Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4361
Impacts and challenges of industry 4.0 in manufacturing: a systematic literature review
Published 2022-12-01“…Additionally, six potential challenges faced by manufacturing in adopting digital transformation were found: (i) management, (ii) government, (iii) implementation, (iv) workforce, (v) operation, and (vi) security. The results indicated that accurate understanding of the concepts and scope of Industry 4.0 are under construction and that knowledge sharing will be decisive in shaping the future of the transition from current business models to smart manufacturing. …”
Get full text
Article -
4362
Decision making about increased building automation – barriers, drivers and motivation factors
Published 2025-01-01“…An important knowledge barrier was found as knowledge is needed for decisions about investments, use of BMS and decisions regarding IT security, such as handling of data. A key conclusion is the need for a facilitator, as knowledge is needed for decisions about BMS investments and for its use. …”
Get full text
Article -
4363
Application and Thinking of Deep Learning in Predicting Lateral Cervical Lymph Node Metastasis of Papillary Thyroid Cancer
Published 2025-01-01“…With the establishment and sharing of large datasets, automated annotation, algorithm optimization, and resolution of data security issues, deep learning is expected to accurately predict lateral neck lymph node metastasis in PTC. …”
Get full text
Article -
4364
Position Verification in Connected Vehicles for Cyber Resilience Using Geofencing and Fuzzy Logic
Published 2024-01-01“…Position verification is essential in connected and autonomous vehicle technology to enable secure vehicle-to-everything communication. Previous attempts to verify location information have used specific hardware, traffic parameters, and statistical model-based techniques dependent on neighbouring vehicles and roadside infrastructure and whose judgements can be influenced by untrustworthy entities. …”
Get full text
Article -
4365
Digital Cognitive Behavioral Therapy for the Average Person in Developing Countries
Published 2024-12-01“…The results reveal that only 5% of individuals seek in-person therapy often, with 68% having limited knowledge of online mental health resources. 77% of survey participants have never used online mental health resources and express concerns about privacy and security. Based on the findings and literature review the study guides the development of strategies to enhance access to DCBT resources. …”
Get full text
Article -
4366
Cryo-EM structure of Sudan ebolavirus glycoprotein complexed with its human endosomal receptor NPC1
Published 2025-02-01“…Abstract Sudan ebolavirus (SUDV), like Ebola ebolavirus (EBOV), poses a significant threat to global health and security due to its high lethality. However, unlike EBOV, there are no approved vaccines or treatments for SUDV, and its structural interaction with the endosomal receptor NPC1 remains unclear. …”
Get full text
Article -
4367
A Method for Trust Quantification in Cloud Computing Environments
Published 2016-02-01“…In such environments, ownership and control over the data may lead to potential conflict between the protection of data and the provision of services. Thus, cloud security has received a great deal of attention in recent years. …”
Get full text
Article -
4368
Recent Research Progress on Ground-to-Air Vision-Based Anti-UAV Detection and Tracking Methodologies: A Review
Published 2025-01-01“…Integrating this novel aerial traffic into existing airspace frameworks presents unique challenges, particularly regarding safety and security. Consequently, there is an urgent need for robust contingency management systems, such as Anti-UAV technologies, to ensure safe air traffic. …”
Get full text
Article -
4369
Influence of Cleats-Surface Interaction on the Performance and Risk of Injury in Soccer: A Systematic Review
Published 2017-01-01“…Bladed studs can be considered less secure by increasing plantar pressure on lateral border. …”
Get full text
Article -
4370
Machine Learning-Based Detection of Anomalies, Intrusions, and Threats in Industrial Control Systems
Published 2025-01-01“…Advanced preventive measures are necessary because, despite their significance, many ICS continue to rely on outdated technologies with few security features. This paper proposes a machine learning (ML)-based approach to anomaly detection in ICS communication networks, focusing on techniques such as 1D Convolutional Neural Networks (CNNs), Long Short-Term Memory (LSTM) networks, Support Vector Machines (SVMs), and Isolation Forest (iForest) algorithms. …”
