Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4121
AFD and chaotic map‐based integrated approach for ECG compression, steganography and encryption in E‐healthcare paradigm
Published 2021-07-01“…Later, chaotic map‐based steganography and encryption are proposed on the AFD coefficients to secure the confidential information and the signal itself. …”
Get full text
Article -
4122
-
4123
Challenges of environmental and climate change: response of Global South (BRICS) countries
Published 2024-12-01“…Strict measures such as planting trees, prohibiting the chopping down of trees and clearing jungles, prohibiting the demolition of mountains, creating space for playgrounds, addressing issues with air and water pollution, and addressing noise pollution are necessary to ensure the security of the future, are required to take. As with the growth and development due to urbanization, pollution of various kinds has reached great heights and coping with these challenges has become difficult for every living being, that is, both plants and animal kingdom. …”
Get full text
Article -
4124
The target of a crime under the Article 330 of the Criminal Code of Ukraine
Published 2018-12-01“…They are as follows: 1) this information is obtained by authorized subjects in specific areas of social activity – within operative and search, counterintelligence operations, in the defense field of the country; 2) such information has limited access; 3) its disclosure may harm the public interest in the field of counteracting crime or within intelligence activities to the detriment of the state security of Ukraine and the country’s defense capabilities; 4) the assignment of information to such that constitutes official information, is carried out by the state authorities, which conduct operative and search or counterintelligence operations, as well as state agencies, local self-government agencies, enterprises, institutions and organizations in the defense field of the country; it is approved by their regulatory act; 5) documents or other material carriers containing official information are assigned the stamp “For official use”. …”
Get full text
Article -
4125
WGAN-DL-IDS: An Efficient Framework for Intrusion Detection System Using WGAN, Random Forest, and Deep Learning Approaches
Published 2024-12-01“…The rise in cyber security issues has caused significant harm to tech world and thus society in recent years. …”
Get full text
Article -
4126
A Solar Photovoltaic Performance and Financial Modeling Solution for Grid-Connected Homes in Zambia
Published 2021-01-01“…This study conducts a solar photovoltaic performance and financial analysis for grid-connected homes in Zambia to investigate the role of solar energy as an enabler for energy security in Zambia using the National Renewable Energy Laboratory (NREL) System Advisor Model (SAM) simulation method. …”
Get full text
Article -
4127
Multivariate analysis of long-term climate data in connection with yield, earliness and the problem of global warming
Published 2024-04-01“…Plant breeding can play a key role in solving food security problems connected with climate changes. Possible measures to adapt plant industry to the ongoing and expected climate changes are discussed. …”
Get full text
Article -
4128
CHANGING ASPECTS OF BAMBARA GROUNDNUT EXPLOITATION: 1. LIMITATIONS AND ALLEYWAYS FOR FUTURE EXPANSION
Published 2024-05-01“…Bambara groundnut is an under-exploited legume that has the potential to contribute enormously to food security. It can be used to increase the fertility of the soil leading to high yields of other crops during mixed cropping. …”
Get full text
Article -
4129
Cloud-Based License Plate Recognition: A Comparative Approach Using You Only Look Once Versions 5, 7, 8, and 9 Object Detection
Published 2025-01-01“…Cloud-based license plate recognition (LPR) systems have emerged as essential tools in modern traffic management and security applications. Determining the best approach remains paramount in the field of computer vision. …”
Get full text
Article -
4130
Geriatric Syndromes and Abandonment
Published 2023-12-01“…<br /><strong>Methods:</strong> a cross-sectional, descriptive, analytical and correlational study was carried out in the Family Medicine Unit No. 33 of the Mexican Social Security Institute of Tabasco. The sample was made up of 203 patients aged 60 and over, who attended Family Medicine and Continuing Medical Care consultations. …”
Get full text
Article -
4131
Surrogate Safety Analysis of Pedestrian-Vehicle Conflict at Intersections Using Unmanned Aerial Vehicle Videos
Published 2017-01-01“…However, it suffers from heavy labor work, high cost of maintenance, and even security restrictions. Data collection and processing remains a common challenge to traffic conflict analysis. …”
Get full text
Article -
4132
Chaotic Puma Optimizer Algorithm for controlling wheeled mobile robots
Published 2025-03-01“…The control of wheeled mobile robots plays a crucial role in many fields, including automation, logistics, security, and even space exploration. This paper presents a significant improvement in the control of wheeled mobile robots based on an enhanced version of the Puma optimization algorithm by integrating chaotic maps in both optimization phases, exploration and exploitation. …”
Get full text
Article -
4133
Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications
Published 2024-11-01Get full text
Article -
4134
Managing online crisis-communication response in a South African bank
Published 2022-10-01“…However, very little research has examined the management of online crisis-communication response messages in the online-security sphere. The knowledge management paradigm constitutes a way in which the acquisition, transfer and assimilation of information can be effectively used to manage and control messages in an online crisiscommunication response situation, in particular through maximising consumers’ motivation and capability to act in response to perceived online-transaction risks. …”
Get full text
Article -
4135
A Comprehensive Exploration of 6G Wireless Communication Technologies
Published 2025-01-01“…This paper not only lays out a comprehensive 6G vision accentuated by high security, affordability, and intelligence but also charts the course for addressing the pivotal challenges of spectrum efficiency, energy consumption, and the seamless integration of emerging technologies. …”
Get full text
Article -
4136
Yorùbá Literary Artists on Youths and Parenthood
Published 2022-01-01“…The natural psycho-biological development of youths and young adults, living in a nation going through socio-political economic and security challenges, coupled with their being nurtured in some cases through faulty parenting, have manifested in the typology of Nigerian youths. …”
Get full text
Article -
4137
Evaluation of the effect of physical-environmental factors of public spaces on the mental health of citizens (Case study: Ardabil city)
Published 2020-12-01“…The results of this study showed that legibility and visual quality, access to urban green space, security of urban space, quality of urban furniture, mixing and variety of uses have a positive and significant effect on the mental health of citizens. …”
Get full text
Article -
4138
Problems of proving in criminal proceedings based on violations of war laws and customs
Published 2022-06-01“…It is proposed to establish operational cooperation between investigators and the Security Service of Ukraine, to develop a unified methodology for investigating crimes related to violations of the laws and customs of war. …”
Get full text
Article -
4139
-
4140
The icon of Ukrainian Nazis: on the question of the historical assessment of the «heroes» under the Protection of the Virgin Mary and their modern admirers
Published 2024-05-01“…In addition to the image itself, which became the reason for writing this article, the source for the study is the forensic investigative documentation of the Soviet state security agencies, during and after the end of the Great Patriotic War, interrogating captured employees of the German special services, Ukrainian nationalists and witnesses to their war crimes. …”
Get full text
Article