Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2861
Analysis of new varieties adoption behavior of Chinese turbot farmer based on the perspective of heterogeneity
Published 2025-01-01“…China is the largest turbot farming in the world, where germplasm source security is closely related to national security. To further promote the sustainable development of the turbot aquaculture industry, the China Marine Fish Industry Technology System team has developed a new variety of fast-growing turbot (hereinafter referred to as new varieties) in 2012. …”
Get full text
Article -
2862
ORGANIC FARMING: A RELIABLE STRATEGY FOR SUSTAINABLE AGRICULTURE IN NEPAL
Published 2024-01-01“…As a result, it becomes increasingly important to address how to achieve food security while simultaneously addressing the imbalance in the ecosystem. …”
Get full text
Article -
2863
Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks
Published 2024-01-01“…Based on our thorough analysis, we identify key limitations in current methodologies and propose potential paths for future research, focusing on integrating real-time data analysis, cross-layer security measures, and collaborative IDS frameworks.…”
Get full text
Article -
2864
From data to diagnosis: leveraging deep learning in IoT-based healthcare
Published 2024-11-01“…Ethical and legal considerations are also critical as the deployment of artificial intelligence in healthcare necessitates careful consideration of patient consent and data security. The future of deep learning in healthcare IoT is geared toward enhancing data security, improving device integration, and creating patient-centric models through innovative technologies such as blockchain and edge computing. …”
Get full text
Article -
2865
Factors Influencing QRIS Adoption in Warkops
Published 2025-01-01“…In contrast, perceived security, risk, anxiety, and comfort do not significantly affect the intention to adopt QRIS. …”
Get full text
Article -
2866
Enhancing RF Fingerprint Generation in Power Amplifiers: Unequally Spaced Multitone Design Approaches and Considerations
Published 2024-01-01“…The rapid growth of Internet of Things (IoT) devices and communication standards has led to an increasing demand for data security, particularly with limited hardware resources. …”
Get full text
Article -
2867
Healthcare assessment tools—a valid source of data for pre-hospital care? Usability for ensuring medical care in the event of a disaster
Published 2025-02-01“…Currently, only the German Armed Forces (Bundeswehr) offer an internally secured infrastructure that allows all those involved in the care of soldiers to access all important medical data quickly and easily from any location.…”
Get full text
Article -
2868
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01“… Information security is paramount for individuals, companies, and governments. …”
Get full text
Article -
2869
The role of 5G network in revolutionizing agriculture for sustainable development: A comprehensive review
Published 2025-03-01“…Additionally, the paper explores development optimization of various nodes, fault detection, self-healing mechanisms, AI application optimization, and security issues specific to 5G-enabled smart agriculture. …”
Get full text
Article -
2870
The implications of the ongoing war on Gaza for food sustainability
Published 2025-06-01“…This work investigates the impact of the ongoing war on food security and food-related sustainable development goals (SDGs) from local, regional, and global perspectives. …”
Get full text
Article -
2871
Effect of friction on levelling of the maxillary canine with NiTi superelastic wire - an in silico experiment using a finite element method
Published 2024-10-01“…When the wire is ligated securely to the bracket, additional friction is generated, hindering the levelling process.…”
Get full text
Article -
2872
Comparative Study of Microorganisms in Diabetic and non-diabetic Patients with Moderate and Severe Periodontitis
Published 2024-07-01“…<br /><strong>Methods:</strong> a descriptive and cross-sectional study was carried out at the Hospital of the Ecuadorian Social Security Institute and at the González Suárez Health Center in the period June-August 2023. …”
Get full text
Article -
2873
Research on the Architecture of a Basic Reconfigurable Information Communication Network
Published 2013-01-01“…The current information network cannot fundamentally meet some urgent requirements, such as providing ubiquitous information services and various types of heterogeneous network, supporting diverse and comprehensive network services, possessing high quality communication effects, ensuring the security and credibility of information interaction, and implementing effective supervisory control. …”
Get full text
Article -
2874
Iterative algorithms with seminorm-induced oblique projections
Published 2003-01-01“…Existence and uniqueness of such projections are secured via directional affinity of the sets with respect to the diagonal matrices involved. …”
Get full text
Article -
2875
Random Emission and Control of Whispering Gallery Mode Using Flexible Optical Fiber
Published 2025-01-01“…Additionally, the application of this laser in information security encryption is demonstrated and explored.…”
Get full text
Article -
2876
Generation a shared secret using artificial neural networks
Published 2019-08-01“…There are no recommendations on the choice of parameters of the used networks, ensuring acceptable speed and guaranteed confidentiality of the generated general secret.In this regard, it is interesting to substantiate the rational values of the parameters of ANN from the point of view of cryptographic requirements and security analysis of the proposed method of formation of cryptographic keys.…”
Get full text
Article -
2877
Pedestrian inertial navigation: An overview of model and data-driven approaches
Published 2025-03-01“…The task of indoor positioning is fundamental to several applications, including navigation, healthcare, location-based services, and security. An emerging field is inertial navigation for pedestrians, which relies only on inertial sensors for positioning. …”
Get full text
Article -
2878
Asymptotic Exponential Arbitrage in the Schwartz Commodity Futures Model
Published 2019-01-01“…Next, we find by comparison that, under some similar conditions, our result is a corresponding commodity assets (stronger) version of Föllmer and Schachermayer’s result stated in the modeling setting of geometric Ornstein-Uhlenbeck process for financial security assets.…”
Get full text
Article -
2879
On Family Relationships under the Laws of Hammurabi
Published 2012-10-01“…The family in the Hammurabi Code represents the basis not only for economic and financial power of the state, but also for its political stability and security. The rights and obligations of spouses are not equal, but they are together, though each in his own way, achieving the main goal of the marital union - the birth and upbringing of children.…”
Get full text
Article -
2880
Electricity Prices of the Future
Published 2022-06-01“…Secondly, additional instruments are needed to safeguard the security of supply. An thirdly, network charges need to account for the different role of the distribution network, which operates more and more as a platform. …”
Get full text
Article