Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5621
Making the most of existing research: an evidence gap map of the effects of food systems interventions in low-income and middle-income countries
Published 2022-06-01“…Objective Identify and describe the available evidence on the effects food systems interventions on food security and nutrition outcomes in low-income and middle-income countries.Methods An adapted version of the high-level panel of experts food systems framework defined the interventions and outcomes included studies. …”
Get full text
Article -
5622
-
5623
Scientific support of small fruit growing in Russia and prospects for its development
Published 2021-07-01“…It is possible to achieve the target indices of the Russian Doctrine of Food Security (self-sufficiency in fruits and berries should be at least 60 %) by combining the competencies of science and business. …”
Get full text
Article -
5624
Minimally invasive internal splinting technique for acute closed Achilles tendon rupture
Published 2025-01-01“…The intact proximal Achilles tendon and the calcaneus are securely bridged with high-strength sutures and knotless anchors, reducing complications and promoting healing of the Achilles tendon.…”
Get full text
Article -
5625
The role of fMRI in the mind decoding process in adults: a systematic review
Published 2025-01-01Get full text
Article -
5626
Metode Deteksi Intrusi Menggunakan Algoritme Extreme Learning Machine dengan Correlation-based Feature Selection
Published 2021-02-01“…Abstract Intrusion detection of computer networks is a very important activity carried out to maintain data and information security. Intrusion detection is the process of monitoring traffic on a network to detect any data patterns that are considered suspicious, which allows network attacks. …”
Get full text
Article -
5627
The Clinical Pharmacokinetics and Pharmacodynamics of Glimepiride—A Systematic Review and Meta-Analysis
Published 2025-01-01Get full text
Article -
5628
Global demand for rice genetic resources
Published 2022-05-01“…As we address food and nutrition security challenges in a changing context, we are motivated by the need to enhance the conservation, management, and use of rice genetic resources. …”
Get full text
Article -
5629
Validation of Mortality Data Sources Compared to the National Death Index in the Healthcare Integrated Research Database
Published 2025-02-01“…At the same time, positive predictive value (PPV) was 93.4% (95% CI = 93.1%, 93.7%), negative predictive value (NPV) was 82.3% (95% CI = 81.7%, 82.9%), and when comparing each individual source, each had a high PPV but limited sensitivity.Conclusion: The composite algorithm was demonstrated to be a sensitive and precise measure of mortality, while individual database sources were accurate but had limited sensitivity.Plain Language Summary: What is known on this topic:The National Death Index (NDI) is the gold standard for ascertaining death in the US, with several limitations, such as time lag and population restrictions.What this study adds:A composite mortality algorithm of several sources of death was shown to be a sensitive and precise in death ascertainment compared to the NDI.Individual mortality sources, such as the Social Security Death Master File and online obituaries, had limited sensitivity on their own compared to the NDI.Keywords: mortality, validation, National Death Index, real word evidence, obituary, claims…”
Get full text
Article -
5630
Efficient Method for Robust Backdoor Detection and Removal in Feature Space Using Clean Data
Published 2025-01-01“…These attacks pose a significant security threat in critical applications, such as street sign or pedestrian recognition for autonomous vehicles, biometric authentication, image retrieval, semantic labeling, etc. …”
Get full text
Article -
5631
Inovação em segurança pública: um estudo bibliométrico
Published 2022-12-01“…Foram analisadas 261 publicações, sem filtro de tempo, espaço ou linguagem, encontradas na base de dados da Scopus, a partir da sintaxe: (“Public Security” or “Public Safety”) and Innovation. Os resultados evidenciam que há dois fortes movimentos, não dicotômicos, sendo desenvolvidos, em concomitância, na área de segurança pública: o primeiro, mais disciplinar, tem enfoque no desenvolvimento de tecnologias e na gestão da informação; o segundo, com enfoque mais transdisciplinar, trata, sobretudo, de ocupação territorial inteligente. …”
Get full text
Article -
5632
On-farm diversity and production challenges in Ethiopian tef [Eragrostis tef ((Zuccagni) Trotter)] landraces from Arsi zone, Ethiopia: Implications for breeding and conservation
Published 2025-01-01“…Significance: Understanding the extents of on-farm diversity and possible production challenges of the crop could facilitate and enhance its breeding, conservation and utilizations and hence, contribute to the food security of the country.…”
Get full text
Article -
5633
Biopsychosocial evaluation of patients with multiple sclerosis using a short set of categories of the international classification of functioning, disability and health, and its re...
Published 2018-09-01“…The cross-sectional study involved 184 people with MS including 157 people who had applied to the Disability and Working Capacity Assessment Office under the Ministry of Social Security and Labour of the Republic of Lithuania (DWCAO) to determine their working capacity level and 27 people with MS who hadn’t yet applied to DWCAO. …”
Get full text
Article -
5634
-
5635
‘That’s Enough’ - Workplace Violence Against Physicians, Pharmacists, and Nurses in Saudi Arabia: A Systematic Review of Prevalence, Causes, and Consequences
Published 2025-02-01“…Causes included staff shortages, overcrowding, long waiting times, miscommunication, unmet patient demands, insufficient penalties, and inadequate security measures. Responses to WPV varied, with some HCPs reporting incidents and others taking no action. …”
Get full text
Article -
5636
LDWLE: self-supervised driven low-light object detection framework
Published 2024-12-01“…It plays a significant role in surveillance and security, night pedestrian recognition, and autonomous driving, showcasing broad application prospects. …”
Get full text
Article -
5637
Organisational, legal and financial bases for scientific activity in higher education institutions of the Ministry of Internal Affairs of Ukraine: problems and solutions based on m...
Published 2023-09-01“…The ideas and proposals for the introduction of new organisational and legal frameworks for scientific research in the system of the Ministry of Internal Affairs of Ukraine are an attempt to introduce a practical mechanism for the rational and most productive use of the scientific potential of departmental institutions and establishments to ensure the security of the State, protection of human rights and freedoms, combating crime, maintaining public safety and order, applying positive foreign experience in these areas, as well as the creation of innovative methods and technologies that can compete with similar achievements in the international scientific space.…”
Get full text
Article -
5638
-
5639
-
5640
Protein quality of four indigenous edible insect species in Nigeria
Published 2018-06-01“…Food security is a serious concern particularly for developing countries. …”
Get full text
Article