Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3541
The Role of Organic Extracts and Inorganic Compounds as Alleviators of Drought Stress in Plants
Published 2025-01-01“…Climate changes have exacerbated the progression of drought conditions on a global scalethreating to crop production and heightening concerns over food security. Water scarcity enforces alterations in fundamental morphology, physiology and biochemical traits in crops. …”
Get full text
Article -
3542
Dynamic nonlinear control strategies for resilient heterogeneous vehicle platooning and handling Byzantine attacks in communication networks
Published 2025-01-01“…Utilizing a constant time headway spacing policy with gap adjustments, we derive control gains that secure internal platoon stability. A Lyapunov-based stability approach is employed to mitigate the destabilizing effects of Byzantine attacks, ensuring robust performance even in adverse conditions. …”
Get full text
Article -
3543
Risk Assessment Method for Offshore Structure Based on Global Sensitivity Analysis
Published 2012-01-01“…The calculation result sufficiently demonstrates the new risk assessment method’s rationality and security.…”
Get full text
Article -
3544
Implementation of Peer-Led Seeking Safety for Women in Jail
Published 2025-01-01“…We describe several “lessons learned” related to the jail context, including structure and security processes and vicarious and retraumatization experiences among facilitators. …”
Get full text
Article -
3545
Hierarchical Aggregation for Federated Learning in Heterogeneous IoT Scenarios: Enhancing Privacy and Communication Efficiency
Published 2025-01-01“…To this end, this paper designs a hierarchical federated-learning framework for heterogeneous IoT systems, focusing on enhancing communication efficiency and ensuring data security through lightweight encryption. By leveraging hierarchical aggregation, lightweight stream encryption, and adaptive device participation, the proposed framework provides an efficient and robust solution for federated learning in dynamic and resource-constrained IoT environments. …”
Get full text
Article -
3546
Good governance based on service information system applications administration population via smartphones
Published 2023-12-01“…If applied to an application platform that manages population administration services, the principles of Good Governance can secure the smooth running of these services, in line with the needs of the community. …”
Get full text
Article -
3547
Strategies for Implementing Building Operability Certificate to Improve Performance of Building Management: A Case Study in Probolinggo City, Indonesia
Published 2024-01-01“…The building operability certificate concerns occupants’ safety before the building is used and is directed by Law Government Regulation 16 of 2021 for building security. This article discusses implementing a building operability certificate underperforming and the strategy for implementing the building operability certificate (SLF) policy. …”
Get full text
Article -
3548
Joint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network
Published 2015-01-01“…The secure communication that multiple OFDMA-based cell-edge mobile stations (MS) can only transmit confidential messages to base station (BS) through an untrusted intermediate relay (UR) is discussed. …”
Get full text
Article -
3549
Simplified Technique for Sealing Corneal Perforations Using a Fibrin Glue-Assisted Amniotic Membrane Transplant-Plug
Published 2014-01-01“…An amniotic membrane patch was placed over the plug, which was then secured by a bandage contact lens. Result. Surgery to restore corneal stromal thickness without recurrence of perforation. …”
Get full text
Article -
3550
THE RELATIONSHIP BETWEEN ECONOMIC GROWTH AND MIGRATION IN TERMS OF 14 EUROPEAN UNION COUNTRIES AND TURKEY
Published 2022-12-01“…The literature on migration is often studied in the economic, political and security fields. This study focuses on the relationship of migration with economic growth. …”
Get full text
Article -
3551
Market Mechanisms as a Social Deadlock for Russian Education
Published 2019-06-01“…Basing on foreign and domestic sources, the author proves that the marketization of education is generated by neo-liberal attitude of the financial and economic elites seeking to reduce state budget expenditures in the social sphere and keep up the disintegration of society and to secure their future domination. The state, the bureaucratic apparatus of the education system, educators’ and researchers’ communities do not take up the problem of education marketization and its consequences. …”
Get full text
Article -
3552
Quantile and interquantile regression models for returns to education by economic sector and vulnerable population in Colombia
Published 2024-12-01“…Traditional Mincerian socioeconomic variables such as gender, experience, hours worked, marital status, relationship with the head of the household, and social security affiliation, were controlled for. Results show that while there is a positive effect between educational level and income in all economic sectors studied, this relationship varies in magnitude and form along the wage distribution.…”
Get full text
Article -
3553
Ring Oscillators with Additional Phase Detectors as a Random Source in a Random Number Generator
Published 2024-12-01“…This feature enhances the security of the produced sequences, as eavesdroppers are unable to observe the continuous random bit generation process, such as through monitoring power lines. …”
Get full text
Article -
3554
PENERAPAN ARTIFICIAL INTELLIGENCE (AI) DALAM PERAMALAN AKUNTANSI TINJAUAN LITERATUR DAN AGENDA PENELITIAN MASA DEPAN
Published 2025-01-01“…Major implementation challenges include data quality, infrastructure limitations, and data security. Development opportunities are identified in blockchain integration, hybrid models, and preprocessing automation. …”
Get full text
Article -
3555
An Image Encryption Algorithm Based on the Improved Sine-Tent Map
Published 2021-01-01“…The correlation of the ciphertext image pixels is very low, and the algorithm is highly secure as a conclusion.…”
Get full text
Article -
3556
Enhancing e-government in digital transformation: integrating archive management and digital solutions in Pekanbaru, Indonesia
Published 2024-08-01“…The study's results identified challenges to SRIKANDI implementation, including inadequate technological infrastructure, the need for skilled human resources in information technology, attention to data security, changes in organizational culture, and ongoing technical support. …”
Get full text
Article -
3557
Estimation of Tabriz population based on exponential and logistic growth models for water scarcity analysis
Published 2024-12-01“…In addition, by using this method, it is possible to better plan for the future of this city in terms of water scarcity, water demand and consumption, and water security. The used method can be applied to other cities and regions to predict the population numbers and to assess water scarcity.…”
Get full text
Article -
3558
Stretchable and body conformable electronics for emerging wearable therapies
Published 2025-01-01“…Furthermore, the article delineates the crucial characteristics of wearable therapeutic devices, such as biocompatibility, secure skin attachment, and effective moisture management. …”
Get full text
Article -
3559
THE ETHICAL AND LEGAL ASPECTS OF HEALTH POLICY ON ELECTRONIC MEDICAL RECORDS IN INDONESIA
Published 2024-10-01“…The use of electronic medical records raises concerns about potential data leaks, necessitating the establishment of security measures and identification of responsible parties in case of breaches. …”
Get full text
Article -
3560
A Method of Intrusion Detection Based on WOA-XGBoost Algorithm
Published 2022-01-01“…However, computer viruses and malicious network attacks make network security face huge challenges, and more accurate detection of attacks has become the focus of attention to current computer fields. …”
Get full text
Article