Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3861
Disaster Management and Identification of Safe and Hazardous Landslide Zones in Rural Areas of Sarwabad County
Published 2015-03-01“…Moreover, it is found that nearly 46 percent of the rural population and 31 villages of the area are located in safe or low-hazard-level landslides, while the rest of the settlements and rural population are located in the mid and high-hazard-level zones and, as such, are need to be secured in these zones.…”
Get full text
Article -
3862
Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application
Published 2022-01-01“…A rise in working and studying from home, activities which depend on the Internet, and the exchange of data coupled with a lack of understanding about security for interacting in cyberspace have made cybersecurity one of the most pressing concerns today. …”
Get full text
Article -
3863
Understanding the Internet of Nano Things: overview, trends, and challenges
Published 2018-11-01“…It is concluded that technologies prevail current IoNT literature, applications are focused on health care, and there is no international standardization regarding privacy, security or architecture of nano-networks. …”
Get full text
Article -
3864
Spillover: From climate change to pandemics
Published 2025-01-01“…Animals and plants are themselves susceptible to die-offs and even extinction from infections, jeopardizing food security and health.Another unknown is whether the vast permafrost, now melting, could become a source of novel microbes that are pathogenic for humans.Travel, trade, and migration contribute to the global movement of human and animal pathogens and vectors. …”
Get full text
Article -
3865
SOCIOLOGICAL IMPACT OF VOTE BUYING IN NORTH-WEST ZONE OF NIGERIA: THE STUDY OF THE 2015 AND 2019 ELECTIONS
Published 2025-01-01“…The ill competent ones occupied elective political positions because they used money to secured votes, while the qualified ones were left behind hence, they were unable to use money during primary and secondary elections. …”
Get full text
Article -
3866
O PROERD funciona? Notas a partir de estudo quase-experimental
Published 2020-01-01“…Empirical studies measuring results in the area of public security are still rare in Brazil, a circumstance that adds value to this work. …”
Get full text
Article -
3867
Protective Immunity against SARS Subunit Vaccine Candidates Based on Spike Protein: Lessons for Coronavirus Vaccine Development
Published 2020-01-01“…The recent outbreak of the novel coronavirus disease, COVID-19, has highlighted the threat that highly pathogenic coronaviruses have on global health security and the imminent need to design an effective vaccine for prevention purposes. …”
Get full text
Article -
3868
Maternal and Pediatric Health Outcomes in relation to Gestational Vitamin D Sufficiency
Published 2015-01-01“…With increasing evidence pointing to fetal origins of some later life disease, securing vitamin D sufficiency in pregnancy appears to be a simple, safe, and cost-effective measure that can be incorporated into routine preconception and prenatal care in the offices of primary care clinicians. …”
Get full text
Article -
3869
Research on Spam Filters Based on NB Algorithm
Published 2025-01-01“…Spam filtering is a crucial part of network security. As spam becomes more complex, traditional rule-based methods struggle to meet the needs of modern email systems. …”
Get full text
Article -
3870
School Leadership and the Civic Nationalist Turn: towards a typology of leadership styles employed by Head Teachers in their enactment of the Prevent Duty and the promotion of fund...
Published 2021-06-01“…Drawing on literature from school leadership, this research engages with head teachers in schools in England to explore the leadership styles they employ when enacting the requirements of the Counter-Terrorism and Security Act 2015 (Home Office, 2015) and the Teachers’ Standards (DfE, 2012) and navigating the civic nationalist turn. …”
Get full text
Article -
3871
Independent Component Analysis Based on Information Bottleneck
Published 2015-01-01Get full text
Article -
3872
The Use of Machine Learning Methods in Road Safety Research in Poland
Published 2025-01-01Get full text
Article -
3873
Climate Smart Agriculture (CSA) for Sustainable Agriculture Nexus: A Tool for Transforming Food Systems
Published 2023“…CSA and SA share a common principal goal of achieving food security. It was concluded that developing countries are the worst affected by the negative impacts of climate change and don’t have the adaptive capacity to respond to climate change effects.…”
Get full text
-
3874
Investigation of Storage and Retrieval of Records At Kisoro District Local Government.
Published 2024“…This inadequacy contributes to numerous challenges, including poor professionalism, untimely retrieval of requested records, and insufficient data security. The study recommended allocating more funds to the records section for overall maintenance. …”
Get full text
Thesis -
3875
Genome-wide association studies with prolapsed gland of the third eyelid in dogs
Published 2025-01-01Get full text
Article -
3876
Changes in Antioxidant and Photosynthetic Capacity in Rice Under Different Substrates
Published 2025-01-01“…Against the backdrop of a changing global climate, the soil environment may undergo significant changes, directly affecting agricultural productivity and exacerbating global food security issues. Three different substrates were set up in this study, namely, S (high sand and low nutrient content), T (medium sand and medium nutrient content), and TT (low sand and high nutrient content). …”
Get full text
Article -
3877
A-priori multi-objective optimization for the short-term dispatch of distributed energy resources
Published 2025-03-01“…In order to exploit the flexibility provided by distributed energy resources (DERs), a multi-objective optimization (MOO) approach is proposed to minimize the bus voltage deviations, the network losses, and the current security index. Effective linear power flow equations are included into both the objective functions and the inequality constraints of the MOO model, thus yielding benefits in terms of reduced model dimension and computational complexity. …”
Get full text
Article -
3878
Hemolytic Crisis following Naphthalene Mothball Ingestion in a 21-Month-Old Patient with Glucose-6-Phosphate Dehydrogenase (G6PD) Deficiency
Published 2019-01-01“…Care should be taken to secure these products and prevent ingestion.…”
Get full text
Article -
3879
Red dragon fruit (Hylocereus polyrhizus), a superfruit rich in betacyanins pigments with antioxidative potential for hepatoprotection: A review
Published 2025-06-01“…Yet, RDF is a vital alternative source of betacyanins that can be developed into functional food products to take part in functional food security for the prevention of non-communicable diseases caused by oxidative stress to address the goals of the United Nations 2030 Agenda for Sustainable Development.…”
Get full text
Article -
3880
EXPANDING NASA FUNCTIONALITY USING ITS API AND IMPROVING INTEREST AMONG PEOPLE IN SPACE EXPLORATION
Published 2024-12-01“…By leveraging NASA’s API, the platform integrates up-to-date data, while modern approaches to routing, state management, and authentication ensure user convenience and security. A non-relational database is utilized for efficient information storage and accessibility. …”
Get full text
Article