Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2901
A New Chaotic Color Image Encryption Algorithm Based on Memristor Model and Random Hybrid Transforms
Published 2025-01-01“…These findings indicate that the SEME-TDHM algorithm successfully encrypts color images, providing strong security and practical utility.…”
Get full text
Article -
2902
U.S. plans to internationalize the containment of the USSR in the Balkans in the first half of the 1950s
Published 2020-12-01“…In response, in the early 1950s the United States formed a new security model in the Balkans, which based on a differentiated approach: Greece became a member of NATO, while Yugoslavia entered the anti-Soviet Balkan Pact affiliated with NATO. …”
Get full text
Article -
2903
-
2904
Food insecurity among African Americans in the United States: A scoping review.
Published 2022-01-01“…The primary objectives of this review were to identify which risk factors have been investigated for an association with food insecurity, describe how food insecurity is measured across studies that have evaluated this outcome among African Americans, and determine which dimensions of food security (food accessibility, availability, and utilization) are captured by risk factors studied by authors. …”
Get full text
Article -
2905
Transformation of Turkey's Anti-Terrorism Policy under the AKP
Published 2022-07-01“…In the era of new challenges and threats, the most dangerous of which has occurred terrorism, the Republic of Turkey becomes one of the key centers of power in the Middle East and pursues the goal to create a regional security architecture around itself as well as to counter various terrorist organizations. …”
Get full text
Article -
2906
Optimal Topology Management for Software-Defined Networks Minimizing Latency and Using Network Slicing
Published 2024-01-01“…To the best of our knowledge, this journal paper constitutes a first attempt to incorporate network slicing in SDN allowing flexibility, resource efficiency, security, and effective management of the network facilitating the deployment of customized and adaptive services. …”
Get full text
Article -
2907
A Modified WASPAS Method for the Evaluation of E-Commerce Websites Based on Pythagorean Fuzzy Information
Published 2025-01-01“…They are essential to keep up with the market changes and shifts to provide better compliance with security requirements and to optimize the interface to hold onto user attention. …”
Get full text
Article -
2908
Development of Hybrid Intrusion Detection System Leveraging Ensemble Stacked Feature Selectors and Learning Classifiers to Mitigate the DoS Attacks
Published 2025-02-01“…Since these technologies are deeply rooted in the individual’s comfort life, protecting the user’s privacy and security against the growing DoS attack has become a major challenge among researchers. …”
Get full text
Article -
2909
Detection of False Data Injection Attacks (FDIA) on Power Dynamical Systems With a State Prediction Method
Published 2025-01-01“…With the deeper penetration of inverter-based resources in power systems, false data injection attacks (FDIA) are a growing cyber-security concern. They have the potential to disrupt the system’s stability like frequency stability, thereby leading to catastrophic failures. …”
Get full text
Article -
2910
Smart home technology to support engagement in everyday activities while ageing: A focus group study with current and future generations of older adults.
Published 2025-01-01“…The perceived advantages of SHT include enhancing the sense of security and safety, which can facilitate engagement in everyday activity. …”
Get full text
Article -
2911
Wild Edible Plant Nutritional Contribution and Consumer Perception in Ethiopia
Published 2020-01-01“…Even though wild edible plants are important for food security, they are usually overlooked and perceived as food for poor families. …”
Get full text
Article -
2912
GASTROINTESTINAL PARASITES AND ASSOCIATED GUT PATHOLOGY IN CHICKENS SOLD AT LIVE-BIRD MARKETS IN LAGOS STATE, SOUTHWESTERN NIGERIA
Published 2024-12-01“…Efforts to control must be strengthened to secure chicken production, maintain food security, and prevent economic losses. …”
Get full text
Article -
2913
-
2914
ASEAN Defence Ministers MeetingPlus: Institutional structure, specific features, and evolution (2010–2022)
Published 2024-09-01“…In 2010, a specific security-related dialogue format has been introduced into this system, — the ASEAN Defence Ministers Meeting-Plus (ADMM-Plus). …”
Get full text
Article -
2915
A Covert α-Stable Noise-Based Extended Random Communication by Incorporating Multiple Inverse Systems
Published 2025-01-01“…The results from Monte Carlo simulations show that deploying the proposed ERCS not only leads to better Bit Error Rate (BER) performance but also provides increased covertness values, which proves the design’s ability to enhance performance and security compared to earlier models. Simulation analysis also suggests that the utilization of multiple inverse systems in the proposed ERCS can enhance the physical-layer security of next-generation communication devices.…”
Get full text
Article -
2916
Systems Evaluation for Operational Risks of International Transport Corridors: A Case Study of China-Pakistan-Iran-Turkey International Transport Corridor
Published 2021-01-01“…The Chinese section has the lowest operational risk index. (2) Pakistan has been trapped in severe political risks and security risks in recent years. Turkey suffers from severe security risks due to the Kurdish problem. …”
Get full text
Article -
2917
Subject matter of proof and peculiarities of collecting evidence in the investigation of crimes committed against the law enforcement officers
Published 2023-12-01“…The defence and security sector plays a significant role in ensuring the national security of the state, the vast majority of which are law enforcement agencies. …”
Get full text
Article -
2918
THE ANALYSIS OF THE KEY DRIVERS AND BARRIERS OF CLOUD MIGRATION IN COMPANIES IN BOSNIA AND HERZEGOVINA
Published 2020-05-01“…According to the research results, the most significant obstacles of cloud migration include the fo-llowing: lack of internal experts, privacy, lack of respo-nsibility of cloud providers in case of security incident, costs and complexity of migration to the cloud, etc. …”
Get full text
Article -
2919
Gender-Based Motivational Factors For Choosing Dentistry As A Career By First Year Dental Students Of College Of Pakistan
Published 2023-12-01“…Prominent motivating factors were flexible work patterns (63.5%), self-employment (63%), financial security (44.8%) and parents wish (25%). Conclusion: Students chose Dentistry not only due to their interests but also because of flexible work patterns, financial security and self-employment. …”
Get full text
Article -
2920
China’s peacekeeping activities within the UN: Features, challenges, and prospects
Published 2024-03-01“…Currently, among the permanent members of the UN Security Council, China is the largest supplier of contingents for UN peacekeeping operations and the second largest donor of financing for these operations. …”
Get full text
Article