Get full text
Article -
4371
The Centrality of Prosocial Values in Work Motivation among Public and Private Sector Employees
Published 2022-11-01“…Significance: This research also shows that differences between employees adhering to intrinsic, extrinsic, and prosocial motivations are relative, as almost all employees – irrespective of where they work – assess values of job security and having an interesting job to be the most important work motivators. …”
Get full text
Article -
4372
Introducing the Canadian Thoracic Society Framework for Guideline Dissemination and Implementation, with Concurrent Evaluation
Published 2013-01-01“…The framework outlines expert methodological support for KT planning, development and evaluation including a practical guide for implementers and a novel ‘Clinical Assembly – KT Action Team’, and in-kind logistical support and assistance in securing peer-reviewed funding.…”
Get full text
Article -
4373
Leveraging Fog Computing for Scalable IoT Datacenter Using Spine-Leaf Network Topology
Published 2017-01-01“…With the Internet of Everything (IoE) paradigm that gathers almost every object online, huge traffic workload, bandwidth, security, and latency issues remain a concern for IoT users in today’s world. …”
Get full text
Article -
4374
A Finite Element Analysis-Based Modeling and Evaluation Method for Sternum Support Brace
Published 2025-01-01“…Sternum support braces are commonly used in thoracic surgery to secure the chest after open chest procedures. Despite their widespread use in postoperative recovery, current modeling and performance evaluation methods have significant limitations that hinder the optimization and improvement of sternum support braces. …”
Get full text
Article -
4375
Comparative Analysis of Pre-trained based CNN-RNN Deep Learning Models on Anomaly-5 Dataset for Action Recognition
Published 2024-10-01“… Action recognition in videos is one of the essential, challenging and active area of research in the field of computer vision that adopted in various applications including automated surveillance systems, security systems and human computer interaction. In this paper, we present an in-depth comparative analysis of five CNN-RNN models based on pre-trained networks such as InceptionV3, VGG16, MobileNetV2, ResNet152V2 and InceptionResNetV2 with recurrent LSTM units for action recognition on Anomaly-5 dataset. …”
Get full text
Article -
4376
Modeling of winter wheat yield prediction based on solar-induced chlorophyll fluorescence by machine learning methods
Published 2025-12-01“…Timely and accurate prediction of large-scale crop yields is critical for national food security. Solar-induced chlorophyll fluorescence (SIF), an indicator of photosynthesis, has emerged as a promising predictor of crop yields. …”
Get full text
Article -
4377
The impact of terahertz radiation on an extremophilic archaean Halorubrum saccharovorum proteome
Published 2017-02-01“…Terahertz radiation is increasingly used in security and inspection systems, medical and scientific appliances due to its low quant energy, which does not cause severe effects on organisms as other radiation types with higher quant energies do. …”
Get full text
Article -
4378
Assessing the Impacts of Climatic and Water Management Scenarios in a Small Mountainous Greek River
Published 2025-01-01“…Transboundary cooperation, data exchange mechanisms, common policy frameworks, and monitoring, reporting, and evaluation systems, could reduce human and ecosystems’ vulnerabilities and improve the water security of the area.…”
Get full text
Article -
4379
Childhood Injury Prevention: Intervention in the Bedouin City of Rahat
Published 2005-01-01“…The main goal was to identify hazards and dangerous obstacles in public places in Rahat, then remove or repair the obstacles found, in order to secure a safe public environment for children. “Obstacle” was defined as any barrier that could endanger the safety of a child. …”
Get full text
Article -
4380
Trends, contradictions, and patterns of functioning of interregional and inter-municipal cooperation institutions
Published 2025-01-01“…Among the patterns in the institutions development it is necessary to define their focus on functioning in the context of horizontal links globalization, growth of development sustainability and population mobility, digitalization and innovativeness, ensuring security on the basis of risk management, which implies legal integration and standards harmonization, intensive exchange of the best projects, activation of local authorities and population in projects implementation. …”
Get full text
Article