Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3361
Audio and Video Matching Zero-Watermarking Algorithm Based on NSCT
Published 2022-01-01“…In the Internet age, information security is threatened anytime and anywhere and the copyright protection of audio and video as well as the need for matching detection is increasingly strong. …”
Get full text
Article -
3362
IMPACT OF THE WHISTLEBLOWING POLICY IN THE FIGHT AGAINST CORRUPTION IN NIGERIA
Published 2023-12-01“…This work, therefore, recommends, among other things, that the whistle blowers should be given adequate legal and security protection and adequate public awareness be embarked upon to educate the people of the need to expose corrupt individuals. …”
Get full text
Article -
3363
Genes for editing to improve economic traits in aquaculture fish species
Published 2025-01-01“…Aquaculture, a critical sector for global food security, faces the challenge of meeting growing demand while protecting wild fish populations. …”
Get full text
Article -
3364
Les échos de la presse dans le silence du cabinet. La posture médiatique flaubertienne à la lumière de la correspondance
Published 2021-06-01“…While Flaubert’s financial security exempted him from the daily publications that contemporary writers-journalists had to produce, it did not necessarily means disinterest. …”
Get full text
Article -
3365
Permanent pacemaker implantation. Access to the apex of the right ventricle using fluoroscopy only at the last moment
Published 2021-12-01“…Although it is not currently practiced, during the stage that it was applied in the hospital, it provided security to patients and health personnel, so its use should be resumed.…”
Get full text
Article -
3366
IMPROVING INTRUSION DETECTION USING TREE ADJOINING GRAMMAR GUIDED GENETIC PROGRAMMING
Published 2017-09-01“…Nowadays, the problem of network security has become urgent and affect the performance of modern computer networks greatly. …”
Get full text
Article -
3367
The Correlation Between External and Internal Factors of the Libyan Crisis
Published 2015-10-01“…The importance of this region is determined by its geopolitical position, concentration of large natural resources, as well as the fact that it represents the greatest threat to the international security - the bases of terrorist organizations, the strengthening role of the group "Islamic State", drug trafficking and the proliferation of weapons of mass destruction (WMD). …”
Get full text
Article -
3368
Who calls the shots in Naomi's life? Reading the Naomi-Ruth story within the African religio-cultural context
Published 2016-12-01“…Such a worldview, in which the Sacred Other, the living and the (living) dead formed an integral whole, can also be observed at critical points in Naomi’s life: when Naomi bid farewell to her daughters-in-law (Rt 1:8-9); Naomi’s confession about Yahweh’s faithfulness to both the living and the dead (Rt 2:20); Naomi’s plan to seek security for Ruth through “levirate” marriage (Rt 3:1), and when she acted as a nurse to Mahlon’s son (Rt 4:5, 16). …”
Get full text
Article -
3369
Analysis of the Thermal Characteristics of Surrounding Rock in Deep Underground Space
Published 2019-01-01“…With the development of society, the economy, and national security, the exploitation of deep underground space has become an inevitable trend in human society. …”
Get full text
Article -
3370
Machine Learning Applications based on SVM Classification A Review
Published 2021-04-01“…Classification based on SVM has been used in many fields like face recognition, diseases diagnostics, text recognition, sentiment analysis, plant disease identification and intrusion detection system for network security application. Based on this study, it can be concluded that SVM classifier has obtained high accuracy results in most of the applications, specifically, for face recognition and diseases identification applications. …”
Get full text
Article -
3371
Main street retail districts or shopping centers? comparing the preferences of low-income consumers
Published 2012-01-01“…While shopping malls received better evaluation on environment, infrastructure, variety of stores and security, the street districts were judged to be better regarding access and value. …”
Get full text
Article -
3372
An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks
Published 2015-09-01“…Furthermore, our scheme provides enough scalability and security. The quantitative analyses show that our scheme is efficient in terms of storage and computational overheads.…”
Get full text
Article -
3373
Electronic Records Management Practices and Academic Performance of Higher Institutions of Learning: A Case Study of Kabale University.
Published 2024“…The findings revealed a reliance on mass storage devices for data accumulation and a strong emphasis on security and privacy measures by the university. However, inefficiencies were noted due to limited system integration. …”
Get full text
Thesis -
3374
Survey of Firearm Storage Practices and Preferences Among Parents and Caregivers of Children
Published 2024-11-01“…Our results suggest that rapid-access devices may be the most preferable firearm storage devices for distribution by secure storage programs, and costs are likely minimal given parental/caregiver willingness to pay.…”
Get full text
Article -
3375
Optimasi Keamanan Web Server Terhadap Serangan Brute-Force Menggunakan Penetration Testing
Published 2023-02-01“…Penetration testing is defined as an official attempt to exploit the system with the aim of finding weaknesses in the web server and improving system security. This penetration test is carried out on a web server which is an Academic Information System at a university. …”
Get full text
Article -
3376
Sentralisasi Pengawasan Informasi Jaringan Menggunakan Blockchain Ethereum
Published 2020-12-01“…The existing researches are unable to provide a secure, centralized monitoring system that satisfies three security aspects, namely: availability, integrity, and confidentiality. …”
Get full text
Article -
3377
-
3378
-
3379
Evaluation of Ecosystem Services and Tradeoff and Synergy in the Alpine and Canyon Region of Southwest China Based on Multi-source Geographic Data
Published 2024-12-01“…[Objective] The alpine and canyon region of Southwest China is a crucial ecological security barrier within the national “Three Zones and Four Belts” strategy, and it plays an essential role in ensuring national ecological security and promoting regional high-quality development. …”
Get full text
Article -
3380
Closed-loop systems for plants expressing animal proteins: a modernized framework to safeguard the future of agricultural innovation
Published 2025-01-01“…By implementing these rigorous systems, the PMF industry can realize its potential to contribute significantly to sustainable agriculture and food security.…”
Get full text
Article