Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2281
From threat to response: Cybersecurity evolution in Albania
Published 2025-01-01“…The focus is on how Albania has tailored its strategic responses to enhance digital resilience and national security. In the second part, the paper provides an in-depth review of the threat models prevalent in the Western Balkans and Albania, highlighting key areas where Albania's cyber management requires further development. …”
Get full text
Article -
2282
Recessive transition of rural residential land use from the perspective of value co-creation: A case study of Yiwu City, Zhejiang
Published 2025-01-01“…[Results] (1) Value co-creation of ural residential land follows the process model of “value consensus-value execution-value win-win” and the operational paradigm of “subject interaction - capacity embedding - benefit sharing”, driving the “element integration - structure reorganization - function optimization” of rural residential land use system, resulting in the dynamic evolution of diverse values such as residential security, economic property, production and operation, ecological protection, and cultural inheritance, and achieving the recessive rural residential land use transition. (2) Yiwu’s practice path of guiding multiple stakeholders to interact collaboratively, constructing “value consensus” for rural residential land, driving with multiple forces, and implementing “value execution” for rural residential land through multi-dimensional rule interaction is a successful model for realizing the recessive rural residential land use transformation through value co-creation. (3) Through the practice of value co-creation, Yiwu has achieved a transformation of the functional value of rural residential land from residential security orientation to economic property orientation, and then to a comprehensive and coordinated approach that encompasses residential security, production and operation, economic assets, and ecological protection, etc. …”
Get full text
Article -
2283
Enhancing cybersecurity via attribute reduction with deep learning model for false data injection attack recognition
Published 2025-01-01“…The results indicated the enhanced security performance of the ARDL-FDIAR technique compared to other DL approaches.…”
Get full text
Article -
2284
Averting War in Northeast Asia: A Proposal
Published 2011-01-01“…The most critical need of countries in Northeast Asia is an institution for crisis prevention, crisis management, and other security-promoting purposes-what might be called a Northeast Asia Security Dialogue Mechanism (NEASDM). …”
Get full text
Article -
2285
Cybersecurity in microgrids: A review on advanced techniques and practical implementation of resilient energy systems
Published 2025-03-01“…This study offers an in-depth examination of cyber security within the energy sector, exploring the historical backdrop of cyber-attacks and classifying different forms of MG breaches, encompassing both cyber and physical security strategies. …”
Get full text
Article -
2286
The Small Wars Doctrine of the US Marine Corps and Colonial Experience of the European Powers
Published 2023-12-01“…The findings broaden the understanding of the modern leading powers’ approaches to internal security models transfer, as well as of its limits.…”
Get full text
Article -
2287
Are free school meals failing families? Exploring the relationship between child food insecurity, child mental health and free school meal status during COVID-19: national cross-se...
Published 2022-06-01“…This study examined levels of food security and FSM status to support decision-making regarding increasing the current eligibility criteria.Design Two cross-sectional national surveys administered in August–September 2020 and January–February 2021 were used to examine the impact of COVID-19 on the food experiences of children and young people.Setting UK.Participants 2166 children (aged 7–17 years) and parents/guardians.Main outcome measures Participant characteristics were described by food security and FSM status; estimated marginal means were calculated to obtain the probability of poor mental health, expressed as children reporting feeling stressed or worried in the past month, by food security status and FSM status.Results We observed food insecurity among both children who did and did not receive of FSM: 23% of children not receiving FSM were food insecure. …”
Get full text
Article -
2288
Speeding Violation Type Prediction Based on Decision Tree Method: A Case Study in Wujiang, China
Published 2019-01-01“…This study is approved by the Traffic Police Brigade of Wujiang Public Security Bureau and aims to explore the characteristic of the speeding violation behaviour and attempt to make an effective prediction about it. …”
Get full text
Article -
2289
Artificial Intelligence in Pediatric Epilepsy Detection: Balancing Effectiveness With Ethical Considerations for Welfare
Published 2025-01-01“…However, ethical considerations around privacy, data security, and model bias remain crucial for responsible AI integration. …”
Get full text
Article -
2290
2.5D Inductive Intertwined Frequency Selective Surface for Band-Pass and High Miniaturization Applications
Published 2025-01-01Get full text
Article -
2291
-
2292
Semantic Tokenization-Based Mamba for Hyperspectral Image Classification
Published 2025-01-01Get full text
Article -
2293
-
2294
ASD-YOLO: a lightweight network for coffee fruit ripening detection in complex scenarios
Published 2025-02-01Get full text
Article -
2295
Zero-Trust Access Control Mechanism Based on Blockchain and Inner-Product Encryption in the Internet of Things in a 6G Environment
Published 2025-01-01“…This mechanism ensures data security while maintaining system efficiency in environments with large-scale data interactions.…”
Get full text
Article -
2296
-
2297
Food Insecurity and Not Dietary Diversity Is a Predictor of Nutrition Status in Children within Semiarid Agro-Ecological Zones in Eastern Kenya
Published 2014-01-01“…No significant difference (P>0.05) was observed in food security and dietary diversity score (DDS) between LM4 and LM5. …”
Get full text
Article -
2298
Cloud Platform Selection Model in the Framework of Differential Quality Game With Fuzzy Information
Published 2025-01-01“…Employing a differential quality game with fuzzy information, this study introduces a reliable DSS that incorporates cost, security and QoS to select the most appropriate cloud platform. …”
Get full text
Article -
2299
Tea Growing and Socio-Economic Development of Small Holder Farmers: A Case Study of Rushoroza Kabale District.
Published 2025“…The study findings indicated that there were contributions of tea growing to welfare they included; poverty alleviation, food security, illiteracy level, financial support, capital base, collateral security, and illiteracy level. …”
Get full text
Thesis -
2300