Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2081
Pediatric Emergency Department-based Food Insecurity Screening During the COVID-19 Pandemic
Published 2024-11-01“…Six validated US Department of Agriculture household food security questions and sociodemographic questions were included. …”
Get full text
Article -
2082
Temperature seasonality regulates organic carbon burial in lake
Published 2025-01-01Get full text
Article -
2083
Implementasi Algoritme Spongent sebagai Algoritme Hashing untuk Integritas pada Modul Komunikasi Lora
Published 2023-12-01“…Data security can be done with hashing algorithms such as SPONGENT algorithm. …”
Get full text
Article -
2084
-
2085
Strategic Planning of Public Spaces in Order to Promote and Benefit from Social Interactions, Case Study: District 10 of Tehran Municipality
Published 2025-03-01“…Furthermore, issues such as physical deterioration, disrupted urban landscapes, a high tenant rate, low social security, and a transient population have further diminished the quality of existing public spaces and the level of social interaction in this particular district. …”
Get full text
Article -
2086
Implementasi Teknik Enkripsi dan Dekripsi dI File Video Menggunakan Algoritma Blowfish
Published 2019-12-01“…To perform the function of the video file data security system, the legality of access to data is very important to secure so that it does not result in misuse of data access rights. …”
Get full text
Article -
2087
LEA Gene Expression Assessment in Advanced Mutant Rice Genotypes under Drought Stress
Published 2019-01-01Get full text
Article -
2088
Using Blockchain in the Registration and Authentication of a Carpooling Application: From Review to Proposal
Published 2025-01-01“…This proposed research explores the benefits of improving the authentication processes for passengers and drivers within a shared transportation system to minimize information security risks. A thorough literature review was conducted on shared transportation, user registration, authentication processes within these systems, and technologies that could enhance security, such as blockchain. …”
Get full text
Article -
2089
On the Front Lines: Helping Military Spouses Thrive in Your Community
Published 2024-01-01“…This publication discusses military spouse demographics, military spouse employment, military spouse well-being including food security, financial security, and civilian community belonging, and employment resources and strategies to support military spouses. …”
Get full text
Article -
2090
Spousal Individual Retirement Accounts
Published 2014-11-01“… A spouse who stays at home to take care of children or other dependents is likely to have reduced Social Security benefits and will not have access to a workplace retirement plan. …”
Get full text
Article -
2091
Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations
Published 2014-01-01“…Then a new certificateless aggregate signature scheme with constant pairing computations based on the new certificateless signature scheme is presented. Security analysis shows that the proposed certificateless aggregate signature scheme is provably secured in the random oracle.…”
Get full text
Article -
2092
BANDITRY AND GENDER-BASED VOLIENCE IN NORTH-WEST NIGERIA
Published 2023-08-01“… The menace of banditry over the years had had a devastating effects on both developed and developing countries of the world alike. This emerging security challenge has threatened the very fabric of the fragile peace the Nigerian State was enjoying; especially, in the Northwest states of Zamfara, Kaduna, Katsina, etc. …”
Get full text
Article -
2093
Reputation detection based on incomplete distribution for mobile agent in wireless sensor networks
Published 2017-06-01“…In addition, the introduction of the malicious behavior feedback mechanism ensures the security of sensors in the mobile agent system. The experimental results show that the reputation model of incomplete β distribution can simulate the actual situation well, resist the attacks of malicious agents, and ensure the security of sensors in the system.…”
Get full text
Article -
2094
Determinants of intention to use FinTechs services by accounting students: a mixed methods approach
Published 2023-01-01“…The study also included the variable “security” as an antecedent. Age and gender were controlled for this study. …”
Get full text
Article -
2095
Robust watermarking algorithm for medical images based on accelerated‐KAZE discrete cosine transform
Published 2022-11-01“…Specially, digital watermarking technology plays an essential role in the field of medical image processing and greatly improves the security of medical image information. A medical image watermarking algorithm based on an accelerated‐KAZE discrete cosine transform (AKAZE‐DCT) is proposed to address the poor robustness of medical image watermarking algorithms to geometric attacks, which leads to low security of the information contained in medical images. …”
Get full text
Article -
2096
-
2097
Early Cracking Risk Prediction Model of Concrete under the Action of Multifield Coupling
Published 2021-01-01Get full text
Article -
2098
Toward Intelligent Intrusion Prediction for Wireless Sensor Networks Using Three-Layer Brain-Like Learning
Published 2012-10-01“…Hence, the current intrusion detection schemes cannot provide enough security for WSNs, which poses a number of security challenges in WSNs. …”
Get full text
Article -
2099
A Blockchain-Based Edge Computing Group Signature Authentication Model for Underwater Clustered Networks
Published 2024-12-01“…Blockchain technology, recognized for its security, confidentiality, and traceability, is particularly suitable for scenarios requiring secure data exchange. …”
Get full text
Article -
2100
Design and application of system with dual-control of water and electricity based on wireless sensor network and video recognition technology
Published 2018-09-01“…In order to solve the security problem of the user in wireless sensor network, this article proposes a radio frequency identification mutual security authentication protocol based on shared secret hash function. …”
Get full text
Article