Suggested Topics within your search.
Suggested Topics within your search.
- Moral and ethical aspects 3
- Orthopedics 3
- Sports medicine 3
- Information technology 2
- Internet in public administration 2
- Public administration 2
- Public relations 2
- Academic writing 1
- Advertising 1
- Authoritarianism 1
- Brothers and sisters 1
- Business communication 1
- Business ethics 1
- Communication 1
- Economic conditions 1
- Economic development 1
- Economic history 1
- Elections 1
- Electronic information resources 1
- Elias (Fictitious character) 1
- Embryology 1
- English language 1
- Fantasy 1
- Fugitives from justice 1
- Journalistic ethics 1
- Laia (Fictitious character) 1
- Libraries 1
- Libraries and electronic publishing 1
- Management 1
- Marketing 1
-
11161
30 anos de dinâmica espaço-temporal (1984-2015) da região de influência do Parque Nacional da Chapada dos Veadeiros – Goiás
Published 2018-08-01“…In the last decades, the Cerrado, considered a hotspot of biodiversity, has faced hard anthropic transformations. An example of this dynamism is the region of Chapada dos Veadeiros, located in the north of the state of Goiás. …”
Get full text
Article -
11162
Drivers and barriers to adoption of regenerative agriculture: cases studies on lessons learned from organic
Published 2024-12-01“…Five case studies of professional growers, representing a total of 100,000 acres of production, were collected to identify reasons for choosing to grow or stop growing organic, challenges faced and attitudes around regenerative agriculture. …”
Get full text
Article -
11163
Analysis of International Competitiveness of Multinational Corporations Based on Rough Sets
Published 2021-01-01“…Modern business judgment is mostly faced with complex, unclear nature, and not fully confirmed research objects and needs a lot of relevant data investigation, inherent contradiction retrieval, and the discovery and extraction of potential laws. …”
Get full text
Article -
11164
Techniques of recycling end-of-life wind turbine blades in the pavement industry: A literature review
Published 2024-09-01“…As a green energy source, wind power has gained recent popularity due to its low cost and lower carbon footprint; but with a short blade life span, the industry faces a blade waste issue. Wind turbine blade recyclability is challenging due to factors such as blade sheer size, material complexity, low economic feasibility, and a lack of suitable recycling policies; yet, many blades are still being constructed and others are being decommissioned. …”
Get full text
Article -
11165
Small target detection in UAV view based on improved YOLOv8 algorithm
Published 2025-01-01“…Abstract The main challenges faced when detecting targets captured by UAVs include small target image size, dense target distribution, and uneven category distribution.In addition, the hardware limitations of UAVs impose constraints on the size and complexity of the model, which may lead to poor detection accuracy of the model. …”
Get full text
Article -
11166
Afetividade institucional: reflexões sobre as contribuições da psicologia na gestão do afetivo nas organizações de trabalho
Published 2010-07-01“…Ilustra suas observações mediante uma análise das práticas dos psicólogos do trabalho no marco das “faces da Psicologia do Trabalho”. Associa as possibilidades de solução para os problemas dos trabalhadores a atuação dos psicólogos do trabalho no campo da saúde do trabalhador. …”
Get full text
Article -
11167
Elevated few-shot network intrusion detection via self-attention mechanisms and iterative refinement.
Published 2025-01-01“…However, traditional NIDS relies on a large volume of samples for training, which exhibits insufficient adaptability in rapidly changing network environments and complex attack methods, especially when facing novel and rare attacks. As attack strategies evolve, there is often a lack of sufficient samples to train models, making it difficult for traditional methods to respond quickly and effectively to new threats. …”
Get full text
Article -
11168
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01“…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
Get full text
Article -
11169
Evaluation of novel fungicides (FRAC groups 7, 9, 12) for managing cranberry fruit rot
Published 2025-02-01“…Additionally, the cranberry industry faces increasing restrictions on the use of broad-spectrum fungicides, such as chlorothalonil and mancozeb, necessitating the exploration of alternative management strategies. …”
Get full text
Article -
11170
Optimization of ESP performance through chemical treatment using a single capillary in the Apiay field
Published 2024-06-01“…This successful application is innovative and unique in Colombia, and it sets an example for other fields facing similar challenges in the couuntry, offering a promising approach to leverage heavy crude oil production and transform the future of these fields…”
Get full text
Article -
11171
Protéger et guérir : la mission du gouvernement et des associations d’aide aux détenues en Angleterre entre 1856 et 1914
Published 2016-05-01“…But their efforts led to female empowerment: reformers played an active part in the management of relief societies, challenging their traditionally domestic positions. They also faced obstacles, embodied by people who believed that guilty deviants were being unfairly ‘pampered’. …”
Get full text
Article -
11172
Natural dynamics and watershed approach incorporation in urban water management: A scoping review.
