Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4321
Impacts of Soil and Water Management Measures on Crop Production and Farm Income of Rural Households in the Damota Area Districts, Southern Ethiopia
Published 2021-01-01“…Improving crop productivity and farm income of rural households and ensuring food security through soil and water conservation (SWC) measures are one of the integral parts of sustainable livelihood approaches. …”
Get full text
Article -
4322
A Method for Trust Quantification in Cloud Computing Environments
Published 2016-02-01“…In such environments, ownership and control over the data may lead to potential conflict between the protection of data and the provision of services. Thus, cloud security has received a great deal of attention in recent years. …”
Get full text
Article -
4323
Batch-in-Batch: a new adversarial training framework for initial perturbation and sample selection
Published 2025-01-01Get full text
Article -
4324
Simultaneous Classification of Objects with Unknown Rejection (SCOUR) Using Infra-Red Sensor Imagery
Published 2025-01-01“…Recognizing targets in infra-red images is an important problem for defense and security applications. A deployed network must not only recognize the known classes, but it must also reject any new or <i>unknown</i> objects without confusing them to be one of the known classes. …”
Get full text
Article -
4325
Public Perception of Genetically Modified Organisms and the Implementation of Biosafety Measures in Kenya
Published 2024-01-01“…Fifty-seven percent of the respondents indicated GMOs and genetically modified (GM) foods are a solution to food security in Africa. A majority believe that the introduction of GMO technology and the use of GM food is beneficial (52.3%). …”
Get full text
Article -
4326
-
4327
Generative AI, IoT, and blockchain in healthcare: application, issues, and solutions
Published 2025-01-01“…Blockchain verifies and secures IoT data, improving medical care and treatment, according to case studies. …”
Get full text
Article -
4328
Philosophical Ideas of Arne Næss in the Humanitarian Diplomacy of Norway
Published 2015-06-01“…The author of the arcticle makes it a point to show on separate examples to what extend the ideas of Næss A. are compatible with the basic principles of Norway's contemporary humanitarian diplomacy - humanity, neutrality, impartiality and independence, - as well as with the aims put forward by Norway in this respect which are to encure the needed with the necessery security and assistance; to finance humanitarian actions based on the international principles of humanity, neutrality, impartiality and independence; to prepare international community to responses to global humanitarian challenges of the future; to prevent and respond to humanitarian crises and participate in eleminating their aftermath. …”
Get full text
Article -
4329
Effects of intravaginal curcumin gels combined with electroporation on vulvovaginal candidiasis
Published 2025-01-01Get full text
Article -
4330
Business Process Modeling Patterns for Blockchain Application Development
Published 2025-01-01“…To address this gap, this study proposes a comprehensive collection of data-driven patterns for business process modeling, comprising nine patterns that capture various blockchain-specific aspects, including token circulation, supply, and authorization, as well as smart contract security and authorization. Through a trend analysis of real-world blockchain applications, we identified recurring business processes across domains and validated our patterns by comparing them to existing literature and a proof-of-concept application. …”
Get full text
Article -
4331
-
4332
Neural Networks Application for the Data of PID Controller for Acrobot
Published 2022-01-01“…The purpose of this method is to increase the security of the system against the attack of hackers on facilities of the automatic control system. …”
Get full text
Article -
4333
The concept and significance of forensic characteristics of the unlawful seizure of enterprise, institution or organisation property
Published 2023-12-01“…This criminal offence causes economic losses to both business entities and the state as a whole, reduces the level of economic security and, as a result, the level of investment, discredits the work of government agencies, undermines the authority of the state at the international level, etc. …”
Get full text
Article -
4334
Mediterranean refugee traffic: main routes and problems of control
Published 2024-11-01“…The authors also cited forecasts from the European Union Agency for the Security of its External Borders for 2023–2024, which say that the pandemic and the economic crisis have affected migration flows, which will grow in the near future. …”
Get full text
Article -
4335
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01“… Information security is paramount for individuals, companies, and governments. …”
Get full text
Article -
4336
A Fuzzy Multi-Criteria Approach for Selecting Open-Source ERP Systems in SMEs Using Fuzzy AHP and TOPSIS
Published 2025-01-01“…System quality has been identified as a critical factor in the selection of an open-source ERP system, with particular emphasis on aspects such as security and reliability. These sub-criteria are considered the most influential in determining the suitability of a system. …”
Get full text
Article -
4337
Major heavy metals and human gut microbiota composition: a systematic review with nutritional approach
Published 2025-01-01Get full text
Article -
4338
Determinants of food insecurity among Syrian refugee women and their coping strategies
Published 2024-11-01“…Results It was found that 28% of the women who participated in the study had food security, 35% had mild, 24% had moderate, and 13% had severe food insecurity. …”
Get full text
Article -
4339
Blasting Vibration Generated by Breaking-Blasting Large Barriers with EBBLB
Published 2016-01-01“…The study can predict ground vibration generated by EBBLB and assess its damaging effects of blasting vibration for security and protection.…”
Get full text
Article -
4340
Sistem Keamanan Multi Mail Server dengan Teknik Enkripsi OPENPGP pada Zimbra Exchange Open Source Software
Published 2020-05-01“…The test results show that the OpenPGP method works well for the security of the email sending/receiving system on a multi-mail server. …”
Get full text
Article