Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4121
Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model
Published 2021-01-01“…Despite the growing popularity of machine learning models in the cyber-security applications (e.g., an intrusion detection system (IDS)), most of these models are perceived as a black-box. …”
Get full text
Article -
4122
Real-Time Optimization of RISC-V Processors Based on Branch Prediction and Division Data Dependency
Published 2025-01-01“…Whether a processor can meet the real-time requirements of a system is a crucial factor affecting the security of real-time systems. Currently, the methods for evaluating hardware real-time performance and the quality of real-time performance are not comprehensive. …”
Get full text
Article -
4123
Oath-Taking, Peacebuilding and Conflict Resolution in Traditional African Society: The Izzi Example
Published 2024-12-01“…Over the ages, African men have continued to search for peace and security in their immediate environment. Hence, to ensure that man lives safely and peacefully, the forefathers of different African societies invented the culture of oath-taking as a means of survival. …”
Get full text
Article -
4124
The Exploitation of Nanotechnology in Herbicides and Bioherbicides: A Novel Approach for Sustainable Weed Management
Published 2025-01-01“…The growing global demand for food security requires a paradigm shift towards sustainable agricultural practices, particularly in weed management. …”
Get full text
Article -
4125
Legal Protection of Innovations in the Regime of Commercial Secrets, Industrial Property: Comparative Analysis
Published 2020-06-01“…The legal regime of industrial property is a legal monopoly, as it provides the receipt of a security document (patent, declaratory patent). The trade secret regime is provided by a de facto monopoly, as it is ensured by the application of certain protective measures. …”
Get full text
Article -
4126
Research and Software Design of an Φ-OTDR-Based Optical Fiber Vibration Recognition Algorithm
Published 2020-01-01“…Distributed optical fiber vibration signal plays a significant role in the communication and safety of any perimeter security monitoring system. It uses light as an information carrier and optical fiber as a means of signal transmission and communication. …”
Get full text
Article -
4127
Perspectives on Soft Actor–Critic (SAC)-Aided Operational Control Strategies for Modern Power Systems with Growing Stochastics and Dynamics
Published 2025-01-01“…The ever-growing penetration of renewable energy with substantial uncertainties and stochastic characteristics significantly affects the modern power grid’s secure and economical operation. Nevertheless, coordinating various types of resources to derive effective online control decisions for a large-scale power network remains a big challenge. …”
Get full text
Article -
4128
Identification of Ecological Priority Areas Based on Nested-Scale Analysis: A Case Study of Metropolitan Nanjing, China
Published 2024-12-01“…Rapid urbanization has led to severe fragmentation of ecological spaces in high-density metropolitan regions, threatening urban ecological security and environmental well-being. While cities explore various restoration strategies, the systematic identification of ecological priority areas remains an urgent challenge, particularly due to the limitations of multi-scale evaluation methods. …”
Get full text
Article -
4129
A Multistory Building Evacuation Model Based on Multiple-Factor Analysis
Published 2019-01-01“…Emergency evacuation is an important issue in public security. To make a considerate plan, various situations are presented including blocking the accident area and letting the emergency access path available. …”
Get full text
Article -
4130
Comprehensive dataset from high resolution UAV land cover mapping of diverse natural environments in Serbia
Published 2025-01-01“…Abstract This study highlights the vital role of high-resolution (HR), open-source land cover maps for food security, land use planning, and environmental protection. …”
Get full text
Article -
4131
Niqivut (our food)—dimensions of Inuit country food harvesting and significance in Arctic Canada: bountiful, seasonal, “soul food”
Published 2025-01-01“…A holistic understanding of the diversity and seasonality of harvesting is needed to support Inuit food sovereignty and security. Our goals were (a) to develop a broader understanding of the diversity and seasonality of harvesting country food across varied geographic contexts in Arctic Canada, and (b) further document the significance and benefits of country food as part of Inuit food sovereignty and systems across a range of communities. …”
Get full text
Article -
4132
Employer Branding and Brand Building in the Aviation Industry
Published 2025-01-01“…To build customer loyalty, airlines should focus on meeting diverse needs based on travel types, offering memorable experiences, and ensuring website security. By strengthening their brand, companies can enhance their attractiveness to job seekers, boost employee and customer satisfaction and loyalty, and improve overall business performance.…”
Get full text
Article -
4133
A hybrid machine learning model for intrusion detection in wireless sensor networks leveraging data balancing and dimensionality reduction
Published 2025-02-01“…Abstract Intrusion detection systems are essential for securing wireless sensor networks (WSNs) and Internet of Things (IoT) environments against various threats. …”
Get full text
Article -
4134
Intervention Protocol to Address the Difficult Airway. An Alternative for the Anesthesiologist’s Performance
Published 2012-02-01“…<p><strong>Background</strong>: The ability to secure the airway in a variety of patients and clinical circumstances constitutes an essential domain for the health team. …”
Get full text
Article -
4135
Regulating Working Hours in the Transition to Flexible Work
Published 2024-12-01“…The findings offer recommendations for reforming Ukraine’s labor laws, aligning them with global trends, and advancing education in labor law and social security disciplines.…”
Get full text
Article -
4136
A learning‐based approach to regression analysis for climate data–A case of Northeast China
Published 2025-01-01“…Precipitation is an important climatic feature for agricultural development and food security, and the study of precipitation and its associated climatic factors is important for the analysis of global change. …”
Get full text
Article -
4137
Towards understanding the character of quality sampling in deep learning face recognition
Published 2022-09-01“…Such choice of the data is related to its public availability when existing document compliant face image collections are hardly accessible due to security and privacy issues. Such inconsistency between the training data and deploy scenario may lead to a leak in performance in biometric systems, which are developed specifically for dealing with ID document compliant images. …”
Get full text
Article -
4138
How to Develop Renewable Power in China? A Cost-Effective Perspective
Published 2014-01-01“…To address the problems of climate change and energy security, Chinese government strived to develop renewable power as an important alternative of conventional electricity. …”
Get full text
Article -
4139
Guest editorial: Advanced signal processing for integration of radar and communication (IRC)
Published 2022-09-01“…Besides the military field, radar has been widely employed in daily life including weather service, air traffic control, autonomous driving and security monitoring. Meanwhile, these applications rely Largely on information transmission through wireless communications. …”
Get full text
Article -
4140
Agent Based Simulation of Group Emotions Evolution and Strategy Intervention in Extreme Events
Published 2014-01-01“…This paper also provides an effective method of how to use agent-based simulation for the study of complex collective behavior evolution problem in extreme incidents, emergency, and security study domains.…”
Get full text
Article