Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3961
Identifying key influencing factors of cross-regional railway infrastructure interconnection: a fuzzy integrated MCDM framework
Published 2025-02-01“…The results revealed that policy and institutional innovation, incentives and investment ecology, efficient implementation and coordination mechanisms, and supply chain and technology security capacity are four crucial challenges for CRII. …”
Get full text
Article -
3962
-
3963
Lithium inventory estimation of battery using incremental capacity analysis, support vector machine, particle swarm optimisation
Published 2024-12-01“…Abstract In order to guarantee the durability and security of electric vehicles (EV), the ageing estimation of lithium‐ion batteries (LIBs) is of great practical significance. …”
Get full text
Article -
3964
Mineral Composition of Lentils: Physiological Functions, Antinutritional Effects, and Bioavailability Enhancement
Published 2021-01-01“…Thus, lentils play a major role in food security, particularly among low-income countries. …”
Get full text
Article -
3965
Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm
Published 2021-01-01“…The 3DES encryption algorithm achieves one encryption process at a time to some extent, can effectively resist exhaustive search attacks, and enhance the security of the DES algorithm.…”
Get full text
Article -
3966
The concept of civil law incentives
Published 2024-12-01“…This is especially evident in contractual relations of obligation. The regulatory (security) function of civil law incentives is associated with the legal formalisation of achieving, first and foremost, private interests. …”
Get full text
Article -
3967
Principles of Preventive Police Activity: Concepts, Content and Their Classification
Published 2019-09-01“…The principles of preventive activities, depending on the method of their regulatory consolidation, are classified into: 1) general legal principles that determine the principles of formation and implementation of state policy in the field of national security; 2) basic principles that characterize the purposefulness, content and limits of police activity and are enshrined in the provisions of the Law of Ukraine “On the National Police”; 3) special principles that characterize the specificity of preventive police activity. …”
Get full text
Article -
3968
Comprehensive dataset from high resolution UAV land cover mapping of diverse natural environments in Serbia
Published 2025-01-01“…Abstract This study highlights the vital role of high-resolution (HR), open-source land cover maps for food security, land use planning, and environmental protection. …”
Get full text
Article -
3969
The “Nixon China Shock” in the Mirror of Japanese Domestic Politics
Published 2019-12-01“…Nixon about the recent trip of his National Security Advisor H. Kissinger to the PRC and about the President’s upcoming visit there) became one of the pivotal points in the history of Japanese foreign policy and contributed to Tokyo becoming more independent from Washington in its diplomatic course. …”
Get full text
Article -
3970
Research on Gait Recognition Based on GaitSet and Multimodal Fusion
Published 2025-01-01“…., health monitoring), security (e.g., assisted identity verification), and human-computer interaction. …”
Get full text
Article -
3971
Challenges and opportunities of artificial intelligence in African health space
Published 2025-01-01“…Ethical guidelines are needed to ensure AI decisions align with medical standards and patient autonomy. Strict privacy and security controls are crucial to protecting sensitive health data. …”
Get full text
Article -
3972
Qualitative meta-analysis of researches related to hydropolitical relations between Iran and Iraq
Published 2025-06-01“…Water is a strategic and scarce resource that has become increasingly limited in recent years due to a variety of national and transnational factors, significantly impacting security, stability, development, and prosperity in various countries. …”
Get full text
Article -
3973
Improvement of Specific Multi-target Tracking Algorithm in Cross-domain Environment
Published 2025-01-01“…[Purposes] Multi-target tracking in the cross-domain environment of surveillance video is a very important and challenging task in intelligent security. The difficulties of this task lie in the frequent occlusion between the objects in video frame, the unknown start and end time of the trajectory, the too small sized targets, the interactions between the objects, the apparent similarity, and the camera angle changes. …”
Get full text
Article -
3974
Identifying barriers in the field of electronic payments based on blockchain technology: A multi-criteria decision-making approach
Published 2024-08-01“…Some of these obstacles include technical, technological, organizational, financial and security problems. To identify and prioritize these obstacles and solve them, multi-criteria decision-making methods can be useful.In this research, in order to identify and rank the factors of obstacles related to electronic payments based on blockchain technology, the Delphi method has been used. …”
Get full text
Article -
3975
Assessment of Production and Utilization Practices of Orange-Fleshed Sweet Potatoes (Ipomoea Batatas L.) in Sidama Region, Ethiopia
Published 2022-01-01“…Sweet potato (Ipomoea batatas L.) is an important crop which ensures food security in developing countries. It can be harvested at any stage as needed, thereby providing a flexible source of food and income for rural families that are most vulnerable to crop failures and cash income fluctuations. …”
Get full text
Article -
3976
RISK OF INTRODUCING HIGHLY DANGEROUS ANIMAL VESICULAR DISEASES INTO THE RUSSIAN FEDERATION
Published 2019-04-01“…Violations of foreign trade regulations pose a direct threat to the epidemic situation and economic security of Russia. There is a possibility of the introduction of vesicular agents with animal feed imports into the country since some viruses can potentially survive for a long time in some ingredients. …”
Get full text
Article -
3977
Mathematical Modeling and Optimal Control Strategy for a Discrete Time Drug Consumption Model
Published 2020-01-01“…We use four control strategies which are awareness programs through media and education, preventing contact through security campaigns, treatment, and psychological support along with follow-up. …”
Get full text
Article -
3978
Transformation of business under the influence of artificial intelligence
Published 2024-01-01“…Research results of Forbes Advisor (2023) indicate that the most common use of AI is in Customer Service, Cyber Security, Digital Personal Assistants, Customer Relationship Management (CRM), etc. …”
Get full text
Article -
3979
Advanced Deep Learning Algorithms for Energy Optimization of Smart Cities
Published 2025-01-01“…Federated learning ensures privacy-preserving data sharing in distributed energy systems, promoting collaboration without compromising security. These technologies are driving the transformation towards sustainable and energy-efficient urban environments, meeting the growing demands of modern smart cities. …”
Get full text
Article -
3980
Perspectives of high-risk pregnant women on home care program in high-risk pregnancies: A multicenter, qualitative study
Published 2025-01-01“…The themes and categories were “high-risk pregnancy and related issues (pursuing treatment and paying attention to the high-risk situation by pregnant women, psychological aspect of high-risk pregnancy on pregnant women and caregivers, emotional and physical aspects of high-risk pregnancy, the consequences of high-risk pregnancy on the people around them and empowerment of high-risk pregnant women)”, “support dimension (family and community support for high-risk pregnant women)”, and “framework of program (acculturalization, means and equipment, security, manpower and the necessary arrangements for the home care)”. …”
Get full text
Article