Published 2024-01-01“…Several cities are facing water emergencies related to urbanization impact and amplified by climate change. …”
Get full text
Article -
11173
Research Progress on the Relationship between Ischemic Stroke and Immunoinflammatory Factors
Published 2020-02-01“…At present, the problem of ischemic stroke has aroused wide public concern. China is facing an increasingly severe situation of prevention and treatment, and the disease has brought a heavy burden to patients, families and even the whole society, which has become one of the focuses and difficulties of modern medical research. …”
Get full text
Article -
11174
Relevance and Adaptation of Sorogan Method in Modern Islamic Boarding Schools: Opportunities and Challenges
Published 2024-12-01“…However, the challenges faced include time constraints due to the tight schedule combining formal and diniyah curricula and the need to adapt to technology. …”
Get full text
Article -
11175
Development for a concept mapping multicultural education program for Mother and Baby Unit nurses: a quasi-experimental study in South Korea
Published 2025-01-01“…This study offers a practical framework for integrating multicultural education into nursing training, ultimately improving care for foreign mothers and reducing the challenges faced by MBU nurses.…”
Get full text
Article -
11176
Analysis of Transient Voltage Stability in a Low Voltage Distribution Network Using SST for the Integration of Distributed Generations
Published 2018-01-01“…The results show that, comparing with the conventional system, the SST has apparent advantages on enhancing the transient voltage stability of load bus while facing different disturbances, even though SST has to regulate the voltage passively. …”
Get full text
Article -
11177
The Diplomacy of Small States: Exploring Opportunities and Limitations in the Case of Timor-Leste
Published 2023-07-01“…Strategies such as imitation and balancing, participation in coalitions, promotion of international initiatives, provision of expertise, and adherence to the principles of international law are utilized to cultivate a positive image of small states as responsible actors in international relations and reliable partners.The article concludes that Timor-Leste has been successful in maintaining bilateral and multilateral relations and actively participating in international organizations. However, it faces systemic challenges in effectively employing public diplomacy mechanisms. …”
Get full text
Article -
11178
Development and preliminary testing of Health Equity Across the AI Lifecycle (HEAAL): A framework for healthcare delivery organizations to mitigate the risk of AI solutions worseni...
Published 2024-05-01“…To address these gaps and tackle a common challenge faced by healthcare delivery organizations, a case-based workshop was organized, and a framework was developed to evaluate the potential impact of implementing an AI solution on health equity. …”
Get full text
Article -
11179
Analisis Implementasi Pola Pengelolaan Keuangan Badan Layanan Umum Daerah pada Rumah Sakit Umum Daerah Dr. RM. Djoelham Binjai
Published 2021-12-01“…In its implementation, there are several obstacles faced, especially the understanding of other sections and fields of PPK-BLUD in RSUD Dr. …”
Get full text
Article -
11180
Trust evaluation optimization mechanism for cloud user behavior based on FANP
Published 2022-04-01“…The open cloud computing environment is facing security challenges and the traditional user behavior evaluation mechanism cannot guarantee the security of the cloud.In order to scientifically and quantitatively evaluate the user’s behavior trust, ensure the scientific and reasonable weight assignment, improve the security and credibility of user behavior under the cloud platform, a trust evaluation optimization mechanism combined with fuzzy analytic network process (FANP) was designed.In the proposal, user behavior trust evaluation based on one control target was extended to include two control target modules which were historical access behavior and current access environment.At the same time, the historical access behavior module was divided into two aspects: conventional behavior and gray behavior, and the current access environment module was divided into two directions: information integrity and access security.The corresponding control criteria was divided to construct the analytic network process (ANP) model under different control objectives.The limit hypermatrix under each target module was calculated to obtain the final stability weight of each element with the help of network analytic hierarchy process software.And the real user behavior data under the development platform was selected to comprehensively calculate the trust degree under different modules as the final behavior evaluation result.The expansion of the user behavior evaluation module refined the evaluation granularity, which makes the evaluation results more objective and accurate.In the cloud environment with the same malicious ratio, the optimization mechanism has better recognition effect, and it can identify cloud users with low trust efficiently and effectively, so as to improve the security and legitimacy of the cloud.At the same time, it also provids new research direction for solving the problem of user security and credibility, and effective risk control in the cloud environment.…”
Get full text
Article