Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2541
Analysis and prediction of urban agglomeration ecological footprint based on improved three-dimensional ecological footprint and shared socioeconomic pathways
Published 2025-01-01“…This study analyzes the spatial–temporal dynamics of ecological security, sustainability, and driving factors in Shaanxi’s Guanzhong urban agglomeration. …”
Get full text
Article -
2542
Food insecurity among African Americans in the United States: A scoping review.
Published 2022-01-01“…The primary objectives of this review were to identify which risk factors have been investigated for an association with food insecurity, describe how food insecurity is measured across studies that have evaluated this outcome among African Americans, and determine which dimensions of food security (food accessibility, availability, and utilization) are captured by risk factors studied by authors. …”
Get full text
Article -
2543
Transformation of Turkey's Anti-Terrorism Policy under the AKP
Published 2022-07-01“…In the era of new challenges and threats, the most dangerous of which has occurred terrorism, the Republic of Turkey becomes one of the key centers of power in the Middle East and pursues the goal to create a regional security architecture around itself as well as to counter various terrorist organizations. …”
Get full text
Article -
2544
The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database
Published 2016-03-01“…The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.…”
Get full text
Article -
2545
Optimal Topology Management for Software-Defined Networks Minimizing Latency and Using Network Slicing
Published 2024-01-01“…To the best of our knowledge, this journal paper constitutes a first attempt to incorporate network slicing in SDN allowing flexibility, resource efficiency, security, and effective management of the network facilitating the deployment of customized and adaptive services. …”
Get full text
Article -
2546
A Modified WASPAS Method for the Evaluation of E-Commerce Websites Based on Pythagorean Fuzzy Information
Published 2025-01-01“…They are essential to keep up with the market changes and shifts to provide better compliance with security requirements and to optimize the interface to hold onto user attention. …”
Get full text
Article -
2547
Development of Hybrid Intrusion Detection System Leveraging Ensemble Stacked Feature Selectors and Learning Classifiers to Mitigate the DoS Attacks
Published 2025-02-01“…Since these technologies are deeply rooted in the individual’s comfort life, protecting the user’s privacy and security against the growing DoS attack has become a major challenge among researchers. …”
Get full text
Article -
2548
Detection of False Data Injection Attacks (FDIA) on Power Dynamical Systems With a State Prediction Method
Published 2025-01-01“…With the deeper penetration of inverter-based resources in power systems, false data injection attacks (FDIA) are a growing cyber-security concern. They have the potential to disrupt the system’s stability like frequency stability, thereby leading to catastrophic failures. …”
Get full text
Article -
2549
Smart home technology to support engagement in everyday activities while ageing: A focus group study with current and future generations of older adults.
Published 2025-01-01“…The perceived advantages of SHT include enhancing the sense of security and safety, which can facilitate engagement in everyday activity. …”
Get full text
Article -
2550
Wild Edible Plant Nutritional Contribution and Consumer Perception in Ethiopia
Published 2020-01-01“…Even though wild edible plants are important for food security, they are usually overlooked and perceived as food for poor families. …”
Get full text
Article -
2551
Detection and diagnosis of unknown threats in power equipment using machine learning and Spark technology
Published 2025-01-01“…This approach allows for more efficient and accurate detection of unknown threat attacks on power grid equipment, providing robust network security for power systems. Our findings offer a new theoretical perspective for the evolving field of network security.…”
Get full text
Article -
2552
Ethnobotanical study of wild edible plants in Metema and Quara districts, Northwestern Ethiopia
Published 2025-02-01“…Abstract Background Wild edible plants (WEPs) are vital to enhance food security and generate income. Despite Ethiopia’s vast area and cultural diversity, there remains a need for further investigation of WEPs. …”
Get full text
Article -
2553
-
2554
MonoMax Suture: A New Long-Term Absorbable Monofilament Suture Made from Poly-4-Hydroxybutyrate
Published 2012-01-01“…Its tensile modulus of 0.48 GPa is approximately one-third of the value of the PDS II fiber providing an exceptionally flexible and pliable fiber with excellent knot strength and security. These features are further enhanced by the fiber's elasticity, which also improves knot security and may help prevent wound dehiscence. …”
Get full text
Article -
2555
Supply risk propagation in international trade networks of the tungsten industry chain
Published 2025-01-01“…The results can provide reference and decision support for different economies to secure the supply security and sustainability of tungsten resources.…”
Get full text
Article -
2556
ASEAN Defence Ministers MeetingPlus: Institutional structure, specific features, and evolution (2010–2022)
Published 2024-09-01“…In 2010, a specific security-related dialogue format has been introduced into this system, — the ASEAN Defence Ministers Meeting-Plus (ADMM-Plus). …”
Get full text
Article -
2557
A Covert α-Stable Noise-Based Extended Random Communication by Incorporating Multiple Inverse Systems
Published 2025-01-01“…The results from Monte Carlo simulations show that deploying the proposed ERCS not only leads to better Bit Error Rate (BER) performance but also provides increased covertness values, which proves the design’s ability to enhance performance and security compared to earlier models. Simulation analysis also suggests that the utilization of multiple inverse systems in the proposed ERCS can enhance the physical-layer security of next-generation communication devices.…”
Get full text
Article -
2558
Analysis of new varieties adoption behavior of Chinese turbot farmer based on the perspective of heterogeneity
Published 2025-01-01“…China is the largest turbot farming in the world, where germplasm source security is closely related to national security. To further promote the sustainable development of the turbot aquaculture industry, the China Marine Fish Industry Technology System team has developed a new variety of fast-growing turbot (hereinafter referred to as new varieties) in 2012. …”
Get full text
Article -
2559
Systems Evaluation for Operational Risks of International Transport Corridors: A Case Study of China-Pakistan-Iran-Turkey International Transport Corridor
Published 2021-01-01“…The Chinese section has the lowest operational risk index. (2) Pakistan has been trapped in severe political risks and security risks in recent years. Turkey suffers from severe security risks due to the Kurdish problem. …”
Get full text
Article -
2560
Grid-Based Anomaly Detection of Freight Vehicle Trajectory considering Local Temporal Window
Published 2021-01-01“…The security travel of freight vehicles is of high societal concern and is the key issue for urban managers to effectively supervise and assess the possible social security risks. …”
Get full text
Article