Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2621
Skema Kredibilitas Sertifikat Berbasis Ilearning Gamifikasi Blockchain pada Kampus Merdeka
Published 2023-02-01“…Blockchain technology is the answer to every security problem because of the permanent and peer-to-peer storage in a distributed network and significant security. …”
Get full text
Article -
2622
De la police coloniale française à la police nationale marocaine : décolonisation et héritages policiers (1953-1960)
Published 2023-12-01“…Among the numerous institutional continuities between the French protectorate over the Cherifian Empire (1912-1956) and independent Morocco, the security forces, particularly the police, stand out. …”
Get full text
Article -
2623
Enhanced Intrusion Detection in Drone Networks: A Cross-Layer Convolutional Attention Approach for Drone-to-Drone and Drone-to-Base Station Communications
Published 2025-01-01“…This study pioneers a unified security solution for Drone-to-Drone (D2D) and Drone-to-Base Station (D2BS) communications, filling a crucial IoD security gap. …”
Get full text
Article -
2624
First aid guidelines for fragile contexts (conflict, disaster and remote areas): Contextualization & Adaptation
Published 2022-07-01“…In some instances, safety and security of the first aider and the person requiring help should be prioritized over providing care. …”
Get full text
Article -
2625
Intrusion detection using synaptic intelligent convolutional neural networks for dynamic Internet of Things environments
Published 2025-01-01“…The swift proliferation of IoT devices has brought about a multitude of complex cyberattacks that breach network security and compromise user privacy. To address these threats, this paper proposes a synaptic intelligent convolutional neural network (SICNN) model for intrusion detection in dynamic IoT environments. …”
Get full text
Article -
2626
Novel Technique of Pneumatic Posterior Capsulorhexis for Treatment and Prevention of Posterior Capsular Opacification
Published 2019-01-01“…Setting. (1) Ophthalmology department, Faculty of Medicine, Minia University, 61519, El-Minia, Egypt. (2) Security Forces Hospital, Ophthalmology Department, Riyadh, Kingdom of Saudi Arabia. …”
Get full text
Article -
2627
Sorghum yield prediction based on remote sensing and machine learning in conflict affected South Sudan
Published 2025-02-01“…This paper demonstrates that despite ongoing conflict, reasonably good end-of-season sorghum yield prediction with relevant food security planning implications could be done with ML, but challenges remain in generalizing these results due to limited crop data and regional variability in South Sudan.…”
Get full text
Article -
2628
Nutritional management and maize variety combination effectively control Striga asiatica in southern Africa
Published 2022-07-01“…Abstract Maize (Zea mays L.) is an important staple food crop in sub-Saharan Africa (SSA) and contributes significantly to food security. Due to Striga, maize yield loss is estimated between 20 and 80% forcing some farmers to abandon their land therefore threatening food security. …”
Get full text
Article -
2629
Advancing UAV Communications: A Comprehensive Survey of Cutting-Edge Machine Learning Techniques
Published 2024-01-01Get full text
Article -
2630
The Potential of Emergency Medical Response to CBRNE Threats in the Context of Military-Civilian Cooperation
Published 2024-12-01“…Conclusions: Based on the results of four-year research and conceptual works completed under the project “Strengthening CBRNE Safety and Security — Coordination and Standardisation”, as part of Norway Grants for 2014–2021, a new medical rescue and healthcare functioning model was developed based on the potential of the latest technical solutions, resources and security management systems. …”
Get full text
Article -
2631
Russia and NATO’s ‘Open Door’ Policy in the Post-Bipolar Period
Published 2024-07-01“…The author concludes that NATO enlargement has had an ambiguous impact on both the European security architecture, and the alliance itself. On the one hand, it gave the United States new opportunities to project power and consolidate its hegemonic status in Europe. …”
Get full text
Article -
2632
-
2633
The 1945 World Order – Process with «Open» Continuation
Published 2020-09-01“…The Yalta-Potsdam system of international relations, established by culmination of World War II, was created to maintain the security and cooperation of states in the post-war world. …”
Get full text
Article -
2634
Public safety in the conditions of martial law and mental warfare
Published 2022-09-01“…The main purpose of the study is to develop proposals and concrete measures to strengthen public security in the conditions of martial law and mental war unleashed against Ukraine. …”
Get full text
Article -
2635
Ischemic Heart Disease and Work Disability in Patients Treated at the Internal Medicine Consultation and Assessed by the Expert Medical Labor Commission
Published 2016-02-01“…Its costs in terms of social security are increasing.…”
Get full text
Article -
2636
Improving Telemedicine through IoT and Cloud Computing: Opportunities and Challenges
Published 2024-09-01“…However, significant challenges are addressed, including data security, interoperability, and reliable internet connectivity in various healthcare settings. …”
Get full text
Article -
2637
The defense function of the state: Traditional and modern understanding
Published 2025-01-01“…Since the defense function of the state is a complex phenomenon encompassing biological, anthropological, philosophical, sociological, psychological, political, security, military, strategic, and other aspects, understanding its essence is no easy task. …”
Get full text
Article -
2638
Highway Performance Evaluation Index in Semiarid Climate Region Based on Fuzzy Mathematics
Published 2019-01-01Get full text
Article -
2639
Assessment of post-harvest fish losses at the fishers’ level in Lake Tana, Ethiopia
Published 2025-01-01“…Fish are essential for ensuring food and nutrition security; and economic growth. However, post-harvest loss poses a significant challenge in the value chain due to the perishable nature of fish. …”
Get full text
Article -
2640
Survey of Artificial Intelligence Model Marketplace
Published 2025-01-01“…It further explores the AI model life-cycle, highlighting pricing, trading, tracking, security, and compliance challenges. This detailed analysis is intended for an audience with a foundational understanding of AI systems, marketplaces, and their operational ecosystems. …”
Get full text
Article