Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3081
-
3082
UAV swarms: research, challenges, and future directions
Published 2025-01-01“…Key areas such as coordinated path planning, task assignment, formation control, and security considerations are examined, highlighting how Artificial Intelligence (AI) and Machine Learning (ML) are integrated to improve decision-making and adaptability. …”
Get full text
Article -
3083
Construction of Internet of things trusted group based on multidimensional attribute trust model
Published 2021-01-01“…Accurate prediction of the trust relationship is the basis for trusted access and secure interaction between Internet of things nodes. …”
Get full text
Article -
3084
Abnormal Event Detection via Multikernel Learning for Distributed Camera Networks
Published 2015-09-01“…Distributed camera networks play an important role in public security surveillance. Analyzing video sequences from cameras set at different angles will provide enhanced performance for detecting abnormal events. …”
Get full text
Article -
3085
An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity
Published 2016-01-01“…Once the partnered two users are authenticated by the trusted server, they can easily proceed with the agreement of the session key. Formal security analysis demonstrates that the proposed scheme is secure under the random oracle model.…”
Get full text
Article -
3086
-
3087
Enhancing drought tolerance in horticultural plants through plant hormones: a strategic coping mechanism
Published 2025-01-01“…The development of effective strategies to mitigate drought stress is essential for sustainable agriculture and food security, especially considering the continuous growth of the world population. …”
Get full text
Article -
3088
A Comprehensive Review: Interaction of Appearance and Behavior, Artificial Skin, and Humanoid Robot
Published 2023-01-01“…Recent research on humanoid robots is designed to appear to be copies of the anthropometric indicators of real people, which may affect the security of other people’s identities. Besides, these robots cause a feeling of horror in the user if their appearance is in the position of the uncanny valley. …”
Get full text
Article -
3089
Organizing Coastal Land Use for Urban Tourism Development (Case Study: Sorkhrood)
Published 2020-06-01“…The results of this research show that from the perspective of half of the officials and government experts, the expansion of tourism industry, on one hand, causes the region's economic prosperity and, on the other hand, reduces regional security and causes pollution of the environment.…”
Get full text
Article -
3090
Talk About Crime Among Young People in Northern Mexico: The Impact of Drug Trafficking in the Neighborhood
Published 2025-01-01“…The main changes pointed out by the young people were the intensification of insecurity, the expansion of drug dealing in the community, mental health problems (especially addictions), the restriction of mobility on the streets, and changes in the relationship with security institutions. They also refer to changes such as the normalization of drug trafficking and the decline of the neighborhood’s image.…”
Get full text
Article -
3091
« You don’t suspect me of doing anything wrong, do you ? » Peurs, soupçons et paranoïa dans The Woman in White de Wilkie Collins
Published 2008-12-01“…From mere domestic secrets to anxieties related to national security, Collins describes a modern world ruled by suspicions, and constructs his characters as paranoid patients.…”
Get full text
Article -
3092
The effect of using Naive Bayes to detect spam email
Published 2025-01-01“…This high level of accuracy underscores the effectiveness of the Bayesian approach in identifying and filtering out spam, thereby enhancing the overall efficiency and security of email communication.…”
Get full text
Article -
3093
Motivators for using on-demand vehicle sharing services in Brazil
Published 2021-01-01“…The five major regions of Brazil were considered in this research, totaling 2150 interviews, indicating the existence of fourteen motivators for use involving the economic, social, environmental, and technological dimensions, however, only six variables comprise the structuring nucleus of demand and are based on an element of economic order (Reduced Tariff), one of a socioeconomic nature (Expectation of Benefits) and four technological drivers (Technological Availability, Convenience of Time and Boarding in addition to Data Security), which figure as utilitarian indicators, corroborating the results of international studies and contrasting those that signal hedonistic elements as relevant. …”
Get full text
Article -
3094
Problems of investing in enterprises for processing and disposal of solid municipal waste
Published 2022-03-01“…The issues of investing in enterprises engaged in the utilisation and processing of municipal solid waste are currently relevant due to increasing consumption, correspondingly increasing production and the amount of waste and require the most careful approach from the point of view of environmental security. The object of the research are the factors that determine the potential benefits of investing in enterprises of this industry. …”
Get full text
Article -
3095
Algorithm Domination As A New Surveillance System
Published 2024-12-01“…Algorithms constitute a domination form because they threaten people's freedoms and security. Algorithm domination is seen as a form of control and discipline in today's world. …”
Get full text
Article -
3096
Throughput-Optimal Scheduling for Cooperative Communications in Wireless Ad Hoc Networks
Published 2013-09-01Get full text
Article -
3097
A New Approach to Assessing the Accuracy of Forecasting of Emergencies with Environmental Consequences Based on the Theory of Fuzzy Logic
Published 2024-12-01“…Prevention of the occurrence and development of emergencies of a natural and man-made nature is one of the basic fundamental foundations of ensuring the national security of any state. The most important mechanism for preventing emergencies is an effective system of monitoring and forecasting emergencies established at the state level. …”
Get full text
Article -
3098
Study and Analysis of Barriers for Implementation of Industry 4.0 Technologies Using Spherical Fuzzy TOPSIS Method
Published 2025-01-01“…Drivers such as government initiatives, establishment of fast internet connectivity, job security, etc., are recommended in this research work for minimizing the effect of barriers.…”
Get full text
Article -
3099
Current and Emerging Protocols for Carbon Measurement in Agricultural Soils
Published 2023-10-01“…These massive C sinks have the potential to reverse soil degradation, mitigate climate change, and enhance food security. It is therefore essential to monitor the C cycle by accurately measuring the amount of soil C in agricultural fields. …”
Get full text
Article -
3100
Service Provider Selection For Project Logistics Operations With Fuzzy Analytic Hierarchy Process
Published 2023-01-01“…The results are that for project logistics management, logistics service providers need to improve vehicle availability, cargo security, on-time delivery, etc. to become more competitive.…”
Get full text
Article