Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3361
A Biometric Key Establishment Protocol for Body Area Networks
Published 2011-08-01“…The correctness of the proposed key establishment protocol is formally verified based on SVO logic. Security analysis shows that our protocol can guarantee data confidentiality, authenticity and integrity. …”
Get full text
Article -
3362
Structural and Dynamic Changes in International Trade in Agricultural Products in Ukraine
Published 2024-03-01“…The peculiarities of key directions of Ukraine's agro-industrial market under martial law and its place in the global food security system are described. The article also examines the structure of Ukraine's trading partners, which have been revised since the beginning of the war. …”
Get full text
Article -
3363
Generating Encrypted Document Index Structure Using Tree Browser
Published 2023-06-01“…Many information retrieval systems encounter security issues and execution time to retrieve relevant documents. …”
Get full text
Article -
3364
Deep features fusion for user authentication based on human activity
Published 2023-07-01“…Abstract The exponential growth in the use of smartphones means that users must constantly be concerned about the security and privacy of mobile data because the loss of a mobile device could compromise personal information. …”
Get full text
Article -
3365
A REAL TIME FACE RECOGNITION SYSTEM USING ALEXNET DEEP CONVOLUTIONAL NETWORK TRANSFER LEARNING MODEL
Published 2021-10-01“…In various applications such as access control system, security, attendance management etc., it has been widely used for authentication and identification purposes. …”
Get full text
Article -
3366
Chinese Intellectuals’ Perspectives on Russia's Invasion of Ukraine
Published 2023-01-01“…While many accuse the Russian leadership and in particular Russian President Vladimir Putin for the war, some others criticize Western countries and principally the US for NATO’s eastward expansion and for disregarding Russia’s security concerns. Chinese intellectuals with diverse academic and political backgrounds have also contributed to these discussions and offered their assessments about the war in Ukraine as well as what kind of a policy China should follow. …”
Get full text
Article -
3367
Petrochemical Equipment Detection by Improved Yolov5 with Multiscale Deep Feature Fusion and Attention Mechanism
Published 2022-01-01“…Petrochemical equipment detection technology plays important role in petrochemical industry security monitoring systems, equipment working status analysis systems, and other applications. …”
Get full text
Article -
3368
Influence of experimental fires on mesofauna communities (Collembola and Acari) of two types of meadows
Published 2020-12-01Get full text
Article -
3369
Ring Oscillators with Additional Phase Detectors as a Random Source in a Random Number Generator
Published 2024-12-01“…This feature enhances the security of the produced sequences, as eavesdroppers are unable to observe the continuous random bit generation process, such as through monitoring power lines. …”
Get full text
Article -
3370
Deep Learning Algorithms and Multicriteria Decision-Making Used in Big Data: A Systematic Literature Review
Published 2020-01-01Get full text
Article -
3371
Harnessing UV radiation for enhanced agricultural production: benefits on nutrition, quality, and sustainability
Published 2024-12-01“…This review offers essential knowledge and methods for using UV radiation as a safe tool to increase global food security.…”
Get full text
Article -
3372
Multi-alignment under "Uneven Multipolarity": India’s Relations with Russia in an Evolving World Order
Published 2023-05-01“…It argues that India's perception of the balance of threats has shifted with respect to China, particularly in the Asia-Pacific and Indian Ocean regions, which are crucial to India's national security and future power projection ambitions. In the current context of uneven multipolarity, the capabilities of the US and China exceed those of weaker major powers, such as India, Russia, and Japan, without tipping the system into explicit bipolarity. …”
Get full text
Article -
3373
THE NIGERIA MILITARY AND THE FIGHT AGAINST ISLAMIC STATE`s WEST AFRICA PROVINCE (ISWAP), 2016-2022
Published 2024-09-01“…The findings from the study revealed that there were several offensives by the Nigerian military against ISWAP with the aim of neutralizing their fighters by destroying their camps and hideouts and restoring peace and security in the affected areas, certain strategies exhibit significant shortcomings, necessitating continuous refinement. …”
Get full text
Article -
3374
Effectiveness of the Spatial Domain Techniques in Digital Image Steganography
Published 2024-03-01“… Digital steganography is a new and extremely demanding method for transmitting information securely over the internet while employing a covert device. …”
Get full text
Article -
3375
A Better Model for Socio-economic Governance?
Published 2011-06-01“…Investigation shows a bias towards external and brand-related, rather than internal priorities of job security and the social capital of workplace communities. …”
Get full text
Article -
3376
INVESTIGATING THE COST EFFECTIVENESS OF BIODIESEL DISTRIBUTION IN INDONESIA
Published 2023-05-01“… The implementation of biodiesel in Indonesia has been regarded as one of the main strategies to improve country’s energy security equally and equitably. However, as the largest archipelago country in the world, the activity in distributing their biodiesel production bears a key problem. …”
Get full text
Article -
3377
Barriers and Enablers of AI Adoption in Human Resource Management: A Critical Analysis of Organizational and Technological Factors
Published 2025-01-01“…Change aversion, data security worries, and integration expenses are major roadblocks, but strong digital leadership, company culture, and advancements in NLP and machine learning are key enablers. …”
Get full text
Article -
3378
GLOBAL SUPRANATIONAL ACTORS OF INTERNATIONAL RELATIONS AND SOCIAL PHILOSOPHY
Published 2013-08-01“…In article it is shown that the information support of foreign policy and international relations of the stands in one row with such priority issues of world policy as non-proliferation of nuclear weapons, restriction and prohibition of weapons of mass destruction, settlement of regional conflicts and peace-making, strengthening of comprehensive security, the preservation of cultural heritage and promotion of human rights.…”
Get full text
Article -
3379
Normal Deviance: The Dreyfus Affair
Published 2005-12-01“…Enmeshing issues of security and nation, of population and race, the Dreyfus affair forced governments, intellectuals, media, and what we now refer to as the ‘new social movements’ into wide-ranging debates and strategic interventions that forged new relations among them. …”
Get full text
Article -
3380
Digital Transformation: A Case Study of a Legal Firm in Sri Lanka and Its Impact
Published 2024-08-01“…Saram company’s manual practices, which hinder its operational effectiveness and adaptability in the contemporary legal landscape, where quick and secure access to information is pivotal. We have adopted TAM as the theoretical framework for this research. …”
Get full text
Article