Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
9081
COVID-19 LOCKDOWN AND THE CHALLENGES OF FOOD INSECURITY AMONG HOUSEHOLDS IN SELECTED COMMUNITIES IN ZARIA AND SABON-GARI LOCAL GOVERNMENT AREAS OF KADUNA STATE, NIGERIA
Published 2023-08-01“… The restriction of people’s movement during Covid-19 lockdown has affected the abilities of many families in securing, either from their own production or through purchases, adequate food for meeting the dietary needs of their members in Zaria and Sabon-gari Local Government Areas of Kaduna State, Nigeria. …”
Get full text
Article -
9082
Le foisonnement éolien : les limites d’un mix électrique à forte proportion d’énergies renouvelables intermittentes
Published 2023-05-01“…The 50–50 renewable and nuclear scenario is given for comparison, showing that the solution lies in providing adequate secured power plant capacity.…”
Get full text
Article -
9083
Debt sustainability of state-owned enterprises in Indonesia
Published 2025-12-01“…The findings reveal considerable risks to SOE debt sustainability across industries, with no sector being consistently secure or unstable. However, SOEs in the mining sector demonstrate better debt sustainability performance than those in the construction sector. …”
Get full text
Article -
9084
Suture Repair and Suspensory Button Fixation of Avulsion Fracture of the Fibular Styloid (Arcuate Fracture)
Published 2025-01-01“…If the fixation system is not sufficient to secure the various stabilities of the knee, it will fail and cause significant knee instability. …”
Get full text
Article -
9085
Nonexposure Accurate Location K-Anonymity Algorithm in LBS
Published 2014-01-01“…Experimental results show that our algorithms are more secure than the existent cloaking algorithms, need not have all the users reporting their locations all the time, and can generate smaller ASR.…”
Get full text
Article -
9086
AFM-DViT: A framework for IoT-driven medical image analysis
Published 2025-02-01“…The AFM-DViT model offers an effective solution for secure and efficient medical image analysis in IoT-enabled environments.…”
Get full text
Article -
9087
Application of edge-cloud collaborative intelligence technologies in power grids
Published 2021-03-01“…With the continuous development of the Internet of things on electricity (IoTE) and large-scale deployment of intelligent edge devices, an explosively increasing amount of data are being generated at the network edge.The efficient, fast and secure processing and analysis of the massive edge located data brings great challenges for the traditional cloud computing-based intelligence technologies.Instead, edge-cloud collaborative intelligence (ECCI) technologies can significantly outperform the cloud computing-based intelligence in terms of the network bandwidth saving, delay reduction and privacy protection, and therefore have shown a great potential in boosting the development of power grids.To investigate the application of ECCI in power grids, the concept and research progress of ECCI were firstly introduced.The characteristics and advantages of ECCI were summarized and its applicability in the power grids were discussed.Secondly, the key technologies of ECCI applications for power grids were discussed and the solutions based on ECCI technologies for two typical scenes were proposed respectively.Finally, a brief discussion of future work was given.…”
Get full text
Article -
9088
Linear gate bounds against natural functions for position-verification
Published 2025-01-01“…The scheme is feasible for a prover with linear classical resources and $O(1)$ quantum resources, and secure against sub-linear quantum resources.…”
Get full text
Article -
9089
Design of an Uninterrupted Power Supply with Li-Ion Battery Pack: A Proposal for a Cost-Efficient Design with High Protection Features
Published 2021-06-01“…Besides, li-ion batteries require a safe and secure ground to reach the best performance and decrease the explosion risk. …”
Get full text
Article -
9090
Exploring the relationship between learning emotion and cognitive behaviors in a digital game
Published 2024-09-01“…The study demonstrates that high‐level learners maintained a high level of insightful emotion throughout the game, excelled at constructing strategic formations to control more significant chessboard areas, and preferred to reserve powerful pieces until the end to secure a winning advantage. Conversely, low‐level learners exhibit a predominant level of neutral emotion, especially during unrelated behaviors, and struggle to maintain a strategic overview, focusing instead on smaller, immediate gains, which hamper the application of deeper strategies.…”
Get full text
Article -
9091
Adaptive Coordinated Variable Speed Limit between Highway Mainline and On-Ramp with Deep Reinforcement Learning
