Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4061
-
4062
The Management of Social Phobia Ýn Residual-Type Schizophrenia with Cognitive Behavioral Therapy
Published 2015-04-01“…To this end, firstly coping mechanisms are examined through the identification of avoidance and security providers, and then, the patient’s automatic thoughts and false beliefs are discussed depending on the cognitive perspective. …”
Get full text
Article -
4063
Strategic Partnership between India and the United States: Examining Driving and Restraining Forces
Published 2023-07-01“…Conversely, factors stimulating the growth of the strategic partnership encompass India's robust economic growth, its potential role as a counterbalance to China's expanding influence in Asia, shared interests in maintaining peace and stability in the Indo-Pacific region, mutual concerns about regional security, recent progress in nuclear policy agreements, and expanding avenues for cooperation in diverse domains. …”
Get full text
Article -
4064
The U.S.-Turkey ‘Model Partnership’: Testing the Limits (2009–2010)
Published 2020-11-01“…The conclusion is drawn that a further escalation of tensions was prevented mainly because security factor played a predominant role. The U.S.…”
Get full text
Article -
4065
E-Commerce Fraud Detection Based on Machine Learning Techniques: Systematic Literature Review
Published 2024-06-01“…To establish a healthy e-commerce ecosystem, robust cyber security and anti-fraud measures are crucial. However, research on fraud detection systems has struggled to keep pace due to limited real-world datasets. …”
Get full text
Article -
4066
LKM: A LDA-Based -Means Clustering Algorithm for Data Analysis of Intrusion Detection in Mobile Sensor Networks
Published 2015-10-01“…Intrusion detection system (IDS) is a kind of active network security technology to protect network from attacks. …”
Get full text
Article -
4067
Changes in Antioxidant and Photosynthetic Capacity in Rice Under Different Substrates
Published 2025-01-01“…Against the backdrop of a changing global climate, the soil environment may undergo significant changes, directly affecting agricultural productivity and exacerbating global food security issues. Three different substrates were set up in this study, namely, S (high sand and low nutrient content), T (medium sand and medium nutrient content), and TT (low sand and high nutrient content). …”
Get full text
Article -
4068
Machine Learning-Based Offloading Strategy for Lightweight User Mobile Edge Computing Tasks
Published 2021-01-01“…The anomaly detection method based on a decision tree combined with deep learning proposed in this paper, unlike traditional IoT attack detection methods, overcomes the drawbacks of rule-based security detection methods and enables them to adapt to both established and unknown hostile environments. …”
Get full text
Article -
4069
Invisible Scout: A Layer 2 Anomaly System for Detecting Rogue Access Point (RAP)
Published 2025-02-01“…Rogue Access Points (RAPs) pose a significant security threat by mimicking legitimate Wi-Fi networks and potentially compromising sensitive data. …”
Get full text
Article -
4070
Opportunities to use the EU countries experience in the field of preventive police activities in Ukraine
Published 2021-12-01“…Focusing on the European experience of preventive activity, the author emphasizes that there are three models of internal security in the European Union, and then reveals the content of each model. …”
Get full text
Article -
4071
Analysis of the influence factors of cultivated land transfer in Guangdong coastal important agricultural areas based on geodetectors
Published 2025-02-01“…IntroductionsAs a key link in the development of modern agriculture, the transfer of arable land is regarded as a strategic measure to improve agricultural production efficiency and ensure national food security. Although the transfer of arable land has been widely implemented nationwide, its specific impact on agricultural production and farmers’ income varies in different regions. …”
Get full text
Article -
4072
Climate change-driven shifts in the global distribution of tomato and potato crops and their associated bacterial pathogens
Published 2025-01-01“…Future efforts should focus on vulnerable areas to prevent significant economic losses and ensure food security.…”
Get full text
Article -
4073
Strategies for Mainstreaming Edible Cities with Focus on the City of Lincoln: A Critical Cross-Case Study Analysis of Community Growing Groups in the UK
Published 2025-01-01“…This paper examines the role of edible city (EC) initiatives in addressing these challenges by enhancing food security, fostering social resilience and supporting community wellbeing. …”
Get full text
Article -
4074
Habenaria trichosantha Lindl.: A newly recorded orchid from China
Published 2024-12-01Get full text
Article -
4075
Folie a Deux: Shared Psychotic Disorder in a Medical Unit
Published 2021-01-01“…The patient was seen making statements that she needed security and the FBI to escort her as she left the hospital. …”
Get full text
Article -
4076
Research and Implementation of SVDU Simulator Based on Emulation Technology
Published 2021-01-01“…With the development of multiple engineering application requirements, such as configuration verification and operator training, this stimulator has been applied in several virtual security level DCS projects.…”
Get full text
Article -
4077
Dimensions of Poverty and the Internal Relationship of Its Components with an Interpretive Structural Approach in the Imam Khomeini Relief Committee of Tabriz Metropolis
Published 2024-09-01“…These 14 factors are important in order of importance: 1- Economic; 2- Social; 3- Individual; 4- Legal; 5- Family; 6; Environment; 7; Political; 8; Management; 9; Cultural; 10- Overseas; 11. Security; 12. Scientific; 13. Organizational; 14. Geographical. …”
Get full text
Article -
4078
Comparison of breastfeeding self-efficacy between exclusive and non-exclusive breastfeeding in postpartum women
Published 2024-08-01“…Methods: This descriptive comparative study was conducted on 228 women hospitalized in the Social Security Hospital of Zahedan who had given birth 24 hours earlier. …”
Get full text
Article -
4079
Future Studies of Tourism Development Planning (Case study: Ardabil province)
Published 2021-12-01“…In the second step, using the Micmac method, 14 key Factors, including the comprehensive tourism plan, the media, stimulus policies, macro policies of the state, distribution of facilities, infrastructure, recreational centers, increased private incentive to invest in the region, the region's susceptibility to Investment in tourism, planning, security facilities, budget, the existence of hot and mineral water springs, improvement of information systems, such as site and blog, have been identified as key to the development of Ardebil province. …”
Get full text
Article -
4080
Enhanced testing can substantially improve defense against several types of respiratory virus pandemic
Published 2025-03-01Get full text
Article