Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7281
Yorùbá Literary Artists on Youths and Parenthood
Published 2022-01-01“…The natural psycho-biological development of youths and young adults, living in a nation going through socio-political economic and security challenges, coupled with their being nurtured in some cases through faulty parenting, have manifested in the typology of Nigerian youths. …”
Get full text
Article -
7282
Evaluation of the effect of physical-environmental factors of public spaces on the mental health of citizens (Case study: Ardabil city)
Published 2020-12-01“…The results of this study showed that legibility and visual quality, access to urban green space, security of urban space, quality of urban furniture, mixing and variety of uses have a positive and significant effect on the mental health of citizens. …”
Get full text
Article -
7283
Improving Super-Resolution in Face Images by Modeling Image Degradation Using Pairs of High-Quality and Low-Quality Images
Published 2025-01-01“…<p><span style="font-size: 10.0pt; line-height: 125%; font-family: 'Georgia',serif; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Georgia; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi; mso-ansi-language: EN-US; mso-fareast-language: JA; mso-bidi-language: AR-SA;"> </span><span style="font-size: 11pt; line-height: 125%; font-family: Calibri, sans-serif;">Improving image quality for identification and authentication in security and surveillance systems is of particular importance, and today, using artificial intelligence, the quality of images can be significantly improved. …”
Get full text
Article -
7284
Problems of proving in criminal proceedings based on violations of war laws and customs
Published 2022-06-01“…It is proposed to establish operational cooperation between investigators and the Security Service of Ukraine, to develop a unified methodology for investigating crimes related to violations of the laws and customs of war. …”
Get full text
Article -
7285
Next-gen agriculture: integrating AI and XAI for precision crop yield predictions
Published 2025-01-01“…Climate change poses significant challenges to global food security by altering precipitation patterns and increasing the frequency of extreme weather events such as droughts, heatwaves, and floods. …”
Get full text
Article -
7286
-
7287
Demonstration of high-reconfigurability and low-power strong physical unclonable function empowered by FeFET cycle-to-cycle variation and charge-domain computing
Published 2025-01-01“…These performances highlight the great promise of the FeFET-based strong PUF as a feasible IoT security solution.…”
Get full text
Article -
7288
The icon of Ukrainian Nazis: on the question of the historical assessment of the «heroes» under the Protection of the Virgin Mary and their modern admirers
Published 2024-05-01“…In addition to the image itself, which became the reason for writing this article, the source for the study is the forensic investigative documentation of the Soviet state security agencies, during and after the end of the Great Patriotic War, interrogating captured employees of the German special services, Ukrainian nationalists and witnesses to their war crimes. …”
Get full text
Article -
7289
An Efficient FPGA Implementation of Optimized Anisotropic Diffusion Filtering of Images
Published 2016-01-01“…Digital image processing is an exciting area of research with a variety of applications including medical, surveillance security systems, defence, and space applications. …”
Get full text
Article -
7290
Encrypted traffic identification method based on deep residual capsule network with attention mechanism
Published 2023-02-01“…With the improvement of users’ security awareness and the development of encryption technology, encrypted traffic has become an important part of network traffic, and identifying encrypted traffic has become an important part of network traffic supervision.The encrypted traffic identification method based on the traditional deep learning model has problems such as poor effect and long model training time.To address these problems, the encrypted traffic identification method based on a deep residual capsule network (DRCN) was proposed.However, the original capsule network was stacked in the form of full connection, which lead to a small model coupling coefficient and it was impossible to build a deep network model.The DRCN model adopted the dynamic routing algorithm based on the three-dimensional convolutional algorithm (3DCNN) instead of the fully-connected dynamic routing algorithm, to reduce the parameters passed between each capsule layer, decrease the complexity of operations, and then build the deep capsule network to improve the accuracy and efficiency of recognition.The channel attention mechanism was introduced to assign different weights to different features, and then the influence of useless features on the recognition results was