Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5181
A Systematic Literature Review on Defense Techniques Against Routing Attacks in Internet of Things
Published 2025-01-01“…In recent years different defense techniques have been proposed to act against these attacks i.e., Secure-Protocol, conventional Intrusion Detection Systems (IDS), and Machine Learning (ML)-based. …”
Get full text
Article -
5182
Design of a SMS Based Voting System.
Published 2023“…This system is slow, expensive, less secure, not reliable, cumbersome and not very transparent. …”
Get full text
Thesis -
5183
Stochastic Linear Quadratic Control Problem on Time Scales
Published 2021-01-01Get full text
Article -
5184
Analysis of the existing methods of change of liquid glass properties
Published 2000-11-01“…The authors list methods of modification of silicate binding agent with the purpose to secure high quality of castings and ecological cleanliness.…”
Get full text
Article -
5185
Surgical Synechiolysis of Iridocapsular Adhesion and Sulcus Placement of a Rigid Intraocular Lens on an Oversized Residual Capsular Rim
Published 2018-01-01“…A preserved capsulorhexis after sufficient synechiolysis, which can secure the IOL optic intraoperatively, may yield better stability of the IOL position.…”
Get full text
Article -
5186
Rural Households’ Vulnerability to Food Insecurity and Its Determinants in North Shewa Zone of Ethiopia
Published 2025-01-01“…Accordingly, based on the intensity of their vulnerability, households were grouped as chronic food insecure (43.72%), transient food insecure (12.57%), highly vulnerable-food secure (16.23%), and low vulnerable-food secure (27.49%). …”
Get full text
Article -
5187
-
5188
NEGATIVE INTEREST RATES: CENTRAL BANKS INITIATED AN EXPERIMENT
Published 2016-08-01“…Such new tools could be represented by futures contracts on interest rates securities.…”
Get full text
Article -
5189
Pressure and rolling torque in high-speed finishing blocks of wire mills with account of mass forces in deformation zones
Published 2001-08-01“…Tasks of working out of theoretical bases of continuos high-speed rolling of rolled wire are set forth and solved with considerańon of influence of mass forces securing necessary acceleration in deformation zones.…”
Get full text
Article -
5190
Food-Insecure Women Eat a Less Diverse Diet in a More Temporally Variable Way: Evidence from the US National Health and Nutrition Examination Survey, 2013-4
Published 2019-01-01“…Previous research using food recalls suggests that the total energy intake of food-insecure women is not elevated, though macronutrient composition may differ from that of food-secure women. There is limited evidence on temporal patterns of food consumption. …”
Get full text
Article -
5191
Feasibility and parameter optimization of ground-to-satellite uplink continuous-variable quantum key distribution
Published 2025-01-01“…Driven by the necessitates of wide-area quantum secure communication networks, ground-to-satellite quantum key distribution (QKD) has been highlighted in the field of quantum information. …”
Get full text
Article -
5192
Relationship Between Attachment and Social Skills in Adulthood Education in the Digital Society
Published 2025-01-01“…After carrying out the analyses, the existence of a statistically significant relationship was detected between the social skills variable and Attachment Scale 3, corresponding to subjects with good abilities to express feelings and comfort with relationships (secure attachment). It is concluded by stating that subjects who have developed a secure attachment will have more satisfactory social relationships.…”
Get full text
Article -
5193
A dataset of Antarctic ecosystems in ice-free lands: classification, descriptions, and maps
Published 2025-01-01Get full text
Article -
5194
Staying in Marriage is Not Enough: Influence of Marital Commitment and Adult Attachment Style on Marital Flourishing
Published 2024-06-01“…The results showed that marital commitment (p = .000) and a secure attachment style (p = .000) significantly predict marital flourishing. …”
Get full text
Article -
5195
A Rare Complication of Tracheal Intubation: Tongue Perforation
Published 2012-01-01“…Laryngoscopy demonstrated the ETT to perforate the base of the tongue. The airway was secured with tracheostomy and the ETT was removed. …”
Get full text
Article -
5196
Parallel remote state preparation for fully device-independent verifiable blind quantum computation
Published 2025-01-01“…We introduce a device-independent two-prover scheme in which a classical verifier can use a simple untrusted quantum measurement device (the client device) to securely delegate a quantum computation to an untrusted quantum server. …”
Get full text
Article -
5197
A requirement-driven approach for competency-based collaboration in industrial data science projects
Published 2024-01-01“…Simultaneously, especially manufacturing companies need to gain and secure knowledge in the field of Industrial Data Science (IDS) and to collaborate with partners to form a competitive value chain. …”
Get full text
Article -
5198
La crise de l’oléoduc Edjeleh-Gabès : Au cœur des enjeux de souveraineté du Maghreb (1954-1962)
Published 2018-06-01“…While the French-Libyan discussions (1954-1956) were retaining the attention of French oil companies, Paris was focusing on securing the evacuation of oil from the Algerian Sahara during the Algerian War (1954-1962). …”
Get full text
Article -
5199
Sensor Relocation Technique Based Lightweight Integrated Protocol for WSN
Published 2014-06-01“…However, this approach fails to focus on connectivity issue due to node migration and secured communication too, which may compromise our collecting data. …”
Get full text
Article -
5200
An Overview on The Pandemic Coronavirus Disease 2019 (COVID-19) Outbreak
Published 2020-05-01“…The other objective of this review was to encourage publics to treat the virus in safe way based on the discovery by researchers toward secure life of million peoples that could be infected by the 2019 new coronavirus. …”
Get full text
Article