Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4181
Nurses’ health and work experiences during the COVID-19 pandemic in Swedish prehospital and hospital care: a deductive content analysis through the lens of the swAge model
Published 2025-01-01“…Abstract Working as a nurse offers job security but also poses risks for mental health issues. …”
Get full text
Article -
4182
CHALLENGES OF LOCALIZATION OF THE POLICY FRAMEWORK AND NATIONAL ACTION PLAN FOR PREVENTING VIOLENT EXTREMISM IN PLATEAU STATE, NIGERIA
Published 2023-12-01“…These threats have gravely undermined economic development, social progress, political stability, national and human security, and peaceful coexistence in the country. …”
Get full text
Article -
4183
Formal Verification of ERC-Based Smart Contracts: A Systematic Literature Review
Published 2025-01-01“…Despite the trusted implementations that smart contracts offer, including those based on standards, different security problems and vulnerabilities arise during their development and execution. …”
Get full text
Article -
4184
Analysis of Techno–Economic and Social Impacts of Electric Vehicle Charging Ecosystem in the Distribution Network Integrated with Solar DG and DSTATCOM
Published 2025-01-01“…The study aims to maximize the technical, financial, and social benefits while ensuring that all security constraints are met. To assess the financial viability of the proposed model over a 10-year horizon, a detailed economic analysis comprising installation cost, operation, and maintenance cost is conducted. …”
Get full text
Article -
4185
Improved insulator location and defect detection method based on GhostNet and YOLOv5s networks
Published 2024-09-01“…Outdoor, real-time, and accurate detection of insulator defect locations can effectively avoid the occurrence of power grid security accidents. This paper proposes an improved GhostNet-YOLOv5s algorithm based on GhostNet and YOLOv5 models. …”
Get full text
Article -
4186
A voltage weak node identification method considering fault reconstruction in distribution networks
Published 2025-01-01“…Finally, the weak node evaluation index system and identification method are proposed according to the relative position relationship between the voltage visible security region of distribution network and the node voltage index trajectory by considering the normal state and N-1+1 fault state operation conditions of the distribution network. …”
Get full text
Article -
4187
A Survey on True Random Number Generators Based on Chaos
Published 2019-01-01“…With the rapid development of communication technology and the popularization of network, information security has been highly valued by all walks of life. …”
Get full text
Article -
4188
Study of Multi-Service Networks and Communication Systems Using Distributed Network Technology in Mountain Areas
Published 2025-01-01“…It was found that the integrated performance indicators of multiservice corporate networks are largely determined by the reliability, information security and quality of service of IP / MPLS switching nodes and the IMS-Internet Protocol Multimedia Subsystem multimedia communication system using the signaling system and protocols for providing multimedia services and establishing session sessions. …”
Get full text
Article -
4189
Structural Characterization of Functional Ingredient Levan Synthesized by Bacillus siamensis Isolated from Traditional Fermented Food in Thailand
Published 2020-01-01“…The rising global population continues to threaten the world’s food security. The discovery of new technologies to produce food of nutritional and functional properties is urgently needed. …”
Get full text
Article -
4190
Transforming Education Through Blockchain: A Systematic Review of Applications, Projects, and Challenges
Published 2025-01-01“…The unique features of blockchain, notably decentralization, trustworthiness, and security, have attracted considerable attention from researchers investigating its application in education. …”
Get full text
Article -
4191
Single-Cell protein for feed and food
Published 2025-01-01“…As global demand for protein sources continues to rise due to increasing populations and changing dietary preferences, the shortage of conventional protein for feed and food poses significant challenges for food security. Single-cell protein (SCP), derived from microorganisms such as yeasts and bacteria, represents a promising alternative to traditional protein sources. …”
Get full text
Article -
4192
Digitalisation factors influencing the dynamic capabilities of small and medium enterprises in the healthcare sector
Published 2024-06-01“…Results: The empirical results show that SME performance (β=0.132, p<0.05), task-technology fit (β=0.052, p<0.05), internet access (β=0.235, p<0.05), customer service (β=0.057, p<0.05), information sharing (β=0.022, p<0.05), innovation (β=0.125, p<0.05), and data security (β=0.427, p<0.05) are highly significant in the digitalisation of DC of SMEs. …”
Get full text
Article -
4193
Cicer arietinum abscisic acid receptor PYL1 and glycine-rich RNA-binding, abscisic acid-inducible protein-like differential expression under induced draught conditions
Published 2025-01-01“…The development of drought-tolerant varieties is crucial for maintaining food security amidst the challenges posed by climate change. …”
Get full text
Article -
4194
Scientific support to plant breeding and seed production in Siberia in the XXI century
Published 2021-07-01“…Considerations relating to food security, prospects of and challenges before plant breeding in the Siberian Federal District (SFD), the largest agricultural area of the Russian Federation, are provided in the article. …”
Get full text
Article -
4195
Navigating the landscape of remote patient monitoring in Canada: trends, challenges, and future directions
Published 2025-02-01“…We explore the regulatory, technical, and operational challenges that RPM faces, including critical issues around data privacy, security, and interoperability, factors essential for sustainable integration. …”
Get full text
Article -
4196
Modeling and Simulation of Departure Passenger’s Behavior Based on an Improved Social Force Approach: A Case Study on an Airport Terminal in China
Published 2021-01-01“…In the node choice model, the walking distance, the quantity of people waiting, and luggage were considered in choosing a check-in counter or security check channel. The main parameters of the proposed model were confirmed according to video data. …”
Get full text
Article -
4197
Phenomic characterization of Crotalaria germplasm for crop improvement
Published 2021-03-01“…Abstract Background Diversification of global food systems through exploration of traditional varieties and wild edible plant species is a focal mitigation strategy for food security worldwide. The present study determined the phenomic diversity of locally available, affordable and climate-resilient cultivated and wild Crotalaria species for breeding purposes. …”
Get full text
Article -
4198
Potential Role of African Fermented Indigenous Vegetables in Maternal and Child Nutrition in Sub-Saharan Africa
Published 2021-01-01“…Therefore, fermentation of AIVs can contribute to the attainment of food and nutrition security especially among women and children who rely on these vegetables as a staple source of micronutrients and income. …”
Get full text
Article -
4199
An Improved Deep Learning-Based Technique for Driver Detection and Driver Assistance in Electric Vehicles with Better Performance
Published 2022-01-01“…To advance driver safety, security, and comfort, Advanced Driver Assistance Systems (ADAS) must be personalized. …”
Get full text
Article -
4200
Conflict Probability Prediction and Safety Assessment of Straight-Left Traffic Flow at Signalized Intersections
Published 2022-01-01“…A case study was conducted to reveal the evolution mechanism of the conflict risk coefficient at the signalized intersection and to estimate the safety status under the various security optimization strategies. The experimental results verified the effectiveness of the SICP model, indicating that the proposed model is effective in evaluating the safety level of existing or prebuilt signalized intersections.…”
Get full text
Article