Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3441
Barriers and Enablers of AI Adoption in Human Resource Management: A Critical Analysis of Organizational and Technological Factors
Published 2025-01-01“…Change aversion, data security worries, and integration expenses are major roadblocks, but strong digital leadership, company culture, and advancements in NLP and machine learning are key enablers. …”
Get full text
Article -
3442
Toward Safer E-Commerce Transactions: The Influence of System Quality, Information Accuracy, and Government Oversight
Published 2024-12-01“…To improve public knowledge about transaction security in e-commerce, thorough socialization and education are needed, targeting all parties involved in online transactions, including marketplaces, payment providers, and delivery services. …”
Get full text
Article -
3443
Extensive Surgical Emphysema in a Child after Primary Closure of Tracheocutaneous Fistula
Published 2020-01-01“…We gave him oxygen supplementation, removed surgical stitch, and inserted a 4 mm tracheostomy tube to secure airway. Chest X-ray ruled out pneumothorax or pneumomediastinum. …”
Get full text
Article -
3444
A Hybrid Swarm Intelligence Algorithm for Intrusion Detection Using Significant Features
Published 2015-01-01“…Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. …”
Get full text
Article -
3445
Leaking Network Devices with Rubber Ducky Attack
Published 2024-12-01“…By placing the module in a device connected to the target network, a network scan was performed to determine the security status, IP addresses, port information, and version information of all devices. …”
Get full text
Article -
3446
Participation of Citizens in Pre-Trial Hearings. Review of an Experiment in the Netherlands
Published 2014-10-01“…In 2011 the Dutch Central Appeals Tribunal, the highest Dutch court of appeal in legal areas pertaining to social security and the civil service, started consulting the parties of a dispute at an early stage in the procedure, in order to include them in the decisions about the procedural steps to be taken in the settlement of the appeal. …”
Get full text
Article -
3447
Improving Data Privacy in the Internet of Things by Using Artificial Immune System, in Regard with the Internet Limitations
Published 2022-03-01“…Studies show that the lack of a complete, efficient and standard model has caused many security flaws in these networks. By using the Internet limitations, this study discusses how to create a target function to protect data privacy in the Internet of Things. …”
Get full text
Article -
3448
Design of Fully Automatic Drone Parachute System with Temperature Compensation Mechanism for Civilian and Military Applications
Published 2018-01-01“…Due to high cost of top-end drones and requirements for secure landing, development of reliable drone recovery systems is a hot topic now. …”
Get full text
Article -
3449
Prophet: A Context-Aware Location Privacy-Preserving Scheme in Location Sharing Service
Published 2017-01-01“…In this paper, we design a Prophet framework, which provides an effective security scheme for users sharing their location information. …”
Get full text
Article -
3450
Navigating the landscape of remote patient monitoring in Canada: trends, challenges, and future directions
Published 2025-02-01“…We explore the regulatory, technical, and operational challenges that RPM faces, including critical issues around data privacy, security, and interoperability, factors essential for sustainable integration. …”
Get full text
Article -
3451
The Food Safety Modernization Act of 2011 – Proposed Rule for Preventive Controls for Human Food
Published 2014-09-01“…FSMA aims to ensure the safety and security of the US food supply by focusing on preventing food safety problems rather than responding after they occur. …”
Get full text
Article -
3452
Parish revival in Southern Russia in the context of revolutionary upheavals and the Civil War
Published 2023-09-01“…Its functions were to be extended to the level of a grass-roots zemstvo, to ensure the legal and economic security of the parishioners, and to influence the surrounding society.…”
Get full text
Article -
3453
Discharge against Medical Advice in Surgical Patients with Posttraumatic Stress Disorder: A Case Report Series Illustrating Unique Challenges
Published 2017-01-01“…In all three subjects, the stress of feeling misunderstood by clinicians and the distress of public detainment by hospital security in the setting of chronic PTSD led to aggressive and risky behavior. …”
Get full text
Article -
3454
Industry 4.0: digital twins characteristics, applications, and challenges in-built environments
Published 2025-12-01“…Despite these potential benefits, several challenges prevent the widespread adoption of DT technology such as data security and ownership concerns, the lack of common data standards and interoperability, and difficulties in managing diverse source systems.…”
Get full text
Article -
3455
NOISE A FAVORITE FACTOR IN THE INDUSTRIAL WORK ENVIRONMENT
Published 2023-05-01“…After the implementation of the measures at the organization level, the increase in the level of security and the decrease in the level of risk will result. …”
Get full text
Article -
3456
Anesthetic Management for Emergent Repair of Tracheoinnominate Fistula
Published 2020-01-01“…The tracheostomy tube was then removed over a Cook catheter to maintain secure passage in case of airway collapse. The oral endotracheal tube was then inserted distal to the arterial and tracheal defect. …”
Get full text
Article -
3457
Morphological and molecular characterization of Stenocranus pacificus (Hemiptera: Delphacidae) on maize plants
Published 2024-11-01“…Additionally, maize contributes to food diversification and security. One of the main threats to maize production is pest attacks, including Stenocranus pacificus and Peregrinus maidis. …”
Get full text
Article -
3458
Review on Cement Stabilization/Solidification of Municipal Solid Waste Incineration Fly Ash
Published 2018-01-01“…Municipal solid waste incineration (MSWI) fly ash must be treated properly prior to being disposed in the security landfill due to its serious pollution toxicity. …”
Get full text
Article -
3459
Optimizarea generării de itinerarii pentru ghizi turistici autonomi prin integrarea datelor în timp real în algoritmi genetici
Published 2024-12-01“…Research in the field of autonomous vehicles has made good progress in the last years, but mass adoption is unlikely to happen very soon due to, in most part, important ethical and security concerns. The authors consider that niche uses of autonomous vehicles are more likely to be researched and developed, since they can substantially make an immediate difference in specific applications. …”
Get full text
Article -
3460
Distributed Power Trading System Based on Blockchain Technology
Published 2021-01-01“…The traditional centralized power trading model has some problems, such as low data security and trust crisis of regulators. Blockchain technology provides prominent ideas for solving these problems. …”
Get full text
Article