Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
9141
Towards Dynamic Remote Data Auditing in Computational Clouds
Published 2014-01-01“…The comparative analysis with the state-of-the-art RDA schemes shows that the proposed scheme is secure and highly efficient in terms of the computation and communication overhead on the auditor and server.…”
Get full text
Article -
9142
From Tradition to Future: Sundanese Indigenous Laws as the Vanguard of Environmental Conservation and Disaster Mitigation
Published 2024-08-01“…Pikukuh principles need to be incorporated more broadly and actively applied in policies and strategic initiatives to advance sustainable development, as this goes beyond romanticizing traditions and is essential for securing a sustainable future life…”
Get full text
Article -
9143
Design and Analysis of Nuclear Transportation Cask Using Phase Changing Material
Published 2025-01-01“…In the nuclear sector, secure transportation of radioactive materials is crucial in the nuclear sector, and cask design and analysis are crucial for maintaining fuel integrity. …”
Get full text
Article -
9144
Werner Syndrome Caused by Homozygous Frameshift Variant c.1578del in WRN
Published 2024-12-01“…Molecular diagnosis brings better treatment of manifestations and monitoring options for the patients, helping to establish more sufficient and secure patient care. …”
Get full text
Article -
9145
From Boole to Leggett-Garg: Epistemology of Bell-Type Inequalities
Published 2016-01-01“…This implies that the Leggett-Garg inequality does not mean that the SQUID flux is not there when nobody looks, as Leggett and Garg suggest, but instead that the probability measures may not be what Leggett and Garg have assumed them to be, when no data can be secured that directly relate to them. We show that similar considerations apply to other quantum interpretation-puzzles such as two-slit experiments.…”
Get full text
Article -
9146
Radiofrequency Ablation of Hepatocellular Carcinoma: A Literature Review
Published 2011-01-01“…An accurate evaluation of treatment response is very important to secure successful RFA therapy since a sufficient safety margin (at least 0.5 cm) can prevent local tumor recurrences. …”
Get full text
Article -
9147
Channel modeling and testing of wireless transmission for underground in-pipe leak and material loss detection
Published 2017-11-01“…This will support the on-device power management to secure large autonomy operations. Experimental tests have shown that the overall received energy was mixed with ambient energy if the latter is sent at the same frequency and that the optimum frequency range used to transmit energy was rather at low frequency range of 100–200 MHz.…”
Get full text
Article -
9148
Behavioural bias in investment decisions: moderate role of self-control
Published 2023-03-01“…Behavioural aspects in making financial or investment decisions have been inspired by the increasing role of behaviour as determinants of buying and selling securities. This study aims to analyze the effect of loss aversion and mental accounting on investment decisions and the role of self-control as a moderating variable on the effect of loss aversion and mental accounting on investment decisions. …”
Get full text
Article -
9149
Role of E-cadherin in epithelial barrier dysfunction: implications for bacterial infection, inflammation, and disease pathogenesis
Published 2025-02-01“…E-cadherin, an essential component of adherens junctions, has emerged as a pivotal molecule that secures epithelial homeostasis. Lately, its pleiotropic role beyond barrier function, including its involvement in immune responses, has become more evident. …”
Get full text
Article -
9150
Effectiveness of Mobile Health Services in Remote Papua under Indonesia’s Minister of Health Regulation No. 90 of 2015
Published 2024-12-01“…Key strategies to address these issues include securing stable funding, enhancing workforce capacity, leveraging digital technologies, and fostering community engagement. …”
Get full text
Article -
9151
A cyanobacteria-derived intermolecular salt bridge stabilizes photosynthetic NDH-1 and prevents oxidative stress
Published 2025-02-01“…The salt bridge and transmembrane helix 16, both situated at the C-terminus of NdhF1, collaboratively secure the linkage between NdhD1 and NdhB, akin to a cramping mechanism. …”
Get full text
Article -
9152
Countermeasures to Avoid Noncooperation in Fully Self-Organized VANETs
Published 2014-01-01“…The secure and efficient exchange of information in vehicular ad hoc networks (VANETs) involves more challenges than in any other type of ad hoc networks. …”
Get full text
Article -
9153
Mbamois women and land tenure: a study of the actors in the Mbam-And-Inoubou Division (Centre, Cameroon)
Published 2025-01-01“… Context and background In rural regions, a striking reality emerges : many women, trapped in an overwhelming financial dependency, are engaged in fierce battles to secure a tiny plot of land where they can carry out their essential activities (agriculture). …”
Get full text
Article -
9154
Edge or Cloud Architecture: The Applicability of New Data Processing Methods in Large-Scale Poultry Farming
Published 2025-01-01“…The transmission and analysis of data collected on birds and the farming environment in large-scale production environments using digital tools on a secure platform are not straightforward. In our on-site research, we have investigated two architectures, a cloud-based processing architecture and an edge computing-based one, in large-scale poultry farming circumstances. …”
Get full text
Article -
9155
Fast Frequency Control Strategy Based on Worst-Case Network Attack Perception
Published 2024-12-01“…Furthermore, the strategy is easy to implement, highly adaptable, and suitable for the complex and dynamic operational environment of power systems, providing strong support for the secure and stable operation of smart grids.…”
Get full text
Article -
9156
Effect Improved for High-Dimensional and Unbalanced Data Anomaly Detection Model Based on KNN-SMOTE-LSTM
Published 2020-01-01“…This model can continuously filter out and securely generate samples to improve the performance of the model through kNN discriminant classifier and avoid the blindness and limitations of the SMOTE algorithm in generating new samples. …”
Get full text
Article -
9157
Community Participation in Programme Planning for Universal Health Coverage in India: An exploratory study
Published 2025-02-01“…Traditional Indian society is cut across by rigid religion and caste lines, and the appropriate role for each caste group has been a serious obstacle in securing complete community participation. This study employed a quantitative exploratory survey design aimed at understanding public health professionals' perceptions of community participation in healthcare planning. …”
Get full text
Article -
9158
Hydrogen production via dehydrogenation of alcohols using ruthenium hexamethylenetetramine complex
Published 2024-08-01“…The use of liquid organic hydrogen carriers (LOHCs) such as alcohols, amines, etc. has been found to be a better and more secure way to store and transport hydrogen. Catalytic hydrogenation and dehydrogenation of LOHCs using transition metal complexes are known as the best methods to load and unload hydrogen for storage and transportation. …”
Get full text
Article -
9159
Bone Lid Technique Using a Piezoelectric Device for the Treatment of a Mandibular Bony Lesion
Published 2017-01-01“…The underlying lesion was enucleated and sent for pathology as a routine procedure, and the removed bony lid was repositioned in situ and secured with a collagen tape. Healing was uneventful with limited swelling and reduced pain. …”
Get full text
Article -
9160
FEASIBILITY OF USING LOW-PARAMETER LOCAL LLMS IN ANSWERING QUESTIONS FROM ENTERPRISE KNOWLEDGE BASE
Published 2024-12-01“…This research underscores the potential of offline-capable LLMs as cost-effective tools for secure knowledge management in Polish SMEs. …”
Get full text
Article