Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3401
StegoEDCA: An Efficient Covert Channel for Smart Grids Based on IEEE 802.11e Standard
Published 2025-01-01“…These covert channels provide an innovative solution for securely transmitting large volumes of data within the smart grid.…”
Get full text
Article -
3402
INNOVATIVE INFORMATION TECHNOLOGIES IN ELECTION POLITICAL COMMUNICATIONS
Published 2024-12-01“…The use of AI to create deepfakes and spread disinformation poses ethical and security challenges. The text concludes that while digital technologies offer immense opportunities for enhancing electoral communication, they also require robust ethical guidelines and regulatory oversight. …”
Get full text
Article -
3403
TomatoGuard-YOLO: a novel efficient tomato disease detection method
Published 2025-01-01“…Tomatoes are highly susceptible to numerous diseases that significantly reduce their yield and quality, posing critical challenges to global food security and sustainable agricultural practices. To address the shortcomings of existing detection methods in accuracy, computational efficiency, and scalability, this study propose TomatoGuard-YOLO, an advanced, lightweight, and highly efficient detection framework based on an improved YOLOv10 architecture. …”
Get full text
Article -
3404
The Rare Coincidence: Nonrecurrent Laryngeal Nerve Pointed by a Zuckerkandl's Tubercle
Published 2012-01-01“…Anatomical and embryological variations of the inferior laryngeal nerve (ILN), of the thyroid gland itself and unusual relations between ILN and the gland threaten operation security are discussed. The patient with toxic multinodular goiter is treated with total thyroidectomy. …”
Get full text
Article -
3405
Blockchain based micropayment for e-health IOT sensors
Published 2023-09-01“…Increasing the use of this technology in smart cities requires improving the IT infrastructure for the security and privacy of users. This has led to the use of blockchain technology alongside the Internet of Things. …”
Get full text
Article -
3406
Model for home-preschool continuity in linguistically and culturally diverse settings
Published 2025-01-01“…Preschool education scholars have argued that teachers must work collaboratively with these children’s families to support their “linguistic security” and well-being. The paper presents a conceptual model integrating linguistically and culturally responsive teaching with family funds of knowledge, language education, and family language policies. …”
Get full text
Article -
3407
Metaverse: Technological evolution and social impact
Published 2024-01-01“…Through the evolution of virtual worlds and technological advancements, the Metaverse is becoming increasingly prevalent, offering richer socialization experiences and economic opportunities while simultaneously raising concerns about privacy, security, and media addiction. National policies and the attitudes of international organizations also play a crucial role in shaping the future of the Metaverse, with different countries having different strategies and priorities. …”
Get full text
Article -
3408
Home, Physical Disability and Sense of Belonging in Nina Raine’s Tribes
Published 2023-12-01“…Home has traditionally been perceived as a location that provides control, freedom of self-expression, and psychological, social, and physical security. However, the presence and development of physical impairment subvert the positive aspects and conventional conceptions of home. …”
Get full text
Article -
3409
-
3410
-
3411
A New Methodology for Hesitant Fuzzy Emergency Decision Making with Unknown Weight Information
Published 2018-01-01Get full text
Article -
3412
Defending Against Advanced Persistent Threats Using Game-Theory.
Published 2017-01-01“…The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailable. …”
Get full text
Article -
3413
Cultural Tourism Management: Advanced Tools and Technologies
Published 2025-01-01“…On the other hand, the blockchain technology could offer numerous advantages in the field of cultural tourism, from enhanced security and transparency to process automation and the creation of innovative visitor experiences. …”
Get full text
Article -
3414
A Review of Ethnomedicinal Plants as Potential Anthelmintic Agents to Alternatively Control Gastrointestinal Nematodes of Ruminants in South Africa
Published 2024-01-01“…Small ruminant production is one of the most important animal productions for food security in the world, especially in the developing world. …”
Get full text
Article -
3415
Effects of Neutralization, Decoloration, and Deodorization on Polycyclic Aromatic Hydrocarbons during Laboratory-Scale Oil Refining Process
Published 2017-01-01“…Data obtained in this study suggest that the use of activated carbon during oil refining process is highly recommended; moreover, these results provide a useful guidance for oil refining plant to reduce security risk and ensure the quality of the vegetable oil products.…”
Get full text
Article -
3416
“Big Challenges” and Regional Technical University: Values and Actions
Published 2020-03-01“…There is a distinction between civilization and globalist paradigms of Russia positioning, as well as a distinction between well-being and security as two strategies of values generalization. …”
Get full text
Article -
3417
GOVERNMENTAL SUPPORT MECHANISM OF THE RENEWABLE ENERGY IN GERMANY
Published 2016-06-01“…Energy reform is intended to increase the energy security level by increasing the share of renewables in its energy portfolio, environmental protection by decreasing the emission into the atmosphere and the level of energy consumption. …”
Get full text
Article -
3418
Implementation of an Android-Based Attendance Application with Geofence Method for Employee Monitoring Efficiency
Published 2024-11-01“…Application testing was conducted based on the ISO 25010 standard, covering eight aspects: functionality, reliability, efficiency, portability, maintainability, compatibility, security, and usability. The test results indicate that this application performs well in all these aspects. …”
Get full text
Article -
3419
Regulatory challenges in ai-based diagnostics: Legal implications of ai use in medical diagnostics
Published 2025-01-01“…The research results indicated that algorithmic bias, data security, and the requirement for stringent rules to guarantee the ethical and safe application of AI are the primary obstacles. …”
Get full text
Article -
3420
Flexibility in Power Systems of Integrating Variable Renewable Energy Sources
Published 2023-03-01“…The issue of energy security is addressed in many publications and by specialists in many fields. …”
Get full text
Article