Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2741
AccFIT-IDS: accuracy-based feature inclusion technique for intrusion detection system
Published 2025-12-01“…In today’s digital landscape, maintaining security has become increasingly difficult. Many organizations implement security mechanisms to protect their valuable resources from potential threats. …”
Get full text
Article -
2742
Numerical Assessment of a Safety System to Minimize Injuries during a Cyclist Run-Over
Published 2021-01-01“…The computed results were divided into groups, A for the run-over test without a passive security system and B for the run-over test with a passive security system. …”
Get full text
Article -
2743
Association between Cardiac Hypertrophy and Sex of Patients from a Hospital in Ecuador
Published 2024-01-01“…<br /><strong>Objective:</strong> determine the association between cardiac hypertrophy and sex of patients in a hospital of the Ecuadorian Institute of Social Security. <br /><strong>Methods:</strong> a descriptive and cross-sectional study was carried out in December 2022 in a hospital of the Ecuadorian Social Security Institute. 88 patients were analyzed distributed into two groups: male and female, each with 44 patients. …”
Get full text
Article -
2744
Dynamics of Cropland Non-Agriculturalization in Shaanxi Province of China and Its Attribution Using a Machine Learning Approach
Published 2025-01-01“…Cropland is a critical component of food security. Under the multiple contexts of climate change, urbanization, and industrialization, China’s cropland faces unprecedented challenges. …”
Get full text
Article -
2745
Driving simulator study of text messaging and phone conversations: Effects of messages’ valence, drivers’ values and self-reported driving behaviors
Published 2025-01-01“…Self-reported values of power, security, and universalism were significantly correlated with objective driving measures: power was associated with riskier driving behaviors, whereas security and universalism were linked to safer driving patterns. …”
Get full text
Article -
2746
Protecting Florida Panthers by Protecting Domestic Animals: Building a "Panther-Proof" Pen
Published 2016-11-01“…To maintain support for panther conservation, it is paramount that rural residents protect and secure their pets and livestock. This 3-page fact sheet explains how to make a locking, secure enclosure to protect livestock from panther predation—and protect the fragile panther, as well. …”
Get full text
Article -
2747
Solar Drying for Domestic and Industrial Applications: A Comprehensive Review of Innovations and Efficiency Enhancements
Published 2025-02-01“…Abstract Global challenges such as energy scarcity and food security are intensified by a growing population and substantial post‐harvest food losses, contributing to alarming hunger levels. …”
Get full text
Article -
2748
Assessing the Impact of Hermetic Storage Technology on Storage Quantity and Post-Harvest Storage Losses Among Smallholding Maize Farmers in Nepal
Published 2025-01-01“…This can contribute to enhancing local food security.…”
Get full text
Article -
2749
Promoting Healthy Lifestyle Strategies among Couples for Sustainable Family Survival in Oyo State, Nigeria
Published 2024-12-01“…Healthy lifestyle can be encouraged through mindfulness, with secure communities and local mental support resources playing a key role. …”
Get full text
Article -
2750
The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field
Published 2022-01-01“…The mathematical operation of the Elliptic Curve over the prime finite field is wildly used for secure data communication as it provides high security while utilizing the same size as the secret key. …”
Get full text
Article -
2751
The Effectiveness and Mechanisms of China’s Grain Support Policies in Relation to Grain Yield—An Evaluation of a Wide Range of Policies
Published 2025-01-01“…These conclusions are of great significance for improving grain production support and protection systems, enhancing incentives for farmers to grow food and for local governments to control food, and achieving the goal of food security.…”
Get full text
Article -
2752
Blockchain enabled traceability in the jewel supply chain
Published 2025-01-01“…The system incorporates robust security measures, addressing vulnerabilities such as reentrancy attacks and unauthorized access. …”
Get full text
Article -
2753
Effect of Banana Production on Poverty Reduction in Kabuyanda Sub-County, Isingiro District.
Published 2024“…Additionally, diversifying banana products like flour, chips, and juice was suggested to enhance food security and create additional income streams through value addition. …”
Get full text
Thesis -
2754
On Internet Traffic Classification: A Two-Phased Machine Learning Approach
Published 2016-01-01Get full text
Article -
2755
The system of entities providing territorial defence of Ukraine and the role of local self-government bodies within it
Published 2023-09-01“…It has been found that the system of entities providing territorial defence of Ukraine consists of: 1) The Verkhovna Rada of Ukraine is responsible for establishing the legislative framework for the territorial defence of Ukraine and for exercising parliamentary control over the compliance with the requirements of the legislation in this area by the committees established by it; 2) The President of Ukraine and the National Security and Defence Council of Ukraine are responsible for the global management and control over the functioning of the entire defence and security sector of Ukraine, including territorial defence, and ensure the deployment of territorial defence if necessary; 3) The Cabinet of Ministers of Ukraine, ministries and other central executive authorities whose activities are aimed at building the organisational and administrative architecture of territorial defence, determining the vector of development and implementation of the state policy in the field of defence and territorial defence of Ukraine; 4) target subjects of territorial defence implementation including regional state administrations, military authorities and law enforcement agencies. …”
Get full text
Article -
2756
The Rise and Fall of the Iraqi Sunni Awakening Movement
Published 2023-03-01“…The disintegration of the Awakening was strongly influenced by two US decisions that were of strategic importance to Iraq: (a) support for al-Maliki following his defeat in the 2010 parliamentary elections, won by the secular Sunni-Shiite coalition; (b) poor timing of the withdrawal of American troops from Iraq, as by the end of 2011, the Iraqi security forces were still not ready to ensure the country's security. …”
Get full text
Article -
2757
Optimization of African indigenous vegetables production in sub Saharan Africa: a review
Published 2023-10-01Get full text
Article -
2758
-
2759
THE WASSENAAR ARRANGEMENT AND RUSSIAN HIGH-TECH EXPORT
Published 2016-02-01“…The dilemma between the need to support exporters by reducing administrative barriers and the ensuring security interests of the country gain momentum in current stage of scientific-and-technological advance development.…”
Get full text
Article -
2760
CONFLICT BETWEEN PASTORALISTS AND FARMERS IN NIGERIA AND ITS POTENTIALS FOR REGIONAL INSECURITY IN AFRICA
Published 2023-09-01“…To manage the conflict, the author recommends that African governments should muster the political will to address the security challenges posed to the African continent by the conflict by reviewing the ECOWAS Transhumance Protocol among others. …”
Get full text
Article