Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4561
Life-history adaptation under climate warming magnifies the agricultural footprint of a cosmopolitan insect pest
Published 2025-01-01“…Abstract Climate change is affecting population growth rates of ectothermic pests with potentially dire consequences for agriculture and global food security. However, current projection models of pest impact typically overlook the potential for rapid genetic adaptation, making current forecasts uncertain. …”
Get full text
Article -
4562
Molecular investigation of how drought stress affects chlorophyll metabolism and photosynthesis in leaves of C3 and C4 plant species: A transcriptome meta-analysis
Published 2025-02-01“…Understanding the effects of drought stress on photosynthetic pathways, particularly in C3 and C4 plants, is crucial for maximizing agricultural productivity and maintaining food security. In this study, we analyzed RNA-seq data from leaves of common wheat (Triticum aestivum) and sorghum (Sorghum bicolor), as representatives of C3 and C4, using a meta-analysis approach to investigate the photosynthesis-related genes involved in the response to drought stress. …”
Get full text
Article -
4563
A Four-Year Monocentric Study of the Complications of Third Molars Extractions under General Anesthesia: About 2112 Patients
Published 2013-01-01“…One-day hospitalization offers a good balance between comfort, security, and cost. The incidence of complications is in agreement with the literature data, especially regarding pain, edema, and infectious and nervous complications. …”
Get full text
Article -
4564
Government crisis communication tools in the light of the extreme drought of 2022
Published 2024-11-01“…According to satellite gravimetric measurements, the water security of the Carpathian Basin is changing in a negative direction. …”
Get full text
Article -
4565
A Collaborative Privacy Preserved Federated Learning Framework for Pneumonia Detection using Diverse Chest X-ray Data Silos
Published 2025-04-01“…Pneumonia detection from chest X-rays remains one of the most challenging tasks in the traditional centralized framework due to the requirement of data consolidation at the central location raising data privacy and security concerns. The amalgamation of healthcare data at the centralized storage leads to regulatory concerns passed by the governments of various countries. …”
Get full text
Article -
4566
Torsional Behavior of High-Strength Concrete Beams with Minimum Reinforcement Ratio
Published 2019-01-01“…But with regard to the compatibility torsion of statically indeterminate structure, the adoption of the minimum torsional reinforcement ratio recommended by Eurocode 2 might secure enough deformability under displacement-controlled mode to allow the redistribution of the torsional moment.…”
Get full text
Article -
4567
Consumer Protection of Girls from Cybercrime in a Gender Perspective
Published 2024-12-01“…Collaboration between various institutions and communities is essential to creating a secure and supportive digital environment for girls.…”
Get full text
Article -
4568
Improved insulator location and defect detection method based on GhostNet and YOLOv5s networks
Published 2024-09-01“…Outdoor, real-time, and accurate detection of insulator defect locations can effectively avoid the occurrence of power grid security accidents. This paper proposes an improved GhostNet-YOLOv5s algorithm based on GhostNet and YOLOv5 models. …”
Get full text
Article -
4569
A voltage weak node identification method considering fault reconstruction in distribution networks
Published 2025-01-01“…Finally, the weak node evaluation index system and identification method are proposed according to the relative position relationship between the voltage visible security region of distribution network and the node voltage index trajectory by considering the normal state and N-1+1 fault state operation conditions of the distribution network. …”
Get full text
Article -
4570
Sustainable employability in Supported Employment and IPS interventions in the context of the characteristics of work and perspectives of the employers: a scoping review protocol
Published 2022-06-01“…Research has also focused on various target groups, compliance with the quality criteria for the implementation of the SE/IPS method in diverse work life and social security contexts. However, the impact of employers’ interests and the quality and opportunities of jobs or the work itself for sustainable working careers have not been studied extensively. …”
Get full text
Article -
4571
A Survey on True Random Number Generators Based on Chaos
Published 2019-01-01“…With the rapid development of communication technology and the popularization of network, information security has been highly valued by all walks of life. …”
Get full text
Article -
4572
MLAS: Machine Learning-Based Approach for Predicting Abiotic Stress-Responsive Genes in Chinese Cabbage
Published 2025-01-01“…The challenges posed by climate change have had a crucial impact on global food security, with crop yields negatively affected by abiotic and biotic stresses. …”
Get full text
Article -
4573
Cicer arietinum abscisic acid receptor PYL1 and glycine-rich RNA-binding, abscisic acid-inducible protein-like differential expression under induced draught conditions
Published 2025-01-01“…The development of drought-tolerant varieties is crucial for maintaining food security amidst the challenges posed by climate change. …”
Get full text
Article -
4574
Modeling and Simulation of Departure Passenger’s Behavior Based on an Improved Social Force Approach: A Case Study on an Airport Terminal in China
Published 2021-01-01“…In the node choice model, the walking distance, the quantity of people waiting, and luggage were considered in choosing a check-in counter or security check channel. The main parameters of the proposed model were confirmed according to video data. …”
Get full text
Article -
4575
Lactic Acid Bacteria from African Fermented Cereal-Based Products: Potential Biological Control Agents for Mycotoxins in Kenya
Published 2022-01-01“…Cereals play an important role in global food security. Data from the UN Food and Agriculture Organization projects increased consumption of cereals from 2.6 billion tonnes in 2017 to approximately 2.9 billion tonnes by 2027. …”
Get full text
Article -
4576
Enhanced energy management in smart microgrids using hybrid optimization and demand response strategies
Published 2025-03-01“…In addition, a two-stage adjustable robust optimization model is introduced, supporting day-ahead planning that ensures secure and cost-effective energy management even under significant uncertainties in renewable energy production. …”
Get full text
Article -
4577
Authenticity" About Ferdowsi Neighborhoods Of Tehran with Historical Textures with the Phenomenological Approach
Published 2021-09-01“…Urban neighborhoods are one of the vital elements of each city and the culture of urban residents is concealed in the texture and sinew of that .The advent of new technologies in urban life and percipitance of designers for construction of buildings led to reduce of fixation sense about their living environment and decrease social interaction. once the historical districts are regarded as symbols of security, comfort and authenticity of the residents, due to inefficiency and interruption of their structures, suffer instability and displacement of their residents.According to this, instability and displacement of inhabitants to districts of historical value are known as the main problem in these neighborhoods. …”
Get full text
Article -
4578
Traffic Anomaly Detection Algorithm for Wireless Sensor Networks Based on Improved Exploitation of the GM(1,1) Model
Published 2016-07-01“…Because worms, attacks, intrusions, and other kinds of malicious behaviors can be recognized by traffic analysis and anomaly detection, WSN traffic anomaly detection provides useful tools for timely reaction and appropriate prevention in network security. In the paper, we improve exploitation of GM(1,1) model to make traffic prediction and judge the traffic anomaly in WSNs. …”
Get full text
Article -
4579
Sharp needle reconstructs peripheral outflow for patients with malfunctional arteriovenous fistula
Published 2024-12-01“…The immediate patency rate for the internal fistulas was 100%, with 3-month, 6-month, and 12-month patency rates at 91.3%, 78.3%, and 43.5%, respectively.Conclusion Sharp needle technology merged with PTA presents an effective and secure minimally invasive method for reconstructing the outflow tract, offering a new solution for recanalizing high-pressure or occluded fistulas.…”
Get full text
Article -
4580
A Miniature and Low-Power-Consumption Stress Measurement System for Embedded Explosive in Multilayer Target Penetration
Published 2020-01-01“…When a penetrator penetrates a target, security issues such as detonation and deflagration sometimes occur in the embedded explosive under an extreme environment with high overload and severe mechanical shock. …”
Get full text
Article