reduced.The introduction of the residual network into the capsule network layer and the construction of the residual capsule network module alleviated the gradient disappearance problem of the deep capsule network.In terms of data pre-processing, the first 784byte of the intercepted packets was converted into images as input of the DRCN model, to avoid manual feature extraction and reduce the labor cost of encrypted traffic recognition.The experimental results on the ISCXVPN2016 dataset show that the accuracy of the DRCN model is improved by 5.54% and the training time of the model is reduced by 232s compared with the BLSTM model with the best performance.In addition, the accuracy of the DRCN model reaches 94.3% on the small dataset.The above experimental results prove that the proposed recognition scheme has high recognition rate, good performance and applicability.…”
Get full text
Article -
7291
Blockchain technology in healthcare strengthening: The Nigerian case
Published 2024-12-01“…Blockchain technology has many practical applications in the healthcare sector, including precision medicine and interoperability, supply chain management, authorization exchange of health information, security, and authorization, all of which are pivotal for effective health systems and quality health services. …”
Get full text
Article -
7292
-
7293
Trends and constraints of utilization of preserved cowpea leaves among households in arid and semi-arid lands in Kenya: a convergent mixed method study
Published 2021-11-01“…Abstract Background As much as local communities have employed traditional techniques of preservation to enhance availability and utilization of cowpea leaves, the efficiency of these techniques in achieving food security need to be established. The current study sought to document trends and constraints of utilization of preserved cowpea leaves in the arid and semi-arid lands (ASALs) in order to overcome of seasonal availability of the vegetable. …”
Get full text
Article -
7294
Anti‐freezing electrolyte modification strategies toward low‐temperature aqueous zinc‐ion batteries
Published 2024-12-01“…Abstract Due to the availability of zinc resources, and reduced security risks, aqueous zinc‐ion batteries (AZIBs) are potential contenders for next‐generation energy storage systems. …”
Get full text
Article -
7295
Social risks of e-learning in a digital society
Published 2020-05-01“…The characteristic of risk types has been made in relation to such characteristics of modern society as the complexity of self-organization processes, the open nature and non-linearity of transformation processes.The understanding of various types of risks has been explained, that are associated with the problems of implementing the goals of humanistic educational policy; incomplete integration of methodological tools for e-learning; the break in educational traditions; conflicts between subjects of educational relations; the lack of adaptability of digital technologies to the content of social interaction; the complexity of the nature of distance learning technologies in the modern supercomplex socio-global system; impact on the formalization of learning new types of rationality; objectively inherent in modern society’s global social risks; conflicts of social movements with the interests of the subjects realizing the functions of education; with the indivisibility of the security of complex society in different spheres and levels of social interaction. …”
Get full text
Article -
7296
Assessment and Modelling of Walk Trips in Akure, Nigeria
Published 2024-09-01“…Generally, the factors that motivated respondents to choose walking as a travel mode included its relative affordability, the lack of personal vehicles, awareness of health benefits, safety and security concerns, avoidance of motorized traffic congestion, and favorable weather conditions. …”
Get full text
Article -
7297
Effects of Elevated CO<sub>2</sub> on Maize Physiological and Biochemical Processes
Published 2025-01-01“…This balance is essential for optimizing maize cultivation for food security, biofuel production, and environmental sustainability.…”
Get full text
Article -
7298
Interdependency classification: a framework for infrastructure resilience
Published 2025-01-01“…Critical Infrastructure Systems (CISs) provide essential services for nation-wide security, economy, and social well-being, and these systems are becoming increasingly interdependent to maintain those services. …”
Get full text
Article -
7299
-
7300
Impact of the COVID-19 Crisis on the Regulation to Tourism in the Czech Republic
Published 2021-05-01“…On the basis of the research, the most important aid factors were identified: financial aid, greater support from the State and municipalities, exemption of social security and health insurance payments, promotion of tourism and guide services, support in the form of upgrading skills and retraining. …”
Get full text
Article