Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2161
A chaotic digital signature algorithm based on a dynamic substitution box
Published 2025-01-01“…In addition, to enhance security, this work uses a 2048-bit prime, double the length frequently used. …”
Get full text
Article -
2162
An Integrated Image Encryption Scheme Based on Elliptic Curve
Published 2023-01-01“…Due to the extensive demand for digital images across all fields, the security of multimedia data over insecure networks is a challenging task. …”
Get full text
Article -
2163
Aspect category sentiment analysis based on pre-trained BiLSTM and syntax-aware graph attention network
Published 2025-01-01Get full text
Article -
2164
Refugee securitization and the challenges of formal integration: case of Somali refugees in Kenya and Ethiopia
Published 2025-01-01“…Policymakers and the media prominently feature the migration-security connection and depict refugees as threats to internal security, linking their presence to acts of terrorism and crime. …”
Get full text
Article -
2165
A Novel Bond Anchor for Unidirectional FRP Member: Conceptual Design and Experimental Investigation
Published 2021-01-01Get full text
Article -
2166
Economic impact of fetal wastage and common diseases, along with their incidence rates and seasonal variations, at an abattoir in FCT, Nigeria.
Published 2025-01-01“…The notable economic losses from condemned organs also underscore the necessity of implementing pregnancy tests for female animals before slaughter to protect food security and support the nation's economy. These findings highlight the essential role of abattoirs in improving food security, detecting zoonotic diseases, and bolstering public health and economic stability in low-income countries.…”
Get full text
Article -
2167
IRMAOC: an interpretable role mining algorithm based on overlapping clustering
Published 2025-01-01Get full text
Article -
2168
Law enforcement activities of the National Guard under martial law
Published 2024-12-01“…Its functioning is due to the threat to public security and order of the state, in particular from the Russian Federation. …”
Get full text
Article -
2169
User Needs of Online Tutoring Applications Using House of Quality
Published 2025-01-01“…Conclusion: The top user priorities for online tutoring applications are security and privacy, performance, and information. …”
Get full text
Article -
2170
Web-Based File Sharing System: A Case Study of Kabale University.
Published 2023“…Security, user - friendly and cross platform capability are the main purposes of the new Web-based File Sharing System. …”
Get full text
Thesis -
2171
Stock price prediction with attentive temporal convolution-based generative adversarial network
Published 2025-03-01Get full text
Article -
2172
The financial character of policing in Tunisia: collusions, extraversion and the criminalization of informality
Published 2024-07-01“…This article attempts to shed light on the development of a financial/security assemblages in Tunisia, from an international political sociology perspective that looks at the development of practices of security and policing from a transnational and postcolonial vantage point. …”
Get full text
Article -
2173
-
2174
Lightweight AES Design for IoT Applications: Optimizations in FPGA and ASIC With DFA Countermeasure Strategies
Published 2025-01-01“…The Advanced Encryption Standard (AES) remains the benchmark for securing IoT systems while balancing low power consumption, minimal area usage, and moderate throughput with high security. …”
Get full text
Article -
2175
Understanding the Behavioral Differences Between American and German Users: A Data-Driven Study
Published 2018-12-01Get full text
Article -
2176
-
2177
-
2178
-
2179
-
2180
Image Encryption Algorithm Based on a Novel Improper Fractional-Order Attractor and a Wavelet Function Map
Published 2017-01-01“…The obtained simulation results and extensive security analyses demonstrate the high level of security of the algorithm and show its robustness against various types of attacks.…”
Get full text
Article