01“…Overall, this research offers valuable insights into the efficacy of PSYOP in influencing audiences and contributes to the broader understanding of persuasion theory in the context of modern information warfare and national security. …”
Get full text
Article -
2674
Mitigating Sinkhole Attacks in MANET Routing Protocols using Federated Learning HDBNCNN Algorithm
Published 2025-02-01“…In this study, Federated Learning is utilized to improve the security and privacy through empowering nodes to train the model deprived of distribution complex data. …”
Get full text
Article -
2675
The contribution of Electronic Records Management towards Organisational Performance: A case study of Stanbic Bank-Kabale Branch.
Published 2023“…Lastly, the researcher recommended the construction of ERMS facilities, improve ERMS security, encourage corroborations, have government support, and provide maximum training as better solutions for the topic under study.…”
Get full text
Thesis -
2676
Identification of maize kernel varieties based on interpretable ensemble algorithms
Published 2025-02-01“…The findings have significant practical value in agricultural production, improving quality management efficiency and contributing to food security assurance.…”
Get full text
Article -
2677
Progress towards Sustainable Utilisation and Management of Food Wastes in the Global Economy
Published 2016-01-01“…Food waste is considered not only a sustainability problem related to food security, but also an economic problem since it directly impacts the profitability of the whole food supply chain. …”
Get full text
Article -
2678
The status and challenges of irrigation infrastructure performance in supporting the agricultural sector: A case study of Kediri Regency, Indonesia
Published 2025-01-01“…The increase in population in rural and urban areas has an impact on food availability and security. Agriculture, as a major contributor to food security, faces increasing challenges, such as the decline in the area planted for agricultural commodities, the availability of labor, and the water provision for crops. …”
Get full text
Article -
2679
Research on Grid Scroll Chaotic Extended Sequence Algorithm and Its Circuit Implementation for F-OFDM System
Published 2019-01-01“…The proposed grid multiscroll chaotic maps are used as random phase sequence vectors instead of the traditional pseudo random sequence, which provide a large number of random sequences with good correlation characteristics, random characteristics, and high security. The proposed random phase sequence vectors can meet the needs of 5G mass connections. …”
Get full text
Article -
2680
Intrusion Detection for Wireless Sensor Network Using Particle Swarm Optimization Based Explainable Ensemble Machine Learning Approach
Published 2025-01-01“…Wireless Sensor Networks (WSN) play a pivotal role in various domains, including monitoring, security, and data transmission. However, their susceptibility to intrusions poses a significant challenge. …”
Get full text
Article