Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4081
Loading on a Rigid Target from Close Proximity Underwater Explosions
Published 2012-01-01Get full text
Article -
4082
Design of a GSM Based Energy Meter Monitoring and Tamper Detection System.
Published 2023“…The project therefore predicts encouraging results in residential consumers’ power monitoring and theft detection that will help utilities to improve the reliability, security and operation of the power network.…”
Get full text
Thesis -
4083
Financial Innovations And Financial Inclusion Among Commercial Banks in Uganda
Published 2023“…As more clients choose mobile banking, the report advises banking institutions to develop measures to improve security in the platform. The report also advises making these platforms straightforward and simple to use in order to attract more users to the business. …”
Get full text
Article -
4084
Metabolomics profiling reveals p-aminobenzoic acid enhances resistance to Fusarium head blight in wheat
Published 2025-02-01“…Abstract Fusarium head blight (FHB) not only causes severe yield losses but also mycotoxin contamination in wheat, posing a serious threat to food security and public health. The mechanisms of resistance to FHB in wheat are critical for effective prevention and control of the pathogen. …”
Get full text
Article -
4085
LKM: A LDA-Based -Means Clustering Algorithm for Data Analysis of Intrusion Detection in Mobile Sensor Networks
Published 2015-10-01“…Intrusion detection system (IDS) is a kind of active network security technology to protect network from attacks. …”
Get full text
Article -
4086
Improving VANETs Connectivity with a Totally Ad Hoc Living Mobile Backbone
Published 2015-01-01“…The vehicular ad hoc network (VANET) for intelligent transportation systems is an emerging concept to improve transportation security, reliability, and management. The network behavior can be totally different in topological aspects because of the mobility of vehicular nodes. …”
Get full text
Article -
4087
Trade-off or synergy? The impacts of coal energy consumption on compound system vulnerability: A perspective from coal resource base assessment
Published 2025-01-01“…The management partition will be divided into five zones and the capacity reduction trajectory into advancing, developmental, and stable phases, aims to ensure national energy security and foster sustainable coordinated development in the region.…”
Get full text
Article -
4088
Recognition of Reconstructed Frontal Face Images Using FFT-PCA/SVD Algorithm
Published 2020-01-01“…Modern face recognition modules/algorithms have been successful in many application areas (access control, entertainment/leisure, security system based on biometric data, and user-friendly human-machine interfaces). …”
Get full text
Article -
4089
Blinding HT: Hiding Hardware Trojan signals traced across multiple sequential levels
Published 2022-01-01“…However, there may be Hardware Trojans (HTs) in IP cores, which will cause critical security problem. There are already many HT detection methods which claim to detect all publicly available HT benchmarks. …”
Get full text
Article -
4090
Understanding ChatGPT: Impact Analysis and Path Forward for Teaching Computer Science and Engineering
Published 2025-01-01“…In this paper, common classroom problems and their respective responses from ChatGPT in the domains of Computer Science, Cyber Security, Data Science, and Electrical Engineering are analyzed to determine the categories of queries for which ChatGPT offers reliable responses and those for which it may be factually incorrect. …”
Get full text
Article -
4091
Data on insect biodiversity in a Chinese potato agroecosystem from DNA metabarcoding
Published 2025-01-01“…Abstract Potato (Solanum tuberosum) is a staple crop important in global food security. As a leading potato producer, China faces significant challenges from insect pest infestations that compromise yield and quality. …”
Get full text
Article -
4092
Politics in territory. Gender, migrations and the sustainability of life in Argentina
Published 2021-09-01“…The main result of the research shows that the women´s life-sustainability practices are able not only to secure family and neighborhood reproduction, but also have a tangible and positive impact on the exercise of citizenship. …”
Get full text
Article -
4093
Distributed Generation Integration in the Electric Grid: Energy Storage System for Frequency Control
Published 2014-01-01“…Transmission system operators are greatly concerned about the impact of RESs on the operational security and efficiency of their networks and more in general of the ENTSO-E interconnected system. …”
Get full text
Article -
4094
Surgical Treatment for Occipital Condyle Fracture, C1 Dislocation, and Cerebellar Contusion with Hemorrhage after Blunt Head Trauma
Published 2016-01-01“…The resin-made occipital bone was used to secure a titanium plate and screws enabled us to perform posterior fusion of the craniovertebral junction. …”
Get full text
Article -
4095
Diversity, Physicochemical and Technological Characterization of Elite Cassava (Manihot esculenta Crantz) Cultivars of Bantè, a District of Central Benin
Published 2015-01-01“…Cassava is one of the staple food crops contributing significantly to food and nutrition security in Benin. This study aimed to assess the diversity of the elite cassava cultivars of Bantè district, determine the physicochemical properties of the most preferred ones as well as the sensory attributes of their major derived products (gari and tapioca), and compare them with the farmers’ and processors’ perception on their technological qualities. …”
Get full text
Article -
4096
Intensified monsoonal rainstorm events over westerly-dominated Asian interior during the warm mid-Holocene
Published 2025-01-01“…Abstract Hydroclimatic change in the Asian interior plays a key role in regulating regional environmental sustainability, water security, and human-nature relationships. However, the influence of the summer monsoon and westerly circulation on the evolution of hydroclimate over the arid Asian interior remains controversial. …”
Get full text
Article -
4097
Examination of Temporary Shelter Areas of the Eastern Black Sea Part
Published 2023-07-01“…Within the scope of this study, temporary shelter areas which determined by the Eastern Black Sea Part Provincial Disaster and Emergency (AFAD); were evaluated in terms of basic features, transportation, security and user. In the study, it is aimed to analyze the deficiencies of temporary shelter areas in the provinces of Artvin, Rize, Trabzon, Bayburt, Gümüşhane, Giresun and Ordu, which constitute the Eastern Black Sea Part, and to plan these areas depending on the requirements and standards for providing a contribution for further researches. …”
Get full text
Article -
4098
Production Constraints and Improvement Strategies of Cowpea (Vigna unguiculata L. Walp.) Genotypes for Drought Tolerance
Published 2021-01-01“…L) is an important leguminous crop largely grown by smallholder farmers in sub-Saharan Africa for food security and animal feed. The objective of this study was to review the production constraints and improvement strategies of cowpea genotypes for drought tolerance. …”
Get full text
Article -
4099
Presenting a Geomorphological Conceptual Model of Construction of bridges in urban floodway- river valleys
Published 2024-06-01“…The results indicate the capability and application of geomorphology in modeling and optimal location and construction of bridges, in order to create more security and welfare of citizens, reduce costs and prevent financial and human losses due to the destruction and improper location of such structures in an urban floodway- river valleys and other natural environments. …”
Get full text
Article -
4100
Excessive equatorial light rain causes modeling dry bias of Indian summer monsoon rainfall
Published 2025-01-01“…Abstract Simulating accurately the South Asian summer monsoon is crucial for food security of several South Asian countries yet challenging for global climate models (GCMs). …”
Get full text
Article