Published 2022-01-01“…This research provides insights into the management of highway capacity so as to secure traffic efficiency and reliability for the merging zone.…”
Get full text
Article -
9092
Passive biometric electronic lock via UHF RFID
Published 2021-04-01“…A biometric lock design method was proposed based on the internal features of human body, namely PBLock.It used the backscattered RF signals to collect the impedance characteristics of human fingertips through the contact between human fingers and tags.The advantage of such authentication method is that the human impedance was not easy to be stolen, and it was fully integrated with the hardware characteristics of the device (RFID tags), which greatly increased the difficulty for the attacker to copy and clone.To ensure the availability and efficiency of the system, an optimization authentication mechanism was proposed by cutting tag antenna, which effectively improved the impedance sensitivity.Moreover, the feasibility of passive drive was discussed by using the electromagnetic energy advantage of RFID system.Through a large number of experimental evaluations, the authentication accuracy of PBLock can reach 96%, and the average time cost of a single authentication is 1.4 seconds.Some attack models were presented based on practical environment.The results show that PBLock can effectively prevent counterfeiting attack, impersonation attack and replay attack, which provides an opportunity for the secure application of new biometric electronic locks.…”
Get full text
Article -
9093
Recent Web Platforms for Multi-Omics Integration Unlocking Biological Complexity
Published 2024-12-01“…Finally, the paper proposes directions for future research and development, emphasizing the importance of more advanced, user-friendly, and secure platforms that can better serve comprehensive healthcare needs.…”
Get full text
Article -
9094
Sustainability models in Zone 3 manufacturing SMEs
Published 2025-01-01“…For the development of the study, 107 medium and small companies that met the requirements of complete information obtained from the Superintendence of Companies, Securities, and Insurance were taken into account. Observation sheets were used to classify the information in the financial statements and allow understanding of their financial situation by applying the solvency prediction models, Z-Altman, Springate, Fulmer, and CA-Score. …”
Get full text
Article -
9095
Synthesis of antifungal imines as inhibitors of ergosterol biosynthesis
Published 2025-12-01“…Ensuring a safe and secure supply of nutritious food for the ever growing global population necessitates the development of new eco-friendly fungicides to increase global food output by minimizing plant disease losses. …”
Get full text
Article -
9096
An examination of the enhanced photocatalytic performance of PEO coatings applied on Mg alloys: A review
Published 2024-11-01“…Of the various strategies for securing nanoparticles to a substrate, photocatalytic coatings have emerged as a promising solution to overcome the common limitations associated with powdered forms. …”
Get full text
Article -
9097
Source-independent quantum random number generators with integrated silicon photonics
Published 2025-01-01“…Our research paves the way for integrated SI-QRNGs, providing a cost-effective and robust secure QRNG module for next-generation communications.…”
Get full text
Article -
9098
"CYCLIST ON THE MARSH": LESSONS AND PROSPECTS OF THE LAST EU ENLARGEMENT
Published 2013-08-01“…Specific historic experience of the applicants pre-determined a considerable specialty of west-European fashioned democratic regimes in those countries, weakness of consensus and tolerance culture which has already rooted itself in the West-European society, and which has to a considerable degree secured stable development of Western Europe over the last decades. …”
Get full text
Article -
9099
Trust and Distrust in a Democratic State of Law
Published 2024-12-01“…The key task of public administration, aimed at inspiring and intensifying trust, is to obtain and secure the common good in the state on the basis of, and within the limits of, the applicable legal regulations, which at the same time set out the methods and scope of social protection in the individual spheres of operation of the legislative, executive, and judicial authorities.…”
Get full text
Article -
9100
Development and Validation of the Interpreting Learning Engagement Scale (ILES)
Published 2024-12-01“…Additionally, the scale’s scores showed a significant correlation with grit, securing the external validity of the ILES. This study not only contributes a validated instrument for assessing student engagement in interpreting learning but also provides implications for promoting engagement through potential interventions, with the ultimate aim of achieving high levels of interpreting competence.…”
Get full text
Article