Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3941
“Big Challenges” and Regional Technical University: Values and Actions
Published 2020-03-01“…There is a distinction between civilization and globalist paradigms of Russia positioning, as well as a distinction between well-being and security as two strategies of values generalization. …”
Get full text
Article -
3942
Higher Education as Soft Power Potential of Russia
Published 2009-12-01“…At the same time the USA has secured the leading role in international education. …”
Get full text
Article -
3943
Operational Risk Assessment of Distribution Network Equipment Based on Rough Set and D-S Evidence Theory
Published 2013-01-01“…Therefore, scientific assessment of power distribution equipment operation risk is significant to the security of power distribution system. In order to get the satisfactory assessment conclusions from the complete and incomplete information and improve the assessment level, an operational risk assessment model of distribution network equipment based on rough set and D-S evidence theory was built. …”
Get full text
Article -
3944
The urgency of addressing zoonotic diseases surveillance: Potential opportunities considering One Health approaches and common European Data Spaces
Published 2025-04-01“…Consequently, this approach might foster data sharing from Member States by leveraging existing developments within data spaces in terms of, for example, data security. It could also support researchers and developers in accessing transdisciplinary, stratified, and quality-controlled data for their projects.…”
Get full text
Article -
3945
Improving wheat yield prediction through variable selection using Support Vector Regression, Random Forest, and Extreme Gradient Boosting
Published 2025-03-01“…Plant breeding centers, in their relentless pursuit of more productive and resilient wheat varieties, have generated vast data repositories that are fundamental to ensuring global food security. This study uses these data to develop a wheat grain yield (GY) prediction model, using machine learning techniques such as Random Forest (RF), Support Vector Regression (SVR), and Extreme Gradient Boosting (XGBoost). …”
Get full text
Article -
3946
The use of Telenomus remus (Nixon, 1937) (Hymenoptera: Scelionidae) in the management of Spodoptera spp.: potential, challenges and major benefits
Published 2022-01-01“…Abstract Spodoptera frugiperda (Smith, 1797) (Lepidoptera: Noctuidae), also known as fall armyworm (FAW) is a polyphagous pest which can cause significant losses and is considered a global threat to different crops and a risk to food security. Currently, in maize, the pest is predominantly controlled by pesticides or transgenic events. …”
Get full text
Article -
3947
Risk Assessment of an Existing Metro Tunnel in Close Proximity to New Shield Tunnels following Construction
Published 2022-01-01“…The threshold of indicators in the existing tunnel structure risk assessment system was determined based on the tunnel function and structure security. Then, we described the membership vector determination method, weight vector determination method, and comprehensive evaluation vector processing method. …”
Get full text
Article -
3948
Trade policy uncertainty and corporate financialization: strategic implications for non-financial firms in China
Published 2025-12-01“…This analysis emphasizes the significance of legislators in ensuring policy stability and fostering a secure business environment. Furthermore, the robustness of these results was sustained when alternative key variables and methodologies were applied.…”
Get full text
Article -
3949
Differentially Private Clustered Federated Load Prediction Based on the Louvain Algorithm
Published 2025-01-01“…To address the data heterogeneity and security issues encountered in load forecasting for smart grids, this paper proposes a load-forecasting framework suitable for residential energy users, which allows users to train personalized forecasting models without sharing load data. …”
Get full text
Article -
3950
Optimization tool for small hydropower plant resource planning and development: A case study
Published 2022-09-01“…In order to decrease carbon dioxide emissions, fight climate change, not being attached to fuel resources, and increase energy security while decreasing dependence on foreign countries, governments of many countries are increasing the share of renewable energy in electricity production and have taken actions to exploit their domestic resources, which is why renewable energy is an essential and important issue in today‘s world and also in the future it may continue to play a globally essential role. …”
Get full text
Article -
3951
Advances and Challenges in Islet Transplantation: Islet Procurement Rates and Lessons Learned from Suboptimal Islet Transplantation
Published 2011-01-01“…Once the islets are engrafted, both prompt revascularization and protection from beta-cell death and graft rejection are key to secure long-term survival and function. To facilitate the engraftment of more robust islets suitable for combating the challenging isolation period and proinflammatory transplantation milieu, numerous approaches have been employed to prevent beta-cell dysfunction and death including immune modulation, prevention of apoptosis and hypoxia, as well as stimulation of growth factors, angiogenesis, and reinnervation. …”
Get full text
Article -
3952
A framework to evaluate public green spaces with an emphasis on recreational values for sustainable urban and rural areas: A systematic review and content analysis
Published 2025-01-01“…Employing a systematic review of 130 publications sourced from Web of Science, Scopus, and Google Scholar and ensuing content analysis, we identified and elaborated on 14 distinct qualities, including accessibility, connectedness, responsiveness, variety of activity, social interactions, facilities, safety and security, spaciousness, biodiversity, perceptual value, aesthetic value, and symbolic value. …”
Get full text
Article -
3953
Reusable and robust fuzzy extractor for CRS-dependent sources
Published 2025-01-01“…Our construction is built upon some well-studied cryptography, including a collision resistant hash function, a symmetric key encryption that keeps secure with respect to auxiliary input, a public key encryption and simulation-sound non-interactive zero-knowledge argument. …”
Get full text
Article -
3954
Drivers influencing the adoption of cryptocurrency: a social network analysis approach
Published 2025-02-01“…It has the potential to be faster, cheaper, and more secure than existing payment networks, making it a game-changer in the global economy. …”
Get full text
Article -
3955
Optimal Pest Control Strategies with Cost-effectiveness Analysis
Published 2021-01-01“…Pest and plant diseases cause damages and economic losses, threatening food security and ecosystem services. Thus, proper pest management is indispensable to mitigate the risk of losses. …”
Get full text
Article -
3956
Contracting account audit on social networks
Published 2022-01-01“…Social network account audit is an independent review of social network activities to express a professional opinion on the fulfillment of objectives, business compliance, and information security of orders on social networks. It is in principle a voluntary activity and is not subject to legal obligation like some other types of audit such as the audit of financial statements. …”
Get full text
Article -
3957
Public attitude and media governance of biometric information dissemination in the era of digital intelligence
Published 2025-01-01“…While PT and perceived availability (PA) significantly enhance the adoption of biometric technologies, TP exhibited an unexpected positive influence, suggesting that cautious users may still embrace biometrics if perceived as secure and trustworthy. These results emphasize the urgency of refining legal and regulatory frameworks, improving risk mitigation strategies, and enhancing user confidence to foster the responsible adoption and utilization of biometric technologies. …”
Get full text
Article -
3958
A Static State Estimation Scheme in Microgrid Utilizing μPMU Measurements
Published 2023-01-01“…The operation of power systems needs uninterrupted and precise wide-area real-time monitoring for secure and automated control of power networks, therefore, there is a requirement of robust state estimation (SE) by the smart control centre. …”
Get full text
Article -
3959
Enhancing plant disease detection through deep learning: a Depthwise CNN with squeeze and excitation integration and residual skip connections
Published 2025-01-01“…In light of increasing global challenges related to food security and sustainable agriculture, this research focuses on developing a highly efficient and accurate automated system for identifying plant diseases, thereby contributing to enhanced crop protection and yield optimization. …”
Get full text
Article -
3960
Prompt injection attacks on vision language models in oncology
Published 2025-02-01“…However, here, we demonstrate that current VLMs applied to medical tasks exhibit a fundamental security flaw: they can be compromised by prompt injection attacks. …”
Get full text
Article