Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2381
Blockchain-Based Anonymous Reputation System for Performance Appraisal
Published 2025-01-01“…ARSPA provides a secure and efficient approach to improve the reliability and fairness of performance appraisal.…”
Get full text
Article -
2382
Breeding Maize (Zea mays L.) for Aluminum Tolerance through Heterosis and Combining Ability
Published 2024-01-01“…Soil acidity, a major threat to food security in developing countries, can cause a staggering 71% decline in maize (Zea mays L.) production. …”
Get full text
Article -
2383
FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review
Published 2021-03-01“…The DES and the AES provide information security. DES and AES have the distinction of being introduced in both hardware and applications. …”
Get full text
Article -
2384
Multi-Smart Meter Data Encryption Scheme Basedon Distributed Differential Privacy
Published 2024-03-01“…Even if an attacker has enough background knowledge, the security of the electricity information of one another can be ensured.…”
Get full text
Article -
2385
TBAS: Token-based authorization service architecture in Internet of things scenarios
Published 2017-07-01“…The advantages of this framework are practical and secure which are explained in the experimental chapter.…”
Get full text
Article -
2386
-
2387
Federated Learning-Based Load Forecasting for Energy Aggregation Service Providers
Published 2025-01-01“…However,the required forecasting data are typically scattered among different energy suppliers,and owing to data security and privacy concerns,these suppliers are often unwilling to share their data. …”
Get full text
Article -
2388
Engaged by the Revolution: the Lepsis Chekist family in Vyatka (1919)
Published 2023-05-01“…The purpose of the work is to use the example of a single married couple of security officers to indicate the factors that influenced the life of the family in the era of social cataclysms. …”
Get full text
Article -
2389
Transboundary Water Resources Conflict Analysis Using Graph Model for Conflict Resolution: A Case Study—Harirud River
Published 2021-01-01“…One of the most important environmental issues today is the water crisis and the ensuing security challenges. Of these, transboundary waters pose the most significant security challenges. …”
Get full text
Article -
2390
ECONOMIC CRIME UNDER MARTIAL LAW IN UKRAINE
Published 2024-12-01“…Consequently, the prevailing national security and defence strategy falls short in ensuring the alignment of the Ukrainian security sector with the scientific and practical imperatives. …”
Get full text
Article -
2391
Quantum Computing for Advanced Driver Assistance Systems and Autonomous Vehicles: A Review
Published 2025-01-01“…The perks of quantum computation (QC) over classical systems are apparent with respect to security, privacy, and an exponentially high computation rate. …”
Get full text
Article -
2392
Analyzing Psychological Operations: A Case Study of Indo-Pak Hostility (2010-2024)
Published 2025-01-01“…Overall, this research offers valuable insights into the efficacy of PSYOP in influencing audiences and contributes to the broader understanding of persuasion theory in the context of modern information warfare and national security. …”
Get full text
Article -
2393
The contribution of Electronic Records Management towards Organisational Performance: A case study of Stanbic Bank-Kabale Branch.
Published 2023“…Lastly, the researcher recommended the construction of ERMS facilities, improve ERMS security, encourage corroborations, have government support, and provide maximum training as better solutions for the topic under study.…”
Get full text
Thesis -
2394
Observational research in epidemic settings: a roadmap to reform
Published 2025-02-01Get full text
Article -
2395
ASSESSMENT OF THE REGION'S INVESTMENT ENVIRONMENT AND POLICY INSTRUMENTS FOR THE IMPLEMENTATION OF ITS INVESTMENT POTENTIAL IN WARTIME
Published 2024-12-01“…It is substantiated that effective instruments of regional investment policy in the context of critical instability are: military risk insurance and diversification; use of concession agreements; private and public investments in the defence industry and critical infrastructure industries/sectors (energy, transport and logistics, medicine and pharmaceuticals, natural resources); support for innovative and technological startups in the areas of security, the real economy and infrastructure; stimulation of investments in human resources; support for investments in business projects of demobilised persons, war veterans and other combatants; encouragement of investments in the development of export potential to maintain the country's financial security.…”
Get full text
Article -
2396
Assessing groundwater level variability in response to climate change: A case study of large plain areas
Published 2025-02-01Get full text
Article -
2397
Implementasi Algoritma Mickey 2.0 untuk Mengamankan Komunikasi Data pada Perangkat Bluetooth Low Energy
Published 2022-12-01“…To determine the level of security, a passive sniffing attack and an active Known Plaintext Attack (KPA) were tested. …”
Get full text
Article -
2398
Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption
Published 2024-05-01“…Encrypt has grown into an answer that has become an essential element of information security systems. To ensure the security of shared data, including text, images, or videos, it is essential to employ various methods and strategies. …”
Get full text
Article -
2399
-
2400