Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1001
RAM-MEN: Robust authentication mechanism for IoT-enabled edge networks
Published 2025-01-01Subjects: “…Secure channel…”
Get full text
Article -
1002
-
1003
-
1004
Secure and energy-efficient inter- and intra-cluster optimization scheme for smart cities using UAV-assisted wireless sensor networks
Published 2025-02-01Subjects: Get full text
Article -
1005
-
1006
Deciphering the potential of plant metabolites as insecticides against melon fly (Zeugodacus cucurbitae): Exposing control alternatives to assure food security
Published 2025-01-01“…In the absence of effective biological or chemical controls, the melon fly poses a significant threat to food security, particularly impacting cucurbit crops in tropical and subtropical regions. …”
Get full text
Article -
1007
Does welfare technology contribute to security, activity, participation and independence within municipal elder care? A qualitative study protocol
Published 2025-02-01“…However, the perspectives of older persons, significant others, staff and decision-makers’ on the aspects of security, activity, independence and participation that WT aims to influence needs further investigation. …”
Get full text
Article -
1008
-
1009
A topology-guided high-quality solution learning framework for security-constraint unit commitment based on graph convolutional network
Published 2025-03-01Subjects: “…Security-constrained unit commitment…”
Get full text
Article -
1010
Evaluation of tourism ecological security and its obstacles in semi-arid river valley urban: a case study of Lanzhou, China
Published 2025-01-01Subjects: Get full text
Article -
1011
Global challenges facing plant pathology: multidisciplinary approaches to meet the food security and environmental challenges in the mid-twenty-first century
Published 2021-05-01“…This review discussed recent developments in plant pathology research and identifies some key issues that, we anticipate, must be faced to meet the food security and environmental challenges that will arise over coming decades. …”
Get full text
Article -
1012
Measuring coordination between land ecological security and high-quality economic development: a case of the Beijing-Tianjin-Hebei region
Published 2025-02-01Subjects: “…land ecological security (LES)…”
Get full text
Article -
1013
Technologies of psychological rehabilitation of a personality after traumatic events (on the example of the rehabilitation programme for psychologists of the security and defence sector of Ukraine)
Published 2024-12-01“…Today, psychologists in the security and defence sector of Ukraine work in extremely difficult conditions, providing psychological support to the military, who face various stressful situations. …”
Get full text
Article -
1014
Keamanan Data Menggunakan Secure Hashing Algorithm (SHA)-256 dan Rivest Shamir Adleman (RSA) pada Digital Signature
Published 2023-12-01“… Penelitian ini mempelajari bagaimana kriptografi menggunakan Secure Hash Algorthm 256 (SHA-256) dan Rivest Shamir Adleman (RSA) untuk menjaga keaslian Surat Keterangan Lulus (SKL) dengan menggunakan kode Quick Response (QR) berbasis web. …”
Get full text
Article -
1015
Trade-off between computation time and solution quality for integrated generation and transmission expansion planning with N-1 security criterion
Published 2025-03-01Subjects: Get full text
Article -
1016
Evaluation of Network Security Service Provider Using 2-Tuple Linguistic Complex q-Rung Orthopair Fuzzy COPRAS Method
Published 2022-01-01“…However, many enterprises lack the necessary resources to secure information security, and selecting the best network security service provider has become a real issue for many enterprises. …”
Get full text
Article -
1017
A Collaborative Data Network for the Asia Oceania Region Enabled by Emerging Technologies to Foster Innovation in a Secure and Open Environment
Published 2025-01-01“…To ensure ownership is always clear, and subsequent use of data is tracked, we harness blockchain technology alongside smart contracts and decentralised identifiers to allow secure discovery and sharing. The use of blockchain will ensure the information about each dataset (metadata, provenance, and access rights) is immutably connected to each dataset. …”
Get full text
Article -
1018
Improvement of the conceptual principles of activity of the Ministry of Internal Affairs of Ukraine as a subject of the formation and development of the internal security environment of the state
Published 2024-06-01Subjects: “…security environment…”
Get full text
Article -
1019
Ecological security driving mechanisms and optimization of zoning in Chinese urban agglomerations: A case study of the central plains urban agglomeration
Published 2025-02-01Subjects: “…Ecological security…”
Get full text
Article -
1020