Suggested Topics within your search.
Suggested Topics within your search.
- Information technology 17
- Management 8
- Technological innovations 8
- Moral and ethical aspects 7
- Social aspects 5
- Economic development 4
- Study and teaching 4
- information technology 4
- Economic aspects 3
- Economic policy 3
- Educational technology 3
- History 3
- Information Technology 3
- Mass media 3
- Photography 3
- Advertising 2
- Application software 2
- Automobiles 2
- Biochemical Phenomena 2
- Biochemistry 2
- Biotechnology 2
- Computer networks 2
- Computer-assisted instruction 2
- Data processing 2
- Design 2
- Design and construction 2
- Economic conditions 2
- Education 2
- Education, Elementary 2
- Electrical engineering 2
-
54521
-
54522
-
54523
Vegetation types shape the soil micro-food web compositions and soil multifunctionality in Loess Plateau
Published 2025-02-01“…., and the control vegetation Stipa bungeana on soil micro-food webs and soil multifunctionality, as well as their response mechanisms to soil environmental drivers, were investigated using High-throughput sequencing technology.ResultsC. korshinskii significantly enhanced soil physicochemical properties and soil enzyme activities by facilitating the stability of the soil micro-food web structure driven by soil bacteria and fungi and increasing the soil multifunctionality in contrast to S. bungeana. …”
Get full text
Article -
54524
-
54525
ECC-Based Authentication Protocol for Military Internet of Drone (IoD): A Holistic Security Framework
Published 2025-01-01“…The employed Elliptic Curve Cryptography security technology provides robust encryption with minimal computational complexity, making it suitable for resource-constrained IoD environments. …”
Get full text
Article -
54526
Model Test on the Behaviors of Deep Excavation with Lateral Confined Water
Published 2025-01-01Get full text
Article -
54527
-
54528
Validation and diagnostic study of cloudburst events over the Himalayan region using IMDAA and ERA5
Published 2025-12-01Get full text
Article -
54529
-
54530
Exploring RNA modifications in infectious non-coding circular RNAs
Published 2025-02-01“…Here, we explore RNA modifications in the avocado sunblotch viroid (ASBVd) and the citrus exocortis viroid (CEVd), representative members of viroids replicating in chloroplasts and the nucleus, respectively, using LC – MS and Oxford Nanopore Technology (ONT) direct RNA sequencing. Although no modification was detected in ASBVd, CEVd contained approximately one m6A per RNA molecule. …”
Get full text
Article -
54531
-
54532
مروری بر چسبهای رزوه حاوی میکروکپسولهای پُرشده با مواد واکنشپذیر
Published 2018-02-01Get full text
Article -
54533
-
54534
-
54535
-
54536
World Café approach: exploring the future vision of oral anticoagulants for patients with atrial fibrillation (AF) in Ireland
Published 2020-09-01“…The benefits of embracing technological advances for clinicians and patients were evident; however, clinicians indicate this can increase pressure on already stretched resources; coupled with institutional barriers (including scarce resources) arising from the complex nature of anticoagulation for patients with AF, which emerged strongly. …”
Get full text
Article -
54537
-
54538
Research on network risk assessment based on attack graph of expected benefits-rate
Published 2022-08-01“…As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.…”
Get full text
Article -
54539
-
54540
Environmental and human health impact of recycle concrete powder: an emergy-based LCA approach
Published 2025-01-01Get full text
Article