Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3341
PHYSICAL LAYER SECRECY ON WIRELESS NETWORK
Published 2016-06-01“…In this paper, we present an approach for wireless security based on physical layer. The basic principle of physical layer secrecy (PHY Secrecy) is ensuring secure information transmission in the the system that consists of illegal receiver without using any coding solution on application layer. …”
Get full text
Article -
3342
A strategy of the new “green revolution” in wheat breeding: celebrating the jubilee of Lyudmila A. Bespalova, Full Member of the Russian Academy of Sciences
Published 2022-04-01“…Lukyanenko National Grain Center is a practically proven strategy of the new “green revolution” capable of ensuring the global food security.…”
Get full text
Article -
3343
Sulla (ri)articolazione della “marocchinità” nel Marocco contemporaneo, tra festivalizzazione del dissenso giovanile e revival sufi
Published 2024-06-01“…After September 11, 2001, and following terrorist attacks in Casablanca, the Moroccan monarchy was engaged in redefining a field of the sacred, which involved the neutralization of Salafist tendencies and their replacement with a Sufism deemed harmless and incapable of threatening the nation's spiritual security. The monarchy's discursive strategies required and still require the elaboration of public representations of virtue, particularly of the principle of democratic citizenship, central in the transitional discourses of today's Moroccan state, performed within the framework of national and international festivals. …”
Get full text
Article -
3344
The real-time data processing framework for blockchain and edge computing
Published 2025-05-01“…However, traditional centralized methods struggle with real-time requirements and data security. This paper introduces VCD-TSNet, a novel real-time IoT data processing framework that combines blockchain and edge computing. …”
Get full text
Article -
3345
-
3346
Nosocomial infection in the intensive care unit. 1997-2002.
Published 2005-04-01“…The rates of mortality associated to infection stayed low and the lethality suffered a on decreased in the studied period, however the pneumonias associated to the ventilation mechanics stayed high with an average of 24, 6 for every 1000 patient days and to the closing of the 2002 the service you will find in the area of security of the endemic channel.<span style="font-family: Calibri;"><strong><span style="font-size: 10pt">K</span></strong></span>…”
Get full text
Article -
3347
TM-Chain: TCB Measurement Management Using Cloud Blockchain for IoT Devices
Published 2025-01-01“…In the IoT era, RA is an important security feature because verifiers make critical decisions based on the RA result. …”
Get full text
Article -
3348
Cooperation in border areas among some Southeast Asian mainland countries: a case study of the Cambodia-Laos-Vietnam Development Triangle
Published 2025-12-01“…Border cooperation in mainland Southeast Asia has received attention from the countries of Myanmar, Thailand, Cambodia, Laos and Vietnam to both strengthen cooperation to promote the economy and improve people’s lives in the region border, ensuring national security and preventing crime. Typical of the border cooperation mechanism of mainland Southeast Asia is the Cambodia-Laos-Vietnam Development Triangle (CLVDT) which established in 1999.…”
Get full text
Article -
3349
Challenges and recommendations for enhancing digital data protection in Indian Medical Research and Healthcare Sector
Published 2025-01-01“…Abstract The Digital Personal Data Protection Act (DPDPA), 2023 of India provides a regulatory framework for use and security of personal digital data. However, instances, wherein the patients consult the clinicians via digital means of communication: the implications of DPDPA, 2023 for the medical personnel remain unclear. …”
Get full text
Article -
3350
Study of living standards in Sahebgharaniyeh neighborhood of Tehran
Published 2022-03-01“…But with 95 percent confidence, Sahebgharriyeh neighborhood can be considered as individual and social security indexes, identity and sense of place belonging, facilities and services needed, and the status of the visual landscape and the environmental pollution of the habitat.…”
Get full text
Article -
3351
Integrating Machine Learning for Predictive Maintenance on Resource-Constrained PLCs: A Feasibility Study
Published 2025-01-01“…This approach minimizes latency, enhances data security, and reduces the bandwidth required for data transmission, making it ideal for industrial applications that demand immediate response times. …”
Get full text
Article -
3352
Oxidative Stress as the Main Target in Diabetic Retinopathy Pathophysiology
Published 2019-01-01Get full text
Article -
3353
„Nie wierzę w bajki!”: Henrietta Regina Davidson Avram (1919–2006)
Published 2023-12-01“…Droga zawodowa Avram wpisuje się w triadę stworzoną przez Vannevara Busha: wojsko (National Security Agency) – świat akademicki (Biblioteka Kongresu) – firmy prywatne (Datatrol). …”
Get full text
Article -
3354
Dynamic Sign Guidance Optimization for Crowd Evacuation considering Flow Equilibrium
Published 2022-01-01Get full text
Article -
3355
Facial Recognition Databases: Recent Developments and Review of Methods
Published 2023-12-01“… Facial recognition is one of the most important biometrics that many researchers are increasingly studying, as it is used in various applications such as surveillance, security, law enforcement, information, person identification, smart cards, access control, etc. …”
Get full text
Article -
3356
Feature-Level vs. Score-Level Fusion in the Human Identification System
Published 2021-01-01“…The design of a robust human identification system is in high demand in most modern applications such as internet banking and security, where the multifeature biometric system, also called feature fusion biometric system, is one of the common solutions that increases the system reliability and improves recognition accuracy. …”
Get full text
Article -
3357
Leveraging drone technology for enhanced safety and route planning in rock climbing and extreme sports training
Published 2025-01-01“…Furthermore, drones enhance athletes' psychological comfort, leading to increased confidence and security during high-risk activities. Conclusions: Despite the advantages, challenges such as technological dependency and potential drone malfunctions in extreme environments are acknowledged. …”
Get full text
Article -
3358
Ensete ventricosum: A Multipurpose Crop against Hunger in Ethiopia
Published 2020-01-01“…Moreover, enset shows high genetic diversity within a population which in turn renders resilience and food security against the ever-changing environmental factors and land use dynamics. …”
Get full text
Article -
3359
Investigating the impact of physical dimensions - space to encourage walking in Tehran (Case Study: neighborhood Amirabad and Daneshgah Tehran)
Published 2018-06-01“…The amount of factor loadings obtained in all the research indicates that the selected indicators to measure the physical dimensions of space, encourage walking properly measure these dimensions, so that the physical dimensions, safety index (99/0 ) and the spatial dimensions of the security indicator (75/0) have had the highest amount of loadings. …”
Get full text
Article -
3360
Cross-stream attention enhanced central difference convolutional network for CG image detection
Published 2024-12-01“…Although these technologies are widely used in daily life and bring many conveniences, they also come with many security risks. If forged images generated using CG technology are maliciously used and widely spread on the Internet and social media, they may harm the rights of individuals and enterprises. …”
Get full text
Article