Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3001
Implementasi Algoritme Morus V2 untuk Pengamanan Data Pada Perangkat Bluetooth Low Energy
Published 2022-12-01“…Data transmission will be insecure without a data security process. Cryptography is one of the options for securing data. …”
Get full text
Article -
3002
Fibroblast Growth Factor 21 Deficiency Attenuates Experimental Colitis-Induced Adipose Tissue Lipolysis
Published 2017-01-01Get full text
Article -
3003
Characteristics of Land Use Change and Evaluation of Ecological Sensitivity in Chongqing
Published 2024-12-01“…[Objective] Chongqing, as the economic center of the upper reaches of the Yangtze River in China and a barrier to ensure ecological security in the middle and lower reaches of the Yangtze River, is a typical ecological functional and fragile area in China. …”
Get full text
Article -
3004
Blockchain dan Kecerdasan Buatan dalam Pertanian : Studi Literatur
Published 2021-02-01“…Besides, this combination can also increase security on the blockchain system through the application of artificial intelligence. …”
Get full text
Article -
3005
Cross-Platform Ecological Momentary Assessment App (JTrack-EMA+): Development and Usability Study
Published 2025-01-01“…It strongly commits to security and privacy and complies with the General Data Protection Regulations to safeguard user data and ensure confidentiality. …”
Get full text
Article -
3006
Strategic alternatives for increasing the enterprise's financial potential
Published 2023-03-01“…The basic financial strategies in the aspect of increasing the enterprise's financial potential are considered: the strategy of forming financial resources, the structural financial strategy and the strategy of ensuring financial security. The formation and implementation of the enterprise's basic financial strategies must be consistent with the situation and development trends of the market in which the enterprise operates. …”
Get full text
Article -
3007
Providing a General Model for the Successful Implementation of Digital Transformation in Organizations
Published 2024-06-01“…These results highlighted that leadership and vision, change management, collaboration and partnership, user-centered design, and privacy and data security are the principal factors in the implementation of digital transformation. …”
Get full text
Article -
3008
The role of 5G network in revolutionizing agriculture for sustainable development: A comprehensive review
Published 2025-03-01“…Additionally, the paper explores development optimization of various nodes, fault detection, self-healing mechanisms, AI application optimization, and security issues specific to 5G-enabled smart agriculture. …”
Get full text
Article -
3009
Factors Influencing Telemedicine Adoption Among Health Care Professionals: Qualitative Interview Study
Published 2025-01-01“…Practically, the findings guide stakeholders: policy makers should prioritize transparent regulations and data security, health care organizations should provide training and support for HCPs, and technology developers must design telemedicine solutions aligning with trust and usability needs. …”
Get full text
Article -
3010
The Impact of Artificial Intelligence on Healthcare: A Comprehensive Review of Advancements in Diagnostics, Treatment, and Operational Efficiency
Published 2025-01-01“…However, there are major obstacles to the mainstream implementation of AI in healthcare, including issues with data security and budget constraints. Conclusion Healthcare may be transformed by AI, but its successful use requires ethical and responsible use. …”
Get full text
Article -
3011
A critical evaluation of religious syncretism among the Igbo Christians of Nigeria
Published 2021-12-01“…Besides the belief in ritualistic charms, many Igbo/Igbo-speaking Christians consult diviners for various reasons, including security and prosperity, causes of illness and death, ways of preserving life, as well as to discern the mind of God about one’s future and destiny. …”
Get full text
Article -
3012
Relieve Adversarial Attacks Based on Multimodal Training
Published 2025-01-01“…However, the emergence of adversarial attacks has exposed shortages of neural networks, forcing people to confront their limitations and further increasing concerns about the security of deep learning models. Adversarial training is an effective defense mechanism that incorporates adversarial samples into the training data, enabling models to better detect and resist attacks. …”
Get full text
Article -
3013
Political Elites as an Object of Coercive Influence in Contemporary World Politics
Published 2015-10-01“…The assumption then is that the main object of the security and the securitization in world politics is to be political elite. …”
Get full text
Article -
3014
Behaviour change communication influences on food consumption behaviours and the demand for diverse nutritious foods in the Makoni District, Zimbabwe.
Published 2024-01-01“…Participants indicated that the Livelihoods and Food Security Programme intervention successfully increased their nutrition knowledge, enhanced their ability to diversify crop production, and improved their access to varied foods, including some new crops. …”
Get full text
Article -
3015
Reserves and extraction of rare earth metals and elements as a key factor in the renewable energy sector development at the the world economy transformation current stage
Published 2023-06-01“…The use of renewable energy sources, which are experiencing a period of rapid development, is one of the stages of the current energy transition, as the world community tries to ensure a future with zero CO2 emissions and to achieve energy independence and security. At the same time, for output of the wide range of products for the renewable energy sector, as well as for the development of energy depot systems, it is necessary to use rare earth elements and metals in production. …”
Get full text
Article -
3016
A New Countermeasure against Brute-Force Attacks That Use High Performance Computers for Big Data Analysis
Published 2015-06-01“…Both methods look different; however, they have similar security goals and they both feature distribution transforming encoders based on statistical schemes. …”
Get full text
Article -
3017
Transformer Inrush Current and Internal Fault Discrimination Using Multitypes of Convolutional Neural Network Techniques
Published 2024-01-01“…To maintain the security of transformer differential protection, it is essential to restrain its response to oversetting differential current caused by the inrush current or other switching conditions. …”
Get full text
Article -
3018
Pomodori e pesticidi. (In)giustizia alimentare, sanitaria e ambientale nelle Regioni ultraperiferiche: il caso di Mayotte
Published 2024-06-01“…Through this paper we intend to offer a contribution to the debate on food and environmental security and sustainability in the European Outermost regions, so as to illustrate the not-so-apparent linkages between departmentalisation, socio-economic inequalities and food and environmental insecurity. …”
Get full text
Article -
3019
Covert Channel Construction Method Based on HTTP Composite Protocols
Published 2022-01-01Get full text
Article -
3020
A Particle Swarm Optimization Algorithm for Deployment of Sensor Nodes in WSN Network
Published 2022-01-01“…In order to solve the problems of security hidden dangers in the process of node location due to the characteristics of limited resources, open deployment, and being unattended in wireless sensor networks, this paper proposes a mainstream location algorithm combined with the current WSN node. …”
Get full text
Article