Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2001
A Novel Image Encryption Scheme Based on PWLCM and Standard Map
Published 2020-01-01“…Consequently, a good trade-off efficiency and security can be achieved. Furthermore, the numerical simulations and performance analyses illustrate that the proposed encryption scheme can be used in practical application scenarios requiring lightweight security.…”
Get full text
Article -
2002
Hedging for Balancing: Japan’s Foreign Policy in the 2010s–2020s
Published 2024-12-01“…Nonetheless, the relative decline in the United States’ global strategic influence has compelled Japan to adopt a “security hedging” approach. Japan seeks to strengthen strategic relations with non-US security partners both within and beyond the Indo-Pacific region, diversifying the risks of diplomatic overdependence on the United States while continuing to fortify military cooperation with it.…”
Get full text
Article -
2003
The Herd Health Handbook for Goat Producers: Biosecurity at the Farm Level
Published 2009-12-01“…FAMU006, a 20-page illustrated fact sheet by Ray Mobely and Carmen Lyttle-N'guessan, describes aspects of an effective bio-security program, bio-security measures, food safety concerns, and how HACCP works. …”
Get full text
Article -
2004
The Herd Health Handbook for Goat Producers: Biosecurity at the Farm Level
Published 2009-12-01“…FAMU006, a 20-page illustrated fact sheet by Ray Mobely and Carmen Lyttle-N'guessan, describes aspects of an effective bio-security program, bio-security measures, food safety concerns, and how HACCP works. …”
Get full text
Article -
2005
-
2006
-
2007
PDMS microspheres as rheological additives for PDMS-based DIW inks
Published 2025-01-01Get full text
Article -
2008
Studi Empiris terhadap Kinerja & Keamanan Wifi (Studi Kasus di Kota Depok)
Published 2019-12-01“…In this study, we conducted an audit of the security of wifi networks in Depok City by conducting field studies on the performance and security of wifi networks using wardriving techniques.This study covers about 536 wifi networks on Margonda Street Depok. …”
Get full text
Article -
2009
Pengamanan Citra Berwarna Menggunakan Kriptografi Visual Skema Meaningful Shares dan Steganografi LSB
Published 2022-12-01“…So that it raises the suspicion of an attacker who threatens the security of the information in it. To add security, we need Steganography LSB, we can insert the image shares again into the new cover so that the quality and security will increase. …”
Get full text
Article -
2010
-
2011
Effects of image compression on face image manipulation detection: A case study on facial retouching
Published 2021-05-01Get full text
Article -
2012
Enhancing misogyny detection in bilingual texts using explainable AI and multilingual fine-tuned transformers
Published 2024-11-01“…Abstract Gendered disinformation undermines women’s rights, democratic principles, and national security by worsening societal divisions through authoritarian regimes’ intentional weaponization of social media. …”
Get full text
Article -
2013
Measurement tools and indicators for assessing nurturing care for early childhood development: A scoping review.
Published 2022-01-01“…Nurturing care encompasses five components that are crucial for supporting early childhood development: good health, adequate nutrition, opportunities for early learning, responsive caregiving, and safety and security. While there has been increasing attention in global public health towards designing and delivering programs, services, and policies to promote nurturing care, measurement has focused more on the components of health and nutrition, with less attention to early learning, responsive caregiving, and safety and security. …”
Get full text
Article -
2014
Revealing the differences in bicycle theft and motorcycle theft: spatial patterns and contributing factors
Published 2025-02-01Get full text
Article -
2015
Intrusion detection in metaverse environment internet of things systems by metaheuristics tuned two level framework
Published 2025-01-01“…Nevertheless, because IoT devices are often built with minimal hardware and are connected to the Internet, they are highly susceptible to different types of cyberattacks, presenting a significant security problem for maintaining a secure infrastructure. …”
Get full text
Article -
2016
-
2017
Detection the topics of Facebook posts using text mining with Latent Dirichlet Allocation (LDA) algorithm
Published 2025-01-01“…The significance of the research lies in its ability to discover themes within each post, which is crucial for analyzing user behavior and addressing security concerns. The use of relevant Facebook data enhances the real-world relevance of the results, facilitating targeted analysis based on the language patterns used by users in these posts and thus contributing to the success of security objectives. …”
Get full text
Article -
2018
Capacity Enhancement in 60 GHz Based D2D Networks by Relay Selection and Scheduling
Published 2015-01-01Get full text
Article -
2019
-
2020
The use of agencies by the Ministry of Internal Affairs of the Ukrainian SSR to control academic historical science in Soviet Ukraine (1953)
Published 2022-06-01“…Through the agent, who worked in this structure, state security officials tried to influence the personnel of the Institute and the main areas of its scientific activity. …”
Get full text
Article