Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3721
AFM-DViT: A framework for IoT-driven medical image analysis
Published 2025-02-01“…The AFM-DViT model offers an effective solution for secure and efficient medical image analysis in IoT-enabled environments.…”
Get full text
Article -
3722
Coordinative Discourse of Strategic Sovereignty Tilting the European Union’s Institutional Balance
Published 2022-11-01“…The article uses the cases of the EU industrial, trade policy, and the common security and defense policy to demonstrate the changing institutional balance.The results of the study show that the main institutional beneficiary of "strategic sovereignty" is the European Commission. …”
Get full text
Article -
3723
A Chromosome level assembly of pomegranate (Punica granatum L.) variety grown in arid environment
Published 2025-01-01“…Pomegranates can tolerate arid climates and are considered among the fruits that will play a major role in food security. However, the genomics resources of pomegranate growing in arid regions are scarce. …”
Get full text
Article -
3724
Ruling the streets: the policing of protest and political violence in Madrid during the Second Republic, 1931-1936
Published 2025-02-01“…The incoherent alternation of both repertoires followed politically motivated criteria and fostered an escalation of violence that increased the number of victims and obstructed the democratisation of the security apparatus. …”
Get full text
Article -
3725
An improved lightweight ConvNeXt for rice classification
Published 2025-01-01“…As a major food crop widely grown around the world, the seed type of rice plays a key role in ensuring food security and optimizing agricultural productivity. …”
Get full text
Article -
3726
From forensic chemistry: an educational experience
Published 2024-10-01“…In this way, it contributes to generating awareness about safety and security, ethics, and the professional responsibilities of chemists. …”
Get full text
Article -
3727
Linear gate bounds against natural functions for position-verification
Published 2025-01-01“…The scheme is feasible for a prover with linear classical resources and $O(1)$ quantum resources, and secure against sub-linear quantum resources.…”
Get full text
Article -
3728
Reconfigurable Antenna Assisted Intrusion Detection in Wireless Networks
Published 2013-10-01“…The results show that the proposed scheme can add an additional layer of security that can significantly alleviate many vulnerabilities and threats in current fixed wireless networks.…”
Get full text
Article -
3729
Japan’s Foreign Policy Shifting in 2022
Published 2024-07-01“…This article examines Japan's significant foreign policy changes in 2022, focusing on three crucial documents: the National Security Strategy (NSS), the National Defence Strategy (NDS), and the Medium-Term Defence Force Buildup Program (MTDP), issued on December 6, 2022. …”
Get full text
Article -
3730
Application of IoT and blockchain technology in the integration of innovation and industrial chains in high-tech manufacturing
Published 2025-04-01“…The framework leverages blockchain technology to ensure data transparency and security, while smart contracts automate exception handling to enhance efficiency. …”
Get full text
Article -
3731
Design of an Uninterrupted Power Supply with Li-Ion Battery Pack: A Proposal for a Cost-Efficient Design with High Protection Features
Published 2021-06-01“…Besides, li-ion batteries require a safe and secure ground to reach the best performance and decrease the explosion risk. …”
Get full text
Article -
3732
Money Laundering Practices and Singapore’s Steps Against Indonesian Tax Amnesty
Published 2025-01-01“…The implementation of those policies is classified as a two-pronged sword because it also ensures the privacy and security of corrupt money investments from other countries. …”
Get full text
Article -
3733
Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks
Published 2014-01-01“…However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). …”
Get full text
Article -
3734
Exploring the relationship between learning emotion and cognitive behaviors in a digital game
Published 2024-09-01“…The study demonstrates that high‐level learners maintained a high level of insightful emotion throughout the game, excelled at constructing strategic formations to control more significant chessboard areas, and preferred to reserve powerful pieces until the end to secure a winning advantage. Conversely, low‐level learners exhibit a predominant level of neutral emotion, especially during unrelated behaviors, and struggle to maintain a strategic overview, focusing instead on smaller, immediate gains, which hamper the application of deeper strategies.…”
Get full text
Article -
3735
Money Laundering Practices and Singapore’s Steps Against Indonesian Tax Amnesty
Published 2025-01-01“…The implementation of those policies is classified as a two-pronged sword because it also ensures the privacy and security of corrupt money investments from other countries. …”
Get full text
Article -
3736
Touristic destination image in light of the service dominant logic of marketing
Published 2018-07-01“…Results indicate that values related to self-respect, security and excitement influence the assessment of some TDI components, and that the last four constructs influence the likelihood of individuals to visit or to recommend the destinations.…”
Get full text
Article -
3737
Adaptive Coordinated Variable Speed Limit between Highway Mainline and On-Ramp with Deep Reinforcement Learning
Published 2022-01-01“…This research provides insights into the management of highway capacity so as to secure traffic efficiency and reliability for the merging zone.…”
Get full text
Article -
3738
The Rare Coincidence: Nonrecurrent Laryngeal Nerve Pointed by a Zuckerkandl's Tubercle
Published 2012-01-01“…Anatomical and embryological variations of the inferior laryngeal nerve (ILN), of the thyroid gland itself and unusual relations between ILN and the gland threaten operation security are discussed. The patient with toxic multinodular goiter is treated with total thyroidectomy. …”
Get full text
Article -
3739
An Analysis of the Social Wellbeing of Youth in Turkey Based on the “2017 Global Youth Wellbeing Index”
Published 2023-12-01“…The ‘2017 Global Youth Wellbeing Index’ (GYWI) is an international index explaining the social wellbeing status of the youth of different countries in terms of ‘civil participation’, ‘economic opportunities’, ‘education’, ‘health’, ‘information and communication technologies’, ‘safety and security’, and ‘gender equality’. In the current study, the social wellbeing of the youth in Turkey was analyzed on the basis of the data related to the specified domains of this index. …”
Get full text
Article -
3740
Implementation of Static Line Voltage Stability Indices for Improved Static Voltage Stability Margin
Published 2019-01-01“…This paper presents an approach for enhancing the static voltage stability margin and reducing the power losses of the system with voltage security-constrained optimal power flow (VSC-OPF) that is based on static line voltage stability indices. …”
Get full text
Article