Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2721
Convergence of Blockchain, IoT, and AI for Enhanced Traceability Systems: A Comprehensive Review
Published 2025-01-01“…Key trends include AI-driven analytics, real-time IoT data collection, and the need for secure, tamper-proof data by BC. However, interoperability, scalability, and standardization challenges hinder adoption. …”
Get full text
Article -
2722
AFD and chaotic map‐based integrated approach for ECG compression, steganography and encryption in E‐healthcare paradigm
Published 2021-07-01“…Later, chaotic map‐based steganography and encryption are proposed on the AFD coefficients to secure the confidential information and the signal itself. …”
Get full text
Article -
2723
Almond cold-pressed oil by-product as ingredient for cookies with potential health benefits: Chemical and sensory evaluation
Published 2019-09-01“…Nowadays, food security is a global concern and a great scientific challenge. …”
Get full text
Article -
2724
An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
Published 2025-02-01“…Abstract One of the widening perils in network security is the Distributed Denial of Service (DDoS) attacks on the Internet of Things (IoT) ecosystem. …”
Get full text
Article -
2725
Anomaly detection of adversarial cyber attacks on electric vehicle charging stations
Published 2025-03-01“…Intruders pose potential risks to the security, reliability, and functionality of the EVCI, by spoofing the data through these charging ports leading to anomalies in the data. …”
Get full text
Article -
2726
Analysis and prediction of urban agglomeration ecological footprint based on improved three-dimensional ecological footprint and shared socioeconomic pathways
Published 2025-01-01“…This study analyzes the spatial–temporal dynamics of ecological security, sustainability, and driving factors in Shaanxi’s Guanzhong urban agglomeration. …”
Get full text
Article -
2727
Explaining the chronopolitical pattern of relations between Iran and Iraq
Published 2025-06-01“…For instance, Iraq is actively engaged in the "FAW Corridor" initiative, whereas Iran seeks to expand economic cooperation and secure a place in the burgeoning alliances of the East. …”
Get full text
Article -
2728
High trophic similarity between non-native common carp and gibel carp in Turkish freshwaters: Implications for management
Published 2025-01-01“…In Turkey, stocking of common carp Cyprinus carpio is practised to provide food security for people and job security for artisanal fishers, resulting in a country-wide distribution. …”
Get full text
Article -
2729
IoT-Based Real-Time Crop Drying and Storage Monitoring System
Published 2023-01-01“…This mostly affects the quality of maize and flour being produced which will finally affect food security. In this research, temperature, humidity, and light sensors are deployed in the grain storage containers for environmental parameter detection purposes to achieve the primary goal of providing practical, secure, and easily accessible storage in inclement weather. …”
Get full text
Article -
2730
Identifying the Dimensions and Components of the Executive Requirements of Islamic Microfinance
Published 2023-12-01“…The findings of the research show that the aspects related to ownership and control, the characteristics of loan contracts and security are considered to be the most important aspects affecting the executive requirements of Islamic microfinance, respectively. …”
Get full text
Article -
2731
Detecting Obfuscated Malware Infections on Windows Using Ensemble Learning Techniques
Published 2025-01-01“…In the internet and smart devices era, malware detection has become crucial for system security. Obfuscated malware poses significant risks to various platforms, including computers, mobile devices, and IoT devices, by evading advanced security solutions. …”
Get full text
Article -
2732
ASEAN Regional Integration: The Philippines' domestic constraints to Physical connectivity
Published 2023-03-01“…Specifically, the Philippines faces severe domestic problems such as reduced spending on infrastructural development, coupled with critical institutional challenges and issues on stability and security. This paper argues the primacy of good governance as the precondition for a well-connected and sustainable infrastructure. …”
Get full text
Article -
2733
MonoMax Suture: A New Long-Term Absorbable Monofilament Suture Made from Poly-4-Hydroxybutyrate
Published 2012-01-01“…Its tensile modulus of 0.48 GPa is approximately one-third of the value of the PDS II fiber providing an exceptionally flexible and pliable fiber with excellent knot strength and security. These features are further enhanced by the fiber's elasticity, which also improves knot security and may help prevent wound dehiscence. …”
Get full text
Article -
2734
A study of Belarusian women’s perceptions of safety and its relationships with victimization and social gender
Published 2024-10-01“…It has been shown that for women security is associated with such concepts as peace in their country, reliability, health, and control of the situation. …”
Get full text
Article -
2735
A Scalable Framework for Sensor Data Ingestion and Real-Time Processing in Cloud Manufacturing
Published 2025-01-01“…However, existing frameworks face challenges related to scalability, resource orchestration, and data security, particularly in rapidly evolving decentralized manufacturing settings. …”
Get full text
Article -
2736
Enhancing Safety in Nigeria's Oil and Gas Sector: A Fault Tree Analysis Approach
Published 2023-12-01“…By dissecting incidents ranging from structural failures to security threats, the research illuminates the multifaceted risks entrenched within the sector's activities. …”
Get full text
Article -
2737
A New Sensors-Based Covert Channel on Android
Published 2014-01-01“…New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze its security model, in particular the two key principles: process-isolation and the permissions system. …”
Get full text
Article -
2738
Electronic petitions in France on the material of Change.org, a non-governmental e-petition platform
Published 2022-09-01“…Residents of France most often relate to social problems (social security, health care and education) in electronic petitions. …”
Get full text
Article -
2739
Geomodeling soil quality using remote sensing and land use metrics in Abeokuta, Nigeria
Published 2025-01-01“…The findings suggest valuable ways for SQ improvement and could contribute to efforts on achieving food security, well-being and meet sustainable development goal 2.…”
Get full text
Article -
2740
Comparing Types of Statistical Data Between Turkey (the Case Study of Istanbul) and Selected Countries for Creating Fire Strategies
Published 2019-07-01“…Therefore, it can be said that fire statistics are kept and used to determine the strategies of fire statistics, especially in the countries that have high standards of social security and are technologically advanced. The strength of this chain of secure relations is possible with the establishment of learning systems. …”
Get full text
Article