Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4001
Did the COVID-19 quarantine policies applied in Cochabamba, Bolivia mitigated cases successfully? an interrupted time series analysis
Published 2024-12-01“…Results The public sector reported the larger percentage of tests (65%), followed by the private sector (23%) with almost double as many tests as the public-social security sector (11%). In the time series analysis, a correlation between the implementation of quarantine policies and a decrease in the slope of positive rates of COVID-19 cases was observed compared to periods without or with reduced quarantine policies. …”
Get full text
Article -
4002
Hard and soft climate-smart investments in aquaculture in Bangladesh: Conditioning factors and decision space
Published 2025-01-01“…This absence of accessible climate information services and the capacity to invest in climate smart equipment that makes the information actionable, hinder the transition to climate smart aquaculture by smallholder farmers and hence threaten their livelihood and nutritional security.…”
Get full text
Article -
4003
Enhancing User Differentiation in the Electronic Personal Synthesis Behavior (EPSBV01) Algorithm by Adopting the Time Series Analysis
Published 2025-02-01“…The progress of contemporary technology has rendered information systems essential in our everyday existence, underscoring the crucial necessity to safeguard information security and privacy. In password authentication, the Electronic Personal Synthesis Behaviour (EPSB) heightens the accuracy of authorizing an authenticated user based on three parameters: EPSBERROR, EPSBTime, and EPSBStyle. …”
Get full text
Article -
4004
A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods
Published 2014-01-01“…Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud. …”
Get full text
Article -
4005
Lethal intimate partner violence and gendered dimensions of the COVID-19 lockdown in Nigeria: evidence from a descriptive analysis of secondary data
Published 2024-04-01“…This research aims to shed light on the impact of the pandemic lockdown on IPV-related mortalities.Methods The study used secondary data from the Nigeria Watch database, an online resource on lethal violence and human security in Nigeria. It relied on IPV datasets extracted and analysed descriptively at the univariate level.Results Results indicate a steady increase in IPV-related mortalities, with 205 fatalities—62 in 2019, 69 in 2020 and 74 in 2021—resulting from 180 IPV incidents. …”
Get full text
Article -
4006
Face morphing attacks and face image quality: The effect of morphing and the unsupervised attack detection by quality
Published 2022-09-01“…This operation, therefore, poses serious security issues related to the ability of a travel or identity document to be verified to belong to multiple persons. …”
Get full text
Article -
4007
Development of the national cybersecurity system of Ukraine as a necessary element of information society development
Published 2021-12-01“…Attention is drawn to the unconditional fulfillment of the tasks of the new Cyber Security Strategy of Ukraine, especially those related to cyber protection of critical infrastructure. …”
Get full text
Article -
4008
A framework to evaluate public green spaces with an emphasis on recreational values for sustainable urban and rural areas: A systematic review and content analysis
Published 2025-01-01“…Employing a systematic review of 130 publications sourced from Web of Science, Scopus, and Google Scholar and ensuing content analysis, we identified and elaborated on 14 distinct qualities, including accessibility, connectedness, responsiveness, variety of activity, social interactions, facilities, safety and security, spaciousness, biodiversity, perceptual value, aesthetic value, and symbolic value. …”
Get full text
Article -
4009
-
4010
Features of democratic reforms in Jordan
Published 2013-04-01“…In seeking to preserve the existing status quo Jordanian authorities would deliberately put the country in a state of dependency on the political interests of the U.S. and Saudi Arabia, in return for all kinds of preferences, including military aid if a threat to the security of the Kingdom is expected.…”
Get full text
Article -
4011
Maturity of Employment Data Interoperability in supporting One Employment Data at the Ministry and Regional Government Level
Published 2023-12-01“…Ethos (27.00%) by carrying out the revitalization of One Employment Data's network and data security devices and hashtags in the data interoperability process which indicates that information related to work, training and the labor market can be better integrated for analysis and decision making purposes which is more effective.…”
Get full text
Article -
4012
Development of methodology of accounting and control processes in the digital economy
Published 2020-04-01“…A technology for the formation of information-security mission of accounting and control processes in the digital conomy and the changed requirements for the formation of information for management decisions, combining in a single information-digital “shell” accounting, control, analytical and other iterations, which should contribute to a better compilation of different reporting formats, has been presented. …”
Get full text
Article -
4013
Power Prioritization and Load Shedding in an Island with RESs Using ABC Algorithm
Published 2020-01-01“…In instances where power demand exceeds generation within islanded microgrid or due to an occurrence of a contingency, optimum load shedding should be put in place so as to enhance system security and stability of the power system. Load shedding is traditionally done based on undervoltage measurements or underfrequency measurements of a given section of the grid. …”
Get full text
Article -
4014
-
4015
Evaluation of Emergency Assembly Areas with the AHP Method from the Perspective of Occupational Safety Experts
Published 2023-01-01“…Accordingly, as a result of the comparison made between the criteria, the criterion with the highest weight was 0.4294 assembly area security, followed by 0.3602 assembly area access and 0.2104 assembly area characteristics, respectively…”
Get full text
Article -
4016
From fitness trackers to medical devices: wearable technologies
Published 2023-06-01“…As wearable technology is being proposed for critical applications, it must be vetted for its reliability and security properties. Applications based on Wireless Sensor Networks (WSN) for Internet of Things (IoTs) scenarios are rising. …”
Get full text
Article -
4017
How does agricultural insurance influence grain production scale? An income-mediated perspective
Published 2025-01-01“…This study applies the von Neumann-Morgenstern expected utility model, coupled with theories on economies of scale, technology diffusion, and rational choice, to examine the theoretical links between agricultural insurance, farmers’ income, and grain production scale.ResultsUsing panel data from 27 Chinese provinces between 2011 and 2021, analyzed through fixed-effects and mediation models, the study finds that agricultural insurance positively, albeit moderately, impacts the scale of grain production, with farmers’ income serving as a partial mediating factor.DiscussionBased on these findings, we recommend expanding agricultural insurance coverage, developing a multi-level insurance framework, and enhancing insurance protection levels to bolster sustainable agricultural development and food security in China.…”
Get full text
Article -
4018
Efficacy Perceived by Patients of Post-infarction Cardiovascular Rehabilitation Strategies
Published 2024-01-01“…The study population was made up of 90 patients who participated in post-infarction cardiac rehabilitation programs implemented in the medical facilities of the Ecuadorian Institute of Social Security in the Sierra region of Ecuador. The technique for data collection was the survey. …”
Get full text
Article -
4019
Elevated few-shot network intrusion detection via self-attention mechanisms and iterative refinement.
Published 2025-01-01“…The network intrusion detection system (NIDS) plays a critical role in maintaining network security. However, traditional NIDS relies on a large volume of samples for training, which exhibits insufficient adaptability in rapidly changing network environments and complex attack methods, especially when facing novel and rare attacks. …”
Get full text
Article -
4020
Enhancing Maternal Caregiving Capabilities Model to Prevent Childhood Stunting: A UNICEF-Inspired Model
Published 2024-01-01“…Household factors, including economic level and food security, were also important. High maternal caregiving capabilities were expected to enable mothers to improve their behavior to prevent childhood stunting (6–23 months).…”
Get full text
Article