Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3581
Identification of Ecological Priority Areas Based on Nested-Scale Analysis: A Case Study of Metropolitan Nanjing, China
Published 2024-12-01“…Rapid urbanization has led to severe fragmentation of ecological spaces in high-density metropolitan regions, threatening urban ecological security and environmental well-being. While cities explore various restoration strategies, the systematic identification of ecological priority areas remains an urgent challenge, particularly due to the limitations of multi-scale evaluation methods. …”
Get full text
Article -
3582
Morphological, Morphometric, and Distribution Pattern Characteristics of Optimal Harvest Phase Sago in Forest Area Based on Drone Imagery
Published 2024-12-01“…On the other hand, Sago is one of the food crops that is considered to have the potential for development to improve the community's economy and increase global food security. The main objective of this study is to extract the morphological characteristics, morphometry, and distribution patterns of sago in the optimal harvest phase in non-cultivated areas. …”
Get full text
Article -
3583
A Multistory Building Evacuation Model Based on Multiple-Factor Analysis
Published 2019-01-01“…Emergency evacuation is an important issue in public security. To make a considerate plan, various situations are presented including blocking the accident area and letting the emergency access path available. …”
Get full text
Article -
3584
Optimizing Credit Card Fraud Detection: A Genetic Algorithm Approach with Multiple Feature Selection Methods
Published 2024-12-01“…To protect our financial security, it is crucial to develop robust and accurate fraud detection systems that stay one step ahead of the fraudsters. …”
Get full text
Article -
3585
Money Laundering Practices and Singapore’s Steps Against Indonesian Tax Amnesty
Published 2025-01-01“…The implementation of those policies is classified as a two-pronged sword because it also ensures the privacy and security of corrupt money investments from other countries. …”
Get full text
Article -
3586
A Torus-Chaotic System and Its Pseudorandom Properties
Published 2020-01-01“…Furthermore, the pseudorandom properties of output sequence are well studied and a random number generator algorithm is proposed, which has the potential of being used in several cyber security systems such as the verification code, secure QR code, and some secure communication protocols.…”
Get full text
Article -
3587
INTERNET INFLUENCE ON INTERNATIONAL POLITICS
Published 2013-08-01“…New forms of international conflicts, including information war, network wars, hacker attacks etc. are one of the negative results of the fast internet and information technologies development.At the same time development of information technology poses new challenges to international and national security, which can only be reduced through collective efforts of the international community.…”
Get full text
Article -
3588
Multidimensional factors contributing to the dynamics of ethnic conflict in Ethiopia
Published 2025-12-01Get full text
Article -
3589
The role of information skewness in shaping extremist content: A look at four extremists
Published 2023-06-01“…It is hoped that the findings of this research will inform future enquiries into the role of information and its properties in shaping extremist content and help security agencies to effectively engage in information warfare with extremists. …”
Get full text
Article -
3590
Study on the Nonlinear Damage Creep Model of the Weak Interlayer
Published 2022-01-01Get full text
Article -
3591
Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game
Published 2016-01-01“…Security in mobile ad hoc networks (MANETs) is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. …”
Get full text
Article -
3592
From Maximization to Optimization: A Paradigm Shift in Rice Production in Thailand to Improve Overall Quality of Life of Stakeholders
Published 2014-01-01“…The system has resulted in good health conditions for the farmers and villagers, financial security, availability of extra time, and additional opportunities and freedom and hence in the improvement of their overall quality of life. …”
Get full text
Article -
3593
Employer Branding and Brand Building in the Aviation Industry
Published 2025-01-01“…To build customer loyalty, airlines should focus on meeting diverse needs based on travel types, offering memorable experiences, and ensuring website security. By strengthening their brand, companies can enhance their attractiveness to job seekers, boost employee and customer satisfaction and loyalty, and improve overall business performance.…”
Get full text
Article -
3594
Optimal Design of One-Sided Exponential Adaptive EWMA Scheme Based on Median Run Length
Published 2024-12-01Get full text
Article -
3595
Forearm multimodal recognition based on IAHP‐entropy weight combination
Published 2023-01-01“…Abstract Biometrics are the among most popular authentication methods due to their advantages over traditional methods, such as higher security, better accuracy and more convenience. The recent COVID‐19 pandemic has led to the wide use of face masks, which greatly affects the traditional face recognition technology. …”
Get full text
Article -
3596
-
3597
Monitoring Heart Disease and Diabetes with Mobile Internet Communications
Published 2012-01-01“…As an extra layer of security in the data transmission, information embedded in the data is used in its verification. …”
Get full text
Article -
3598
Does Turkey have a Central Asian Project?
Published 2021-06-01“…However, it has limited influence on regional security and military affairs, which Russia dominates. …”
Get full text
Article -
3599
Dual Citizenship in Germany and what it Means for World Politics
Published 2015-04-01“…In these circumstances further changes are possible in integration processes, the relations between EU and its key partners and equally in international security architecture. The analysis is preceded by a short historical overview of Turkish diaspora formation in Germany and German vision of a national community that inevitably determines the State citizenship policies.…”
Get full text
Article -
3600
Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method
Published 2015-01-01“…Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. …”
Get full text
Article