Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8421
Bradyrhizobium Inoculation Improved Agrosymbiotic Performances of Cowpea [Vigna unguiculata (L) Walp] Varieties at Two Sites in Ethiopia
Published 2024-01-01“…Cowpea [Vigna unguiculata (L) Walp] is an important crop that protects soil fertility, supplements protein deficiency, and provides food security in the face of climate change. However, its productivity in the study area is low due to a lack of high-yielding varieties, high cost of mineral fertilizer, insufficient information on effective inoculum, and inadequate management practices. …”
Get full text
Article -
8422
Prevalence and factors associated with multidrug resistant Escherichia coli carriage on chicken farms in west Nile region in Uganda: A cross-sectional survey.
Published 2025-01-01“…Infections with multi-drug-resistant (MDR) pathogens in food-animals threaten public health and food security. However, the epidemiology and factors associated with MDR Escherichia coli (MDR E. coli) on Ugandan farms are not well known. …”
Get full text
Article -
8423
Smart Health Monitoring and Management System for Organizations Using Radio-Frequency Identification (RFID) Technology in Hospitals or Emergency Applications
Published 2022-01-01“…This system offers a cost-effective means of enhancing reliability, privacy, and security for healthcare record management. One attractive feature of the system is its low cost due to the use of off-the-shelf devices and sensors that can be sourced and operated in our region. …”
Get full text
Article -
8424
CHOOSING THE APPROPRIATE DATABASE TYPE: A COMPARISON OF SQL, NOSQL, AND NEWSQL
Published 2024-12-01“…This structure not only enhances data security but also improves collaboration among users, making it easier to share and analyze information efficiently. …”
Get full text
Article -
8425
-
8426
An Exploratory Study of the Effectiveness of Unconditional EducationalAssistance Program as a Programmatic Electoral Strategy in the Philippines: The Case of Makati City’s Project...
Published 2023-03-01“…By using thematic analysis, five themes emerged from the interview data: (1) financial relief, (2) educational security, (3) unique source of local citizen satisfaction, (4) personally dispensed patronage of a benefactor politician, and (5) invaluable benefits and project continuity: influencing vote preference. …”
Get full text
Article -
8427
Coal Seam Gas Extraction by Integrated Drillings and Punchings from the Floor Roadway considering Hydraulic-Mechanical Coupling Effect
Published 2022-01-01“…Deep buried coal seams are featured by the great ground stress, high gas pressure, and low permeability, which boost the risk of gas disasters and thus dramatically threaten the security about coal mines. Coal seam gas pressure and gas content can be decreased by gas extraction, which is the primary measure to prevent and control mine gas disasters. …”
Get full text
Article -
8428
-
8429
Mobilization, conservation and study of cultivated and wild potato genetic resources
Published 2017-03-01“…., which has a great importance for basic and applied research in general, and for human food security. The genebanks of potato and other crops have three highly important tasks such as permanent replenishment of collection material, ensuring its preservation by various storage and maintaining methods, including seed and vegetative propagation, its all-round use in basic and applied research, as well as the improvement of the efficiency of agricultural production. …”
Get full text
Article -
8430
Business culture of entrepreneurship: Analysis of maturity in Ukraine and Russia
Published 2023-03-01“…To conduct a comparative study of the maturity of the business culture of entrepreneurship, an evaluation system was formed, which includes 21 evaluation objects, grouped into 4 components: 1) basic values (independence, security, equality); 2) ethical values (justification (perception) of unjust enrichment, appropriation of property, violence); 3) personal values (importance of family, friends, work, free time, politics); 4) economic values (recognition of the possibility of obtaining high entrepreneurial income and business development based on hard work, understanding the positives of the development of competition; giving priority to the development of private property over the state, personal economic responsibility over social dependence). …”
Get full text
Article -
8431
Learning to Detect Traffic Incidents from Data Based on Tree Augmented Naive Bayesian Classifiers
Published 2017-01-01Get full text
Article -
8432
Effect of Growth Regulators on In Vitro Micropropagation of Potato (Solanum tuberosum L.) Gudiene and Belete Varieties from Ethiopia
Published 2021-01-01“…Potato (Solanum tuberosum L.) is one of the important crops in Ethiopia which has a crucial role in nutritional security, poverty alleviation, and income generation. …”
Get full text
Article -
8433
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
8434
-
8435
Challenges of environmental and climate change: response of Global South (BRICS) countries
Published 2024-12-01“…Strict measures such as planting trees, prohibiting the chopping down of trees and clearing jungles, prohibiting the demolition of mountains, creating space for playgrounds, addressing issues with air and water pollution, and addressing noise pollution are necessary to ensure the security of the future, are required to take. As with the growth and development due to urbanization, pollution of various kinds has reached great heights and coping with these challenges has become difficult for every living being, that is, both plants and animal kingdom. …”
Get full text
Article -
8436
The target of a crime under the Article 330 of the Criminal Code of Ukraine
Published 2018-12-01“…They are as follows: 1) this information is obtained by authorized subjects in specific areas of social activity – within operative and search, counterintelligence operations, in the defense field of the country; 2) such information has limited access; 3) its disclosure may harm the public interest in the field of counteracting crime or within intelligence activities to the detriment of the state security of Ukraine and the country’s defense capabilities; 4) the assignment of information to such that constitutes official information, is carried out by the state authorities, which conduct operative and search or counterintelligence operations, as well as state agencies, local self-government agencies, enterprises, institutions and organizations in the defense field of the country; it is approved by their regulatory act; 5) documents or other material carriers containing official information are assigned the stamp “For official use”. …”
Get full text
Article -
8437
Health system readiness to deliver integrated noncommunicable disease and antenatal care in Kyrgyzstan, Tajikistan, and Vietnam
Published 2024-12-01“…Alongside updating training programs and securing the availability of essential equipment and commodities, there is a need to update clinical protocols on integrated management and revise monitoring systems to support quality improvement. …”
Get full text
Article -
8438
A Solar Photovoltaic Performance and Financial Modeling Solution for Grid-Connected Homes in Zambia
Published 2021-01-01“…This study conducts a solar photovoltaic performance and financial analysis for grid-connected homes in Zambia to investigate the role of solar energy as an enabler for energy security in Zambia using the National Renewable Energy Laboratory (NREL) System Advisor Model (SAM) simulation method. …”
Get full text
Article -
8439
An assessment of the impact of discounted Fees on the quality of services rendered by Quantity Surveying firms
Published 2023-12-01“…However, the excessive discounting of fees to secure work for most firms is a challenge, as guidelines remain rigid leaving no room for error. …”
Get full text
Article -
8440
CHANGING ASPECTS OF BAMBARA GROUNDNUT EXPLOITATION: 1. LIMITATIONS AND ALLEYWAYS FOR FUTURE EXPANSION
Published 2024-05-01“…Bambara groundnut is an under-exploited legume that has the potential to contribute enormously to food security. It can be used to increase the fertility of the soil leading to high yields of other crops during mixed cropping. …”
Get full text
Article