Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3741
An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud
Published 2020-02-01“…To increase the scalability of the proposed algorithm, we discussed the issues of multi-authorization, user revocation, and 1 − n multiple access tree. Security analysis shows that enhanced media ciphertext-policy attribute-based encryption can successfully resist chosen-plaintext attacks under the decisional bilinear Diffie–Hellman assumption. …”
Get full text
Article -
3742
-
3743
Oil palm-cattle integration: Farmer perception of Ganoderma infection
Published 2025-01-01“…The findings indicated that although farmers perceive several potential benefits from integrating cattle into oil palm plantations, they also confront challenges concerning security, finance, knowledge, feed availability, and disease in the cattle. …”
Get full text
Article -
3744
PROFILES AND PREFERENCES OF ON-LINE MILLENIAL SHOPPERS IN BULGARIA
Published 2014-05-01“…Like other regions of the world, concern about financial transactions security is a major barrier limiting the willingness to shop on-line in Bulgaria. …”
Get full text
Article -
3745
The Effect of Agglomeration Strategy on Rural Resilience from the Perspective of Homestay Tourism Operators
Published 2023-07-01Get full text
Article -
3746
The application of grey statistical method and analytic hierarchy process in the evaluation of community park rehabilitation landscapes
Published 2025-02-01“…The results are as follows: (1) Out of the 30 indicator factors, 13 were not selected through the GST method. (2) The weights of the criteria layer, from highest to lowest, are as follows: physical rehabilitation (D1) with a weight of 0.6370, psychological rehabilitation (D2) with a weight of 0.2583, and spiritual rehabilitation (D3) with a weight of 0.1047. (3) The highest and lowest values in the indicator layer are as follows: D1 (P14: illumination duration 0.2359, P17: hydrological conditions 0.0197); D2 (P21: sense of security 0.1433, P23: human-environment interaction 0.0162); D3 (P34: sense of pleasure 0.0400, P36: aesthetic value 0.0045). …”
Get full text
Article -
3747
South Africa: A Growing Embrace of Feminist Foreign Policy?
Published 2023-02-01“…A more nuanced foreign policy focus on improving the status of women and gender equality emerged partly due to international developments regarding women, peace, and security. Hence, the contribution explores feminist and/or gendered aspects of South Africa’s foreign policy of ubuntu (human-ness and humanity) and diplomatic practice, and the implications thereof. …”
Get full text
Article -
3748
The voice of people’s perspective on the future of health resilience post pandemic hits: A numerically scaled survey in 19 provinces in Indonesia
Published 2025-01-01“…The purpose of this study is to investigate the perspective of Indonesians regarding previous pandemics that have impacted the country’s health security. This study was conducted using a cross-sectional design. …”
Get full text
Article -
3749
IoT-Based Real-Time Crop Drying and Storage Monitoring System
Published 2023-01-01“…This mostly affects the quality of maize and flour being produced which will finally affect food security. In this research, temperature, humidity, and light sensors are deployed in the grain storage containers for environmental parameter detection purposes to achieve the primary goal of providing practical, secure, and easily accessible storage in inclement weather. …”
Get full text
Article -
3750
Islamic Tourism in Africa
Published 2022-03-01“…The main problems for the development of Islamic tourism in Africa have also been identified: underdeveloped tourist and Halal infrastructure, lack of security, and poor promotion of tourist services among potential tourists are among the most significant ones. …”
Get full text
Article -
3751
On a New Sustainable Energy Policy: Exploring a Macro-Meso-Micro Synthesis
Published 2025-01-01“…Traditional concerns, such as energy security, self-sufficiency, and market liberalization, are increasingly giving way to a focus on rapid, sustainable energy transitions and development at the macrolevel. …”
Get full text
Article -
3752
Cuando negocian los rebeldes colombianos: indicadores estratégicos del acuerdo de paz con las FARC*
Published 2023-01-01“…La respuesta a este interrogante está ligada al concepto de punto de inflexión, que es el momento crucial en el que los acontecimientos giran hacia su resultado final. National Security Research Division (RAND) ha determinado indicadores comunes a los puntos de inflexión de ochenta y nueve conflictos contrainsurgentes, con el fin de promover e identificar la llegada de esta fase final del conflicto. …”
Get full text
Article -
3753
Explainable Artificial Intelligence (XAI) to Enhance Trust Management in Intrusion Detection Systems Using Decision Tree Model
Published 2021-01-01“…Despite the growing popularity of machine learning models in the cyber-security applications (e.g., an intrusion detection system (IDS)), most of these models are perceived as a black-box. …”
Get full text
Article -
3754
Constructing Multiple-Objective Portfolio Selection for Green Innovation and Dominating Green Innovation Indexes
Published 2022-01-01“…However, Nobel Laureate Markowitz emphasizes portfolio selection instead of security selection and accentuates that “A good portfolio is more than a long list of good stocks.” …”
Get full text
Article -
3755
Industry 4.0: digital twins characteristics, applications, and challenges in-built environments
Published 2025-12-01“…Despite these potential benefits, several challenges prevent the widespread adoption of DT technology such as data security and ownership concerns, the lack of common data standards and interoperability, and difficulties in managing diverse source systems.…”
Get full text
Article -
3756
BEHAVIOUR AMONG FEMALE MIGRANTS IN MAKURDI, BENUE STATE
Published 2023-06-01“…This paper advocates the need to mitigate incidence of risky sexual behavior and provide policies that will ensure human security and economic empowerment …”
Get full text
Article -
3757
Determining the factors affecting the happiness levels of divorced individuals by ordered logistics regression analysis
Published 2022-12-01“…It has been determined that divorced individuals are registered with the Social Security Institution and their happiness levels are higher than those who are not registered.…”
Get full text
Article -
3758
Real-Time Optimization of RISC-V Processors Based on Branch Prediction and Division Data Dependency
Published 2025-01-01“…Whether a processor can meet the real-time requirements of a system is a crucial factor affecting the security of real-time systems. Currently, the methods for evaluating hardware real-time performance and the quality of real-time performance are not comprehensive. …”
Get full text
Article -
3759
Portable solutions for plant pathogen diagnostics: development, usage, and future potential
Published 2025-01-01“…The increasing prevalence of plant pathogens presents a critical challenge to global food security and agricultural sustainability. While accurate, traditional diagnostic methods are often time-consuming, resource-intensive, and unsuitable for real-time field applications. …”
Get full text
Article -
3760
Cloud-Based Software Development Lifecycle: A Simplified Algorithm for Cloud Service Provider Evaluation with Metric Analysis
Published 2023-06-01“…All cloud vendors are not the same in terms of the number of services, infrastructure availability, security strategies, cost per customer, and reputation in the market. …”
Get full text
Article