Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3521
Behaviour change communication influences on food consumption behaviours and the demand for diverse nutritious foods in the Makoni District, Zimbabwe.
Published 2024-01-01“…Participants indicated that the Livelihoods and Food Security Programme intervention successfully increased their nutrition knowledge, enhanced their ability to diversify crop production, and improved their access to varied foods, including some new crops. …”
Get full text
Article -
3522
An Efficient and Lightweight Source Privacy Protecting Scheme for Sensor Networks Using Group Knowledge
Published 2013-04-01“…Providing source privacy is a critical security service for sensor networks. However, privacy preserving in sensor networks is a challenging task, particularly due to the limited resources of sensor nodes and the threat of node capture attack. …”
Get full text
Article -
3523
Dynamics of variability in agronomic characters of millet cv. ‘Gorlinka’ under the climate conditions of the southern part of the East European Plain
Published 2024-01-01“…The effect of high temperature and drought is expected to lead to undesirable consequences for the economy, a decrease in yields, and a threat to food security. This aspect requires an assessment of the ongoing climate changes and identification of the causes that induce the response of plants to them.Materials and methods. …”
Get full text
Article -
3524
RAMS Analysis of Train Air Braking System Based on GO-Bayes Method and Big Data Platform
Published 2018-01-01“…The RAMS (reliability, availability, maintainability, and security) of the air braking system is an important indicator to measure the safety performance of the system; it can reduce the life cycle cost (LCC) of the rail transit system. …”
Get full text
Article -
3525
Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application
Published 2023-01-01“…The proposed method is simple and speedy in terms of computations, meanwhile it affirms higher security and sensitivity. In contrast to GF, PA-loop are non-isomorphic and have several Cayley table representations. …”
Get full text
Article -
3526
Developments in Border and Migration Management in the South East European Region
Published 2024-12-01“…This extra pressure led to difficulties in terms of effectively manage the borders and address arising border security issues. The study aims to realize an inventory of the measures, proposals and activities which had an impact on transnational institution building which focuses on migration and border management. …”
Get full text
Article -
3527
Public Value of Using Light Rail Transit Transportation at Palembang
Published 2024-11-01“…Additionally, the LRT meets public expectations by offering a suitable route network, planning fleet capacity effectively, establishing consistent departure times, and ensuring high security across its operations. In conclusion, the Palembang LRT system enhances travel comfort with regular scheduling and adequate facilities, highlighting its potential as a key component of Palembang's sustainable urban transportation infrastructure with continued development.…”
Get full text
Article -
3528
DETECTING WEB-BASED BOTNETS USING A WEB PROXY AND A CONVOLUTIONAL NEURAL NETWORK
Published 2020-09-01“…Botnets are increasingly becoming the most dangerous threats in the field of network security, and many different approaches to detecting attacks from botnets have been studied. …”
Get full text
Article -
3529
Federated Learning for Decentralized DDoS Attack Detection in IoT Networks
Published 2024-01-01“…Evaluated using the comprehensive CICIDS2017 dataset and compared with conventional centralized detection methods, FL-DAD achieves superior performance, illustrating the potential of federated learning to enhance intrusion detection systems in large-scale IoT networks by balancing data security with analytical effectiveness.…”
Get full text
Article -
3530
Face Recognition using Deep Learning and TensorFlow framework
Published 2023-12-01“… Detecting human faces and recognizing faces and facial expressions have always been an area of interest for different applications such as games, utilities and even security. With the advancement of machine learning, the techniques of detection and recognition have become more accurate and precise than ever before. …”
Get full text
Article -
3531
Adoption Spells of Improved Potato Varieties by Smallholder Farmers in Eastern Ethiopia: The Duration Approach
Published 2019-06-01“…Potato is mainly tagged as a food security crop in Ethiopia. However, its productivity remains low due to low adoption of improved technologies by smallholder farmers. …”
Get full text
Article -
3532
Dynamic Stochastic Optimization of Emergent Blood Collection and Distribution from Supply Chain Perspective
Published 2021-01-01“…In response to emergencies, it is critical to investigate how to deliver emergency supplies efficiently and securely to disaster-affected areas and people. There is no doubt that blood is deemed one of the vital relief supplies, and ensuring smooth blood delivery may substantially alleviate subsequent impacts caused by the disaster. …”
Get full text
Article -
3533
ECONOMIC ANALYSIS OF SOIL-BASED AND SOILLESS FARMING SYSTEMS: A CASE STUDY FROM DA LAT CITY
Published 2020-12-01“…Nowadays, to secure production in the case of restricted natural resources requires innovative farming approaches to achieve a balance between agriculture and environmental protection. …”
Get full text
Article -
3534
100 essential questions for the future of agriculture
Published 2023-03-01“…We focus on 10 primary themes: transforming agri‐food systems, enhancing resilience of agriculture to climate change, mitigating climate change through agriculture, exploring resources and technologies for breeding, advancing cultivation methods, sustaining healthy agroecosystems, enabling smart and controlled‐environment agriculture for food security, promoting health and nutrition‐driven agriculture, exploring economic opportunities and addressing social challenges, and integrating one health and modern agriculture. …”
Get full text
Article -
3535
PREVENTING VIOLENCE CRIMES (KIDNAPPING, ARMED ROBBERY, BRIGANDAGE OR COMMUNITY MASSACRE) WITH DRONES: AN EFFECTIVE ALTERNATIVE TO VEHICULAR PATROLS IN NIGERIA
Published 2024-06-01“…Recommendations proffered include the need for strategic deployment of drones in all security formation in the country, adequate budgetary provision .training of manpower, comprehensive monitoring and adequate assessment and action on information and intelligence received from drones. …”
Get full text
Article -
3536
Artificial Intelligence in Energy Economics Research: A Bibliometric Review
Published 2025-01-01“…Potential future research directions include energy supply-chain resilience and security, social acceptance and public participation, economic inequality and the technology gap, automated methods for energy policy assessment, the circular economy, and the digital economy. …”
Get full text
Article -
3537
A Novel Memductor-Based Chaotic System and Its Applications in Circuit Design and Experimental Validation
Published 2019-01-01“…Further to these, a memductor-based chaotic circuit is designed, realized, and applied to construct a new memductor-based secure communication circuit by employing the basic electronic components and memristor. …”
Get full text
Article -
3538
Artificial intelligence-based video monitoring of movement disorders in the elderly: a review on current and future landscapes
Published 2024-03-01“…This progression must incorporate data security, ethical considerations and adherence to regulatory standards.…”
Get full text
Article -
3539
Role of electric transport in urban transportation system
Published 2022-07-01“…Urban transport should solve the following tasks: equal access to the population to vehicles, the possibility of planning the time of traveling inside the city, ensuring environmental safety from the use of vehicles, creating the conditions for the availability of transport services at their cost, security and comfort, as well as ensure transport services for the business subjects at minimal economic costs. …”
Get full text
Article -
3540
Protecting civilians in a data-driven and digitalized battlespace: toward a baseline humanitarian technology infrastructure
Published 2025-01-01“…However, the lack of international consensus on the use of data, the public and private nature of the actors involved in conflict, the transnational aspects of the widened battlefield, and the heightened security risks in the conflict space pose enormous challenges for the protection of civilians agenda. …”
Get full text
Article