Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2241
Ecological problem identification based on spatial and temporal dynamics of ecosystem quality: A case study
Published 2025-01-01“…Bayannur, located in the Hetao Plain and the Urat Grassland, is China’s important ecological security barrier. It plays a significant role in the country’s sustainable socio-economic development, ecological protection, and high-quality growth. …”
Get full text
Article -
2242
Discussion on Artificial Intelligence Safety and Ethical Issues
Published 2025-01-01“…This article explores the development of artificial intelligence technology and its potential safety and ethical challenges in various fields. In terms of security, the risk of adversarial attacks is analyzed in depth, and the robustness of the model is enhanced through adversarial training and data enhancement techniques. …”
Get full text
Article -
2243
Understanding, anticipating and managing health risks linked to climate migration
Published 2025-01-01“…Migration can improve the health and security of refugees, but also more broadly the health and security of people in host and home countries.…”
Get full text
Article -
2244
Aligning policy for success in developing countries: evidence from the poultry sector of Ghana
Published 2025-02-01“…Specifically, our study emphasizes the importance of striking a balance between fostering domestic production and ensuring food security.…”
Get full text
Article -
2245
THE ROLE OF TEENAGEERS’ LIFE EXPERIENCE ACTUALIZATION IN THE FRAMEWORK OF THE SAFE SOCIAL ENVIRONMENT FORMATION
Published 2015-03-01“…The paper looks at the problem of social security and emphasizes the urgent need for developing the general theory of social security, its concepts and models designed to meet the requirements of time and specify different aspects and levels of socialization process – federal, regional and municipal. …”
Get full text
Article -
2246
Hydrothermal Synthesis of Pt-, Fe-, and Zn-doped SnO2 Nanospheres and Carbon Monoxide Sensing Properties
Published 2013-01-01Get full text
Article -
2247
Challenges in providing correctional service education: A case study in a correctional institution in Amhara regional state, Ethiopia
Published 2023-06-01“…It was concluded that the majority of challenges faced in the case correctional institution occurred as a result of inadequate attention and conflicting missions of the correctional institution (security and rehabilitation) and the tendency of prioritizing security over rehabilitation. …”
Get full text
Article -
2248
A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding
Published 2017-01-01“…Chaotic maps have good potential in security applications due to their inherent characteristics relevant to cryptography. …”
Get full text
Article -
2249
Prediction and Analysis of Saltwater Intrusion in Pearl River Estuary Based on Machine Learning
Published 2025-01-01“…To enhance the water supply security of coastal cities, it is necessary to analyze and predict saltwater intrusion. …”
Get full text
Article -
2250
An Event Causality Identification Framework Using Ensemble Learning
Published 2025-01-01Get full text
Article -
2251
Statistical Comparison of piracy and armed robbery with emphasis on the South China Sea - Malacca Strait and the Persian Gulf - Strait of Hormuz
Published 2019-12-01“…This research allowed us: 1) to make a distinction between the security in two aforementioned areas; 2) to represent the source of the information for researchers.…”
Get full text
Article -
2252
Integrating artificial intelligence into healthcare systems: opportunities and challenges
Published 2024-10-01“…To address these concerns, healthcare organizations must promote a culture of accountability, ensuring that healthcare providers remain vigilant about patient data security. Overall, the article underscores the potential of AI to revolutionize healthcare while emphasizing the need to address the ethical, technical, and security challenges it brings.…”
Get full text
Article -
2253
Modeling Peer-to-Peer Botnet on Scale-Free Network
Published 2014-01-01“…Our findings can provide meaningful instruction to network security management.…”
Get full text
Article -
2254
Revolutionizing healthcare delivery with blockchain technology
Published 2024-09-01“…By incorporating blockchain technology into the medical drone system, it is possible to improve the transparency and security of medical supply chains, as well as the tracking and monitoring of medical drones. …”
Get full text
Article -
2255
User Access Control and Authentication System for VoIP Service in Mobile Communication Environments
Published 2014-02-01“…With the increasing demand for VoIP services, problems are also occurring, namely, security vulnerabilities and degraded service quality. …”
Get full text
Article -
2256
WESTERN BALKANS U. S. POLICY IN THE CONTEXT OF THE PRESIDENT TRUMP’S GRAND STRATEGY
Published 2019-11-01“…Many critics of Donald Trump argue that Donald Trump’s Grand Strategy is an absence of Grand Strategy or that his foreign and security policy is driven by impulses and tactical approach. …”
Get full text
Article -
2257
Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks
Published 2017-03-01“…Due to the real-time requirement of message in vehicle ad hoc networks, it is a challenge to design an authentication for vehicle ad hoc networks to achieve security, efficiency, and conditional privacy-preserving. …”
Get full text
Article -
2258
Reconceptualizing Corruption as an International Crime: A Review of International Law
Published 2024-10-01“…The discourse surrounding corruption as an international crime is increasingly urgent, as it transcends national borders and contributes to economic crises, conflicts, and various crimes that threaten global security. Scholars such as Christensen (2017), Peters (2018), Davis (2018), and Rothe (2010) have linked corruption to human rights violations, revealing that states often struggle to address it effectively. …”
Get full text
Article -
2259
Micro-Trivium: A lightweight algorithm designed for radio frequency identification systems
Published 2017-02-01“…Mathematical analysis shows that using Micro-Trivium is as secure as using Trivium.…”
Get full text
Article -
2260
SQLite Encryption Method for Embedded Databases Based on Chaos Algorithm
Published 2023-01-01“…It is an important topic in the field of information security at present, and it is an effective way to apply to embedded systems. …”
Get full text
Article