Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3601
New Locked-Wire-Type External Fixator (the Ichi-Fixator) for Fourth and Fifth Carpometacarpal Joint Dislocation
Published 2018-01-01“…Linked external wire-type fixation enables enhanced security of fixation, facilitates postoperative mobilization, and may allow an immediate return to work.…”
Get full text
Article -
3602
Fast Antinoise RFID-Aided Medical Care System
Published 2015-10-01“…We prove that our generated proof is reliable because it can resist most security threats and guarantee the integrity of the proof. …”
Get full text
Article -
3603
Machine Learning-Based Anomaly Prediction for Proactive Monitoring in Data Centers: A Case Study on INFN-CNAF
Published 2025-01-01“…Anomaly prediction in time series is crucial for ensuring the stability and security of data centers, especially in scientific contexts such as INFN-CNAF, the National Center for Research and Development in Information and Communication Technology of the National Institute for Nuclear Physics. …”
Get full text
Article -
3604
Development of Accounting Through Automation and Artificial Intelligence
Published 2025-01-01“…Furthermore, the study underscores the critical need for responsible AI usage, emphasizing the importance of transparency, data security, and compliance with regulatory standards. …”
Get full text
Article -
3605
Review of the application of fgOTN in the interconnection of artificial intelligence data centers
Published 2025-01-01“…The fine grain optical transport network (fgOTN), which serves as a continuation of synchronous digital hierarchy (SDH) technology and an extension of optical transport network (OTN) technology, is applied in the interconnection of artificial intelligence data centers to meet their multiple requirements for flexible scheduling, efficient transmission, strict security isolation, and low latency. Firstly, the basic concepts, technical architecture, and application scenarios of fgOTN were introduced. …”
Get full text
Article -
3606
Review of Digital Construction of UHV Projects Based on Building Information Modeling Technology
Published 2025-02-01“…As major national infrastructure projects, UHV projects are key to ensuring power grid security, promoting energy consumption, and optimizing resource allocation. …”
Get full text
Article -
3607
Interpersonal Cognitive Distortions: What is the Role of Childhood Trauma and Attachment?
Published 2023-10-01“…These findings provide evidence that childhood trauma, mediated by anxious attachment, might contribute to interpersonal cognitive distortions in adulthood. However, secure and avoidant attachment had no statistically meaningful direct impact on interpersonal cognitive distortions. …”
Get full text
Article -
3608
A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing
Published 2016-01-01“…Experiments show that our scheme is secure and feasible.…”
Get full text
Article -
3609
The Concept of a Method for Predicting the Cascade Effect Under Conditions of Hybrid Warfare
Published 2024-09-01“…Using complementary tools such as process analysis, risk assessment, Petri nets, and Bayesian network in the form of the Critical Infrastructure Security Situational Management methodology, the authors provide a comprehensive solution for modeling how to protect the life and health of the civilian population. …”
Get full text
Article -
3610
A Rising E-Channel Tide Lifts All Boats? The Impact of Manufacturer Multichannel Encroachment on Traditional Selling and Leasing
Published 2016-01-01“…With either marketing strategy, the additional expansion of an e-channel territory may secure Pareto gains, in which all members benefit.…”
Get full text
Article -
3611
Bitcoin, Libra and Central Bank Digital Currencies — Elements of a New Monetary System?
Published 2020-09-01“…Central bank digital currencies could be viewed as a public sector response to these private projects to secure central banks’ predominant role in the monetary system of the future.…”
Get full text
Article -
3612
Identifying groundwater potential zones in a typical irrigation district using the geospatial technique and analytic hierarchy process
Published 2025-12-01“…Proper management and utilization of groundwater are essential for ecological balance and food security, especially in agricultural regions. This study delineates Groundwater Potential Zones (GWPZs) in the Heping Irrigation District of Heilongjiang Province using GIS and AHP. …”
Get full text
Article -
3613
Encoding and Decoding of Secret Messages Using Matrices.
Published 2023“…Due to the great need of security for passing sensitive information from one person to another or from one organization to another through electronic technology, there is need for cryptography as a solution to this problem. …”
Get full text
Thesis -
3614
Faith-Based Organizations and Health Empowerment of The Needy in Kitunga Sub-County Ntungamo District.
Published 2024“…FBOs have for a long time committedly made positive contributions towards the provision of education, support in agriculture, skills, and health to enhance social welfare but some people in rural areas still have low income, poor health standards, no food security, and limited skills and lack employment due to low levels of education hence poor social welfare. …”
Get full text
Thesis -
3615
A feasibility of land consolidation in kigezi region, south western Uganda: a solution to land fragmentation, land shortage, farmer’s productivity and economic development
Published 2022“…The article compares the benefits of the land under fragmentation and the land under consolidation systems and recommends strategies to transform Kigezi Region’s informal and subsistence farming system to modern, commercial agriculture to achieve food security and increase incomes of the population and economic development of the area.…”
Get full text
Article -
3616
A critical evaluation of religious syncretism among the Igbo Christians of Nigeria
Published 2021-12-01“…Besides the belief in ritualistic charms, many Igbo/Igbo-speaking Christians consult diviners for various reasons, including security and prosperity, causes of illness and death, ways of preserving life, as well as to discern the mind of God about one’s future and destiny. …”
Get full text
Article -
3617
Relieve Adversarial Attacks Based on Multimodal Training
Published 2025-01-01“…However, the emergence of adversarial attacks has exposed shortages of neural networks, forcing people to confront their limitations and further increasing concerns about the security of deep learning models. Adversarial training is an effective defense mechanism that incorporates adversarial samples into the training data, enabling models to better detect and resist attacks. …”
Get full text
Article -
3618
A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis
Published 2015-06-01“…Both methods look different; however, they have similar security goals and they both feature distribution transforming encoders based on statistical schemes. …”
Get full text
Article -
3619
Transformer Inrush Current and Internal Fault Discrimination Using Multitypes of Convolutional Neural Network Techniques
Published 2024-01-01“…To maintain the security of transformer differential protection, it is essential to restrain its response to oversetting differential current caused by the inrush current or other switching conditions. …”
Get full text
Article -
3620
Improving the Complexity of the Lorenz Dynamics
Published 2017-01-01“…The new system is especially designed to improve the complexity of Lorenz dynamics, which, despite being a paradigm to understand the chaotic dissipative flows, is a very simple example and shows great vulnerability when used in secure communications. Here, we demonstrate the vulnerability of the Lorenz system in a general way. …”
Get full text
Article