Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2421
Privacy-Preserving Efficient Data Retrieval in IoMT Based on Low-Cost Fog Computing
Published 2021-01-01Get full text
Article -
2422
Quality of public services in the field of population administration in malang public administrative mall
Published 2023-12-01“…Employees in terms of helping people who need services, especially people who are confused about services, have been seen between officers and visitors who communicate with each other. Security at the Malang City Public Administration Mall has shown efforts to improve the quality of its services related to providing a sense of security for the community. …”
Get full text
Article -
2423
An Analysis of Spatial Pathology of the Physical and Social Structure of the City with Non-Relevant Defense Approach Case Study: Tehran Metropolitan Area
Published 2019-06-01“…In addition, it was revealed that education and awareness, resiliency against security-military threats, skill and expertise, respectively, are the effective indicators of the vulnerability of the social structure of the area.…”
Get full text
Article -
2424
Identifying the Dimensions and Components of the Executive Requirements of Islamic Microfinance
Published 2023-12-01“…The findings of the research show that the aspects related to ownership and control, the characteristics of loan contracts and security are considered to be the most important aspects affecting the executive requirements of Islamic microfinance, respectively. …”
Get full text
Article -
2425
Detecting Obfuscated Malware Infections on Windows Using Ensemble Learning Techniques
Published 2025-01-01“…In the internet and smart devices era, malware detection has become crucial for system security. Obfuscated malware poses significant risks to various platforms, including computers, mobile devices, and IoT devices, by evading advanced security solutions. …”
Get full text
Article -
2426
ASEAN Regional Integration: The Philippines' domestic constraints to Physical connectivity
Published 2023-03-01“…Specifically, the Philippines faces severe domestic problems such as reduced spending on infrastructural development, coupled with critical institutional challenges and issues on stability and security. This paper argues the primacy of good governance as the precondition for a well-connected and sustainable infrastructure. …”
Get full text
Article -
2427
ECP-IEM: Enhancing seasonal crop productivity with deep integrated models.
Published 2025-01-01“…Accurate crop yield forecasting is vital for ensuring food security and making informed decisions. With the increasing population and global warming, addressing food security has become a priority, so accurate yield forecasting is very important. …”
Get full text
Article -
2428
Enhancing the Process of AES: A Lightweight Cryptography Algorithm AES for Ad-hoc Environments
Published 2022-12-01“…This algorithm will be modified to improve the security as well as reduce the amount of time and energy consumed in comparison with the original algorithm. …”
Get full text
Article -
2429
A study of Belarusian women’s perceptions of safety and its relationships with victimization and social gender
Published 2024-10-01“…It has been shown that for women security is associated with such concepts as peace in their country, reliability, health, and control of the situation. …”
Get full text
Article -
2430
Optimizing milpa agrosystems with beneficial microbes and their ecological interactions: a review
Published 2025-01-01“…Abstract Ensuring food security through sustainable systems remains a key goal for the agricultural sector. …”
Get full text
Article -
2431
A New Sensors-Based Covert Channel on Android
Published 2014-01-01“…New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze its security model, in particular the two key principles: process-isolation and the permissions system. …”
Get full text
Article -
2432
Secrecy Cognitive Gain of Cognitive Radio Sensor Networks with Primary Outage Constraint
Published 2015-06-01“…Then, the concept of secrecy cognitive gain is produced to highlight the effect of SR systems with secrecy on the whole networks security. Comparing with a single PR system, the SR system is beneficial to enhance the secrecy level for overlaid CRSNs. …”
Get full text
Article -
2433
Prioritizing Signaling Information Transmission in Next Generation Networks
Published 2011-01-01Get full text
Article -
2434
Geomodeling soil quality using remote sensing and land use metrics in Abeokuta, Nigeria
Published 2025-01-01“…The findings suggest valuable ways for SQ improvement and could contribute to efforts on achieving food security, well-being and meet sustainable development goal 2.…”
Get full text
Article -
2435
The Kurdish Movement’s Factor in US Politics at the Peak of Iran and Afghanistan Crises, 1979 – January 1981
Published 2023-11-01“…Faced with the challenges presented by the Iranian and Afghan crises, the United States' analytical, intelligence, and military bodies navigated various resources in search of viable solutions.This study delves into the consideration of the Kurdish factor as a potential instrument in shaping the regional landscape. The National Security Council (NSC), State Department, Central Intelligence Agency (CIA), and the US Department of Defense all scrutinized the Kurdish movement, evaluating its prospects for advancing American interests. …”
Get full text
Article -
2436
Explaining The Territoriality Of Fundamentalist Organizations in Fragile States(Case Study: ISIS in Libya)
Published 2018-03-01“…Fundamentalism is one of the security issues of today's world, and the Territorialize and , Territoriality of fundamentalist terrorist groups has attracted a large part of the world's security literature. …”
Get full text
Article -
2437
-
2438
Catalyzing digital transformation through Smart Cities initiatives in Indonesian local government
Published 2025-01-01“…Addressing leadership awareness and the digital talent gap is essential for successful implementation, alongside improving cyber management and data security. Building on these challenges, the research highlights potential development areas including collaboration enhancement, prioritization of interoperability, robust data center development focusing on cyber management and data security, and targeted digital talent cultivation. …”
Get full text
Article -
2439
Performance Improvement Based Authentication Protocol for Intervessel Traffic Service Data Exchange Format Protocol Based on U-Navigation System in WoT Environment
Published 2014-01-01“…And the vessel traffic information requires high security since it is highly protected by the countries. …”
Get full text
Article -
2440
AccFIT-IDS: accuracy-based feature inclusion technique for intrusion detection system
Published 2025-12-01“…In today’s digital landscape, maintaining security has become increasingly difficult. Many organizations implement security mechanisms to protect their valuable resources from potential threats. …”
Get full text
Article