Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2221
Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism
Published 2015-01-01“…In this scheme, based on the opportunistic covering rules, the network coverage algorithm of high reliability and real-time security was achieved by using the opportunity of sensor nodes and the Internet mobile node. …”
Get full text
Article -
2222
GENETİK OLARAK DEĞİŞTİRİLMİŞ ORGANİZMALARIN TARIMSAL ÜRETİMDE KULLANIMI, YÖNETİMİ VE AVRUPA BİRLİĞİNE UYUMLAŞTIRILMASI* **
Published 2004-01-01“…ABSTRACTDevelopments ar isen in the period that has passed since the usage of GMO’s in agricultural production make it compulsory, the effective management o f these products in bio-security system.We deal in this article first, with ecological and socio-economical effects of GMO’s in the light ofresults from experimental works and predictions, second with the harmonisation of turkish regulations airmed to manage the merotioned risks within bio- security management to EU.GİRİŞSon yıllarda genetik ve moleküler biyolojide meydana gelen gelişmeler, organizmaların genetik yapılarının mühendislik uygulamalarıyla işlenebilmesi ve biçimlenebilmesini olanaklı hale getirmektedir. …”
Get full text
Article -
2223
Attacks on One Designated Verifier Proxy Signature Scheme
Published 2012-01-01“…So, their scheme is not secure.…”
Get full text
Article -
2224
Nonlinear programming-based ranging optimization for three-dimensional indoor time of arrival localization
Published 2017-10-01Get full text
Article -
2225
Image Blocking Encryption Algorithm Based on Laser Chaos Synchronization
Published 2016-01-01“…In view of the digital image transmission security, based on laser chaos synchronization and Arnold cat map, a novel image encryption scheme is proposed. …”
Get full text
Article -
2226
Regulation and Compliance in Telemedicine: Viewpoint
Published 2025-01-01“…We conclude that simplified policies are needed to keep telemedicine accessible to providers and patients and that current privacy and security measures need refinement to protect patients appropriately.…”
Get full text
Article -
2227
A SURVEY OF NETWORK SERVICE LOG PROCESSING PLATFORMS AND TECHNIQUES FOR THE DETECTION OF INFORMATION INSECURITY RISKS
Published 2018-07-01“…In the layers of information security measures, the monitoring and detection measures of anomalous activities and information insecurity risks are considered the second defense layer behind firewalls and access controls. …”
Get full text
Article -
2228
GLOBAL DILEMMA OF NUCLEAR PROLIFERATION: THE CASE OF IRAN
Published 2023-12-01“… The need for the international community to get her engagement right is crucial for the sustenance of Peace and security. The quest for self-preservation through the acquisition of nuclear weapons is often seen by other states as threat to their own existence. …”
Get full text
Article -
2229
CFA-Based Splicing Forgery Localization Method via Statistical Analysis
Published 2024-01-01Get full text
Article -
2230
Analysis and Design of Identity Authentication for IoT Devices in the Blockchain Using Hashing and Digital Signature Algorithms
Published 2023-01-01“…This paper proposes a blockchain-based identity authentication (BA) scheme for IoT devices to solve the authentication security problem of IoT devices. The BA scheme uses hashing and digital signature algorithms to achieve integrity and nonrepudiation of authentication messages. …”
Get full text
Article -
2231
Developments in welfare of parent stock and commercial broilers
Published 2025-02-01“…Poultry meat is an important animal source food, and instrumental for global food security. The contribution that poultry breeding makes to meet current and future needs can be described in terms of a Code of Good Practice for Sustainable Breeding (Code-EFABAR®), and as Five Commitments to 1) Health, Food Safety and Food Security; 2) Diversity; 3) Balanced Breeding; 4) Management and Stockmanship; and 5) Transparency, Communication and Engagement. …”
Get full text
Article -
2232
Questão fundiária: posse tradicional versus propriedade da terra entre Brasil e Cabo Verde
Published 2013-01-01“…Additionally, the two localities offer dense ethnographic materials to work the theoretical issue of "land-security".…”
Get full text
Article -
2233
Forecast and Simulation of the Public Opinion on the Public Policy Based on the Markov Model
Published 2021-01-01Get full text
Article -
2234
African Orphan Crops under Abiotic Stresses: Challenges and Opportunities
Published 2018-01-01“…A changing climate, a growing world population, and a reduction in arable land devoted to food production are all problems facing the world food security. The development of crops that can yield under uncertain and extreme climatic and soil growing conditions can play a key role in mitigating these problems. …”
Get full text
Article -
2235
Aid Effectiveness: From Project Appraisal to Strategic Impact Evaluation
Published 2020-11-01“…The US case shows key principles of ensuring policy coherence at different levels of goal-setting — from the National Security Strategy to planning individual projects and programs. …”
Get full text
Article -
2236
Multi-sensor image fusion based on contrast and directional features optimization
Published 2018-12-01“…Multi-sensor image fusion is always an important and opening problem, which can enhance visual quality and benefit some social security applications. In this article, we use contrast pyramid to decompose visible and infrared images, respectively, and the directional filter banks are applied to obtain multiple directional sub-band image features. …”
Get full text
Article -
2237
Patients’ Health Records Management in Ugandan Hospitals: A Case of Kabale Regional Referral Hospital
Published 2021“…The study concluded that privacy of patients’ records was vital to the patients and recommended that security measures be implemented.…”
Get full text
Article -
2238
Dynamic monitoring and drivers of ecological environmental quality in the Three-North region, China: Insights based on remote sensing ecological index
Published 2025-03-01“…Additionally, these have provided scientific references for determining whether to expand the implementation of ecological restoration measures in arid regions to enhance the ecological environment and establish a robust ecological security barrier.…”
Get full text
Article -
2239
Mathematical modelling-based blockchain with attention deep learning model for cybersecurity in IoT-consumer electronics
Published 2025-02-01“…Security in the Internet of Things (IoT)-consumer electronics is decisive in safeguarding connected devices from possible vulnerabilities and threats. …”
Get full text
Article -
2240
« Paroles de flics ». Communications policières et actualité politique au Maroc (2005-2023)
Published 2023-12-01“…In line with the political readjustment period, communication will become less and less aimed at the general public and more and more focused on members of the security forces.…”
Get full text
Article