Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3741
Forearm multimodal recognition based on IAHP‐entropy weight combination
Published 2023-01-01“…Abstract Biometrics are the among most popular authentication methods due to their advantages over traditional methods, such as higher security, better accuracy and more convenience. The recent COVID‐19 pandemic has led to the wide use of face masks, which greatly affects the traditional face recognition technology. …”
Get full text
Article -
3742
Transformation of business under the influence of artificial intelligence
Published 2024-01-01“…Research results of Forbes Advisor (2023) indicate that the most common use of AI is in Customer Service, Cyber Security, Digital Personal Assistants, Customer Relationship Management (CRM), etc. …”
Get full text
Article -
3743
Distributionally Robust Self-Scheduling Optimization with CO2 Emissions Constraints under Uncertainty of Prices
Published 2014-01-01“…As a major energy-saving industry, power industry has implemented energy-saving generation dispatching. Apart from security and economy, low carbon will be the most important target in power dispatch mechanisms. …”
Get full text
Article -
3744
Efficiency and Progressivity Measures of the Flat Tax with a Special Focus on Bosnia and Herzegovina
Published 2015-12-01“…Progressivity indicators are very low and are a result of the flat PIT and flat social security contributions (hereafter: SSCs). Finally, for the case of Bosnia and Herzegovina (B&H), efficiency and progressivity measures can be enhanced indicating that PIT reforms should be brought together with SSCs reforms. …”
Get full text
Article -
3745
Synthesis of antifungal imines as inhibitors of ergosterol biosynthesis
Published 2025-12-01“…Ensuring a safe and secure supply of nutritious food for the ever growing global population necessitates the development of new eco-friendly fungicides to increase global food output by minimizing plant disease losses. …”
Get full text
Article -
3746
Regulatory challenges in ai-based diagnostics: Legal implications of ai use in medical diagnostics
Published 2025-01-01“…The research results indicated that algorithmic bias, data security, and the requirement for stringent rules to guarantee the ethical and safe application of AI are the primary obstacles. …”
Get full text
Article -
3747
A systematised review and evidence synthesis on the broader societal impact of vaccines against Salmonella
Published 2025-02-01“…Despite variations in study design, methodology, and study quality, salmonellae infections were largely associated with negative broader societal impacts, including detriments in childhood physical development (very weak association), childhood educational development (strong to very strong association), household security (moderate association), public health spending (moderate association), and national income (moderate to strong association). …”
Get full text
Article -
3748
Optimal SES Selection Based on SVD and Its Application to Incipient Bearing Fault Diagnosis
Published 2018-01-01“…To distinguish the incipient fault of bearing before it steps into serious failure is the main task of condition monitoring and fault diagnosis technology which could guarantee the reliability and security of rotating machinery. The early defect occurring in the REB is too weak and manifests itself in heavy surrounding noise, thus leading to the inefficiency of the fault detection techniques. …”
Get full text
Article -
3749
Stingless Bee Honey Farming and Farmer Empowerment in Sawahlunto City, West Sumatra, Indonesia
Published 2025-01-01“…Interviews with farmers, local officials, and researchers revealed that honey production significantly enhances farmers’ incomes, diversifies agricultural activities, and improves food security. Ecological benefits, such as enhanced pollination and biodiversity conservation, were also acknowledged. …”
Get full text
Article -
3750
Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version
Published 2015-01-01“…Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. …”
Get full text
Article -
3751
Unveiling Islamophobia: navigating its presence in Sweden
Published 2025-12-01“…Political and media narratives often manufacture immigration as a social problem, framing the construction of meaning through the discourses of cultural differences as social, political and security problems. Of specific concern is how Muslims and immigrants from predominantly Muslim countries are perceived as the undesirable ‘Other’. …”
Get full text
Article -
3752
"CYCLIST ON THE MARSH": LESSONS AND PROSPECTS OF THE LAST EU ENLARGEMENT
Published 2013-08-01“…Specific historic experience of the applicants pre-determined a considerable specialty of west-European fashioned democratic regimes in those countries, weakness of consensus and tolerance culture which has already rooted itself in the West-European society, and which has to a considerable degree secured stable development of Western Europe over the last decades. …”
Get full text
Article -
3753
Trust evaluation model of cloud user based on behavior data
Published 2018-05-01“…The user authentication can provide a certain degree of security, but when the user information was leaked, this method will not be effective. …”
Get full text
Article -
3754
Mitigating the implementation of SDGs program no. 13 in Indonesia: An overview of social dynamics and local wisdom
Published 2025-01-01“…The review explores key sectors including waste management, forest fire prevention, population dynamics, food security, and urban planning. Findings highlight that while local wisdom-based practices like “Tri Hita Karana” and customary land-use regulations are effective in mitigating environmental damage, scaling these approaches across diverse communities remains a challenge. …”
Get full text
Article -
3755
Operational Risk Assessment for International Transport Corridor: A Case Study of China-Pakistan Economic Corridor
Published 2019-01-01“…The risk management and control should focus on these three types of risks and strengthen the security management along the route. Strengthen policy docking and communication, maintain political stability, and strengthen antiterrorism cooperation.…”
Get full text
Article -
3756
Analysis of attacks on device manager in software-defined Internet of Things
Published 2017-08-01“…Although being the one that performs one of the most crucial services, the device managers in current primary controllers have a big security issue as they do not include any device verification, authentication, or authorization routines. …”
Get full text
Article -
3757
Trust and Distrust in a Democratic State of Law
Published 2024-12-01“…The key task of public administration, aimed at inspiring and intensifying trust, is to obtain and secure the common good in the state on the basis of, and within the limits of, the applicable legal regulations, which at the same time set out the methods and scope of social protection in the individual spheres of operation of the legislative, executive, and judicial authorities.…”
Get full text
Article -
3758
ASSESSMENT AND ANALYSIS OF DIGITAL TRANSFORMATION OF REGIONAL ECONOMIC SYSTEMS OF THE RUSSIAN FEDERATION: METHODOLOGICAL APPROACHES AND THEIR APPROBATION
Published 2020-02-01“…A distinctive aspect of the proposed algorithm is the orientation of the developed tools to study the five main directions of digitalization, defined by the Order of the Government of the Russian Federation of July 28, 2017 (No. 1632-r): regulatory regulation, personnel for the digital economy, formation of research competencies and technological foundations, information infrastructure, information security. Based on the results of the study, the main qualitative and quantitative characteristics have been identified, that assess the development of the digital economy in the constituent entities of the Russian Federation at the present stage of development; a toolkit has been offered, that allows you to determine key areas of regional policy aimed at intensifying the processes of digitalization of business processes.…”
Get full text
Article -
3759
A Statistical Image Feature-Based Deep Belief Network for Fire Detection
Published 2021-01-01“…Detecting fires is of significance to guarantee the security of buildings and forests. However, it is difficult to fast and accurately detect fire stages in complex environment because of the large variations of the fire features of color, texture, and shapes for flame and smoke images. …”
Get full text
Article -
3760
Entre o lícito e o ilícito: a dinâmica do roubo de cargas e suas zonas cinzentas
Published 2020-01-01“…The Military Intervention in Public Security in Rio de Janeiro, in 2018, expresses this mobilization of economic corporations in government spheres in order to promote a wide-ranging action not only police, but also political. …”
Get full text
Article