Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4321
DESIGN OF A PROPERTY PRODUCT RECOMMENDATION SYSTEM USING ASSOCIATION RULE METHOD BASED ON USER INTERACTION PATTERNS
Published 2024-07-01“…User data and privacy must be secured to optimize the recommendation system. Association rule and user engagement patterns can transform property recommendations. …”
Get full text
Article -
4322
Evaluation of the effect of physical-environmental factors of public spaces on the mental health of citizens (Case study: Ardabil city)
Published 2020-12-01“…The results of this study showed that legibility and visual quality, access to urban green space, security of urban space, quality of urban furniture, mixing and variety of uses have a positive and significant effect on the mental health of citizens. …”
Get full text
Article -
4323
ArtDiff: Integrating IoT and AI to enhance precision in ancient mural restoration
Published 2025-01-01“…Using real-time environmental and structural health surveillance, in conjunction with security mechanisms, this framework markedly improves precision and efficiency in forecasting and identifying potential risks.Furthermore, in the context of mural restoration, this paper introduces the ArtDiff model. …”
Get full text
Article -
4324
Specialized contact sites regulate the fusion of chlamydial inclusion membranes
Published 2024-10-01“…As IncA concentrates within ICSs, its C-terminus likely interacts in trans with IncA on the apposing membrane, securing a high concentration of IncA at fusion sites. …”
Get full text
Article -
4325
The icon of Ukrainian Nazis: on the question of the historical assessment of the «heroes» under the Protection of the Virgin Mary and their modern admirers
Published 2024-05-01“…In addition to the image itself, which became the reason for writing this article, the source for the study is the forensic investigative documentation of the Soviet state security agencies, during and after the end of the Great Patriotic War, interrogating captured employees of the German special services, Ukrainian nationalists and witnesses to their war crimes. …”
Get full text
Article -
4326
Applying Big Data Based Deep Learning System to Intrusion Detection
Published 2020-09-01“…With vast amounts of data being generated daily and the ever increasing interconnectivity of the world’s internet infrastructures, a machine learning based Intrusion Detection Systems (IDS) has become a vital component to protect our economic and national security. Previous shallow learning and deep learning strategies adopt the single learning model approach for intrusion detection. …”
Get full text
Article -
4327
Blockchain technology in healthcare strengthening: The Nigerian case
Published 2024-12-01“…Blockchain technology has many practical applications in the healthcare sector, including precision medicine and interoperability, supply chain management, authorization exchange of health information, security, and authorization, all of which are pivotal for effective health systems and quality health services. …”
Get full text
Article -
4328
Deep learning‐based unmanned aerial vehicle detection in the low altitude clutter background
Published 2022-07-01“…Abstract Unmanned aerial vehicles (UAVs), widely used due to their low cost and versatility, pose security and privacy threats, which calls for their reliable recognition at low altitudes. …”
Get full text
Article -
4329
A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme
Published 2020-01-01“…Our scheme is also a leakage-resilient secret-sharing scheme (LRSS) in the bounded-leakage model, which remain provably secure even if the adversary learns a bounded amount of leakage information about their secret key. …”
Get full text
Article -
4330
Importance Analysis of Causative Nodes for Accident Chains of Railway Locomotive Operation Based on STPA-PageRank Method
Published 2025-02-01“…For those nodes with high value of PageRank, some targeted security measures should be adopted, so as to save risk management investment and improve the overall safety level of the locomotive operation system.…”
Get full text
Article -
4331
Safety-involved co-optimization of speed trajectory and energy management for fuel cell-battery electric vehicle in car-following scenarios
Published 2024-12-01“…Abstract Vehicle connectivity technologies has propelled integrated optimization of vehicle’s motion and power splitting becoming a hotspot in eco-driving control research. However, the security issues and power sources life loss of fuel cell-battery hybrid electric vehicle (FCHEV) are still challenging due to disturbances and power sources degradation. …”
Get full text
Article -
4332
The role of artificial intelligence in aortic valve stenosis: a bibliometric analysis
Published 2025-02-01“…Despite the progress, challenges such as model transparency and data security remain. Future research should focus on overcoming these challenges while enhancing collaboration among international institutions to further advance AI applications in cardiovascular medicine.…”
Get full text
Article -
4333
Radiation Dynamics on Crop Productivity in Different Cropping Systems
Published 2021-01-01“…Intercropping is one of the alternatives of agronomic practices that is widely practiced in ensuring food security and enhancing yield stability. Strip, mixed, and relay intercropping can be practiced to increase crop production. …”
Get full text
Article -
4334
Formal Verification of ERC-Based Smart Contracts: A Systematic Literature Review
Published 2025-01-01“…Despite the trusted implementations that smart contracts offer, including those based on standards, different security problems and vulnerabilities arise during their development and execution. …”
Get full text
Article -
4335
Mapping Groundwater Vulnerability in Arid Regions: A Comparative Risk Assessment Using Modified DRASTIC Models, Land Use, and Climate Change Factors
Published 2024-12-01“…This framework offers actionable strategies for improving groundwater protection and sustainable management in arid and semi-arid regions facing water security challenges.…”
Get full text
Article -
4336
Determining the factors affecting the happiness levels of divorced individuals by ordered logistics regression analysis
Published 2022-12-01“…It has been determined that divorced individuals are registered with the Social Security Institution and their happiness levels are higher than those who are not registered.…”
Get full text
Article -
4337
Cloud-Based Software Development Lifecycle: A Simplified Algorithm for Cloud Service Provider Evaluation with Metric Analysis
Published 2023-06-01“…All cloud vendors are not the same in terms of the number of services, infrastructure availability, security strategies, cost per customer, and reputation in the market. …”
Get full text
Article -
4338
Comparative analysis of achievements of eighth-grade students of civic education and students of religioous education on ICCS 2022 study
Published 2024-01-01“…This study covers areas that are considered to be increasingly important in today's modern society: sustainable development and global citizenship education, migration and diversity, digital citizenship education (the use of ICT to participate in social and political events), young people's views on political systems (trust in institutions, system, media) and individual feeling of freedom and security. Given the similarities covered in ICCS research and the curriculum of Civic Education, the logical question is whether the achievements of students attending Civic Education and those students attending Religious Education are different. …”
Get full text
Article -
4339
Effect of Moisture on the Macro Failure Characteristics of Weakly Consolidated Mudstone: Mesomechanism
Published 2022-01-01“…Mudstone, whose significant characteristic is water-weakening, widely exists in all kinds of geotechnical engineering, which brings great security risks to engineering safety. In this paper, through a series of macro and meso test methods, the macro and meso action mechanism of water on the weakly consolidated plane of mudstone was studied. …”
Get full text
Article -
4340
Exogenous dsRNA-Mediated RNAi: Mechanisms, Applications, Delivery Methods and Challenges in the Induction of Viral Disease Resistance in Plants
Published 2024-12-01“…Practical applications of this technology against various plant viruses and its potential to ensure food security are emphasized. The review also delves into regulatory considerations, risk assessments, and the challenges associated with off-target effects and pathogen resistance. …”
Get full text
Article