Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3881
Towards Dynamic Remote Data Auditing in Computational Clouds
Published 2014-01-01“…The comparative analysis with the state-of-the-art RDA schemes shows that the proposed scheme is secure and highly efficient in terms of the computation and communication overhead on the auditor and server.…”
Get full text
Article -
3882
The use of technology in civil and family oral trials as an innovative source of human rights in Mexico
Published 2025-01-01“… The Declaration of the Rights of Man and of the Citizen of 1789 recognizes basic rights, including the right to life, liberty, security, equality, property and the expression of ideas and opinions through the press or any other medium. …”
Get full text
Article -
3883
Design and Analysis of Nuclear Transportation Cask Using Phase Changing Material
Published 2025-01-01“…In the nuclear sector, secure transportation of radioactive materials is crucial in the nuclear sector, and cask design and analysis are crucial for maintaining fuel integrity. …”
Get full text
Article -
3884
Social policy of the Scandinavian countries in relation to women victims of domestic violence
Published 2023-11-01“…It was also revealed that the support programs are mainly aimed at protecting and establishing the security boundary, restoring the self-esteem of victims of domestic violence.…”
Get full text
Article -
3885
Optimal PV‐storage capacity planning for rail transit self‐consistent energy systems considering extreme weather conditions
Published 2024-12-01“…Abstract With the rapid development of electrified rail transportation, the traction load demand of rail transportation has increased sharply, and its operational security under extreme conditions has been highlighted. …”
Get full text
Article -
3886
Emotional distress of adolescents from dysfunctional families as a subject of scientific research
Published 2024-11-01“…The social significance of the topic is noted: the emotional distress of adolescent children not only makes unhappy themselves, but also reduces the level of social health of the family and the whole society, affecting social security. The purpose of the research is a theoretical analysis of sources of scientific information which, presumably, can form a methodological basis for studying family predictors of the adolescent emotional distress. …”
Get full text
Article -
3887
Mechanism of Support Optimization and Confined Blasting of Thick and Hard Rock with a Wedge-Structure Immediate Roof: A Case Study
Published 2021-01-01“…These key parameters were determined as 20–25 m and 1.15–1.28 MPa, respectively, and the mining strategy was successfully applied in working face 880, performing high security and reasonable economical efficiency.…”
Get full text
Article -
3888
Artificial Intelligence Bias and the Amplification of Inequalities in the Labor Market
Published 2024-06-01“…We assess these threats by studying data from various labor fields, including justice, security, healthcare, human resource management, and education.…”
Get full text
Article -
3889
Werner Syndrome Caused by Homozygous Frameshift Variant c.1578del in WRN
Published 2024-12-01“…Molecular diagnosis brings better treatment of manifestations and monitoring options for the patients, helping to establish more sufficient and secure patient care. …”
Get full text
Article -
3890
Evaluation of Barriers to Digital Transformation in Maritime Logistics Based on A Spherical Fuzzy Multi-Criteria Decision-Making Framework
Published 2025-02-01“…When the results obtained from the study were examined, ‘Technology’ is the most important barrier category (B1) (0.341) for the adoption of digital transformation in maritime logistics, followed by the main barrier categories related to “Security” (B4) (0.266), “Environment” (B3) (0.223) and “Organisation” (B2) (0.171) respectively. …”
Get full text
Article -
3891
From Boole to Leggett-Garg: Epistemology of Bell-Type Inequalities
Published 2016-01-01“…This implies that the Leggett-Garg inequality does not mean that the SQUID flux is not there when nobody looks, as Leggett and Garg suggest, but instead that the probability measures may not be what Leggett and Garg have assumed them to be, when no data can be secured that directly relate to them. We show that similar considerations apply to other quantum interpretation-puzzles such as two-slit experiments.…”
Get full text
Article -
3892
Victims’ profile by firearm related injuries in the municipality of the state of Rio de Janeiro
Published 2015-07-01“…The study contribution is anchored in orientation to preventive actions to the local population as well as to the elaboration of security public policies and awareness for the participation to combat and minimize the collaborative indexes of the local urban violence.…”
Get full text
Article -
3893
A strategy of the new “green revolution” in wheat breeding: celebrating the jubilee of Lyudmila A. Bespalova, Full Member of the Russian Academy of Sciences
Published 2022-04-01“…Lukyanenko National Grain Center is a practically proven strategy of the new “green revolution” capable of ensuring the global food security.…”
Get full text
Article -
3894
Radiofrequency Ablation of Hepatocellular Carcinoma: A Literature Review
Published 2011-01-01“…An accurate evaluation of treatment response is very important to secure successful RFA therapy since a sufficient safety margin (at least 0.5 cm) can prevent local tumor recurrences. …”
Get full text
Article -
3895
Assessment of Negative Symptoms in Schizophrenia: From the Consensus Conference-Derived Scales to Remote Digital Phenotyping
Published 2025-01-01“…Despite the potential to overcome traditional assessment barriers, challenges remain in aligning these digital measures with clinical ratings and ensuring data security. Equally important is patient acceptance, as the success of remote digital phenotyping relies on the willingness of patients to use these technologies. …”
Get full text
Article -
3896
Integrating Machine Learning for Predictive Maintenance on Resource-Constrained PLCs: A Feasibility Study
Published 2025-01-01“…This approach minimizes latency, enhances data security, and reduces the bandwidth required for data transmission, making it ideal for industrial applications that demand immediate response times. …”
Get full text
Article -
3897
Simulation modeling of student enrolment to solve operations problems: A case of the Saad Al- Abdullah Academy in Kuwait
Published 2025-04-01“…It focuses on a case study of the new student registration procedure at Kuwait's Saad Al-Abdullah Academy for Security Sciences. The paper represents and replicates each stage of the student enrollment procedure. …”
Get full text
Article -
3898
Channel modeling and testing of wireless transmission for underground in-pipe leak and material loss detection
Published 2017-11-01“…This will support the on-device power management to secure large autonomy operations. Experimental tests have shown that the overall received energy was mixed with ambient energy if the latter is sent at the same frequency and that the optimum frequency range used to transmit energy was rather at low frequency range of 100–200 MHz.…”
Get full text
Article -
3899
Efficiency of Semantic Web Implementation on Cloud Computing: A Review
Published 2021-06-01“…As a result, issues with portability, interoperability, security, selection, negotiation, discovery, and definition of cloud services and resources may arise. …”
Get full text
Article -
3900
Detection of UAV GPS Spoofing Attacks Using a Stacked Ensemble Method
Published 2024-12-01“…Experimental results indicate that the proposed model achieved a high accuracy of 99.79% in detecting GPS spoofing attacks, demonstrating its potential effectiveness in enhancing UAV security.…”
Get full text
Article