Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7321
Enjeux sanitaires, socio-économiques et environnementaux liés à la réutilisation des eaux usées dans le maraîchage urbain : cas du bassin versant de l’Abiergué (Yaoundé-Cameroun)...
Published 2010-09-01“…Many practices and many risk behaviors contribute to the spread of waterborne diseases.Despite the risk of waterborne diseases, this activity contributes significantly to food security, strengthening the economic potential, development of urban space in short to improve conditions and the framework of life of the categories of actors involved in this activity in particular and population in general.Actions economically viable, socially acceptable and ecologically sustainable are to be implemented by State or NGO in order to reduce the negative aspects and strengthen the positive aspects of this multipurpose activity.…”
Get full text
Article -
7322
Molecular investigation of how drought stress affects chlorophyll metabolism and photosynthesis in leaves of C3 and C4 plant species: A transcriptome meta-analysis
Published 2025-02-01“…Understanding the effects of drought stress on photosynthetic pathways, particularly in C3 and C4 plants, is crucial for maximizing agricultural productivity and maintaining food security. In this study, we analyzed RNA-seq data from leaves of common wheat (Triticum aestivum) and sorghum (Sorghum bicolor), as representatives of C3 and C4, using a meta-analysis approach to investigate the photosynthesis-related genes involved in the response to drought stress. …”
Get full text
Article -
7323
Prospects and directions of diversification of oilseed group crops
Published 2024-10-01“…Increasing the efficiency of growing oilseeds not only provides stable profits for farmers but also has a positive impact on the food security of the country in general. Thus, the introduction of scientifically based agronomic measures is a critical factor for achieving sustainable development of the agricultural sector and diversification of oilseeds…”
Get full text
Article -
7324
Impact of High-standard Farmland Construction policy on labor substitution by machinery in China:Evidence from quasi-experimental approaches at the macro and micro levels
Published 2024-12-01“…[Conclusion] To enhance the effect of labor substitution by machinery from the HSFC policy, precise measures are required to comprehensively solidify the foundation of food security. Enhancing integrated management of sloping farmland, improving rural roads, and reducing land fragmentation are essential measures for achieving agricultural mechanization. …”
Get full text
Article -
7325
Scenario-aware access control model
Published 2024-02-01“…Dynamic access control model is the theoretical basis for constructing a dynamic access control system for big data.However, most existing access control models can only fulfill dynamic access control in a single scenario and are unable to adapt to access control in multiple types of dynamic scenarios.These scenarios include changes in the contextual environment of big data, changes in entity relationships, and changes in the state of objects.To address these issues, an analysis was conducted based on the research of existing access control models and the dynamic factors of big data.Subsequently, scenario-aware access control (SAAC) model was proposed, which was based on dynamic factor conversion and scenario unified modeling.All types of dynamic factors were converted into basic elements such as attributes and relationships.Then, scene information was incorporated to model the various types of constituent elements in a unified manner.A big data dynamic access control model was constructed based on scene information to support multi-type dynamic factors and extended dynamic factors.The working framework of the SAAC model was designed, and the SAAC rule learning algorithm and SAAC rule execution algorithm were proposed corresponding to the workflow of the framework.This enabled the automatic learning of access control rules and dynamic access control decision-making.The security of the proposed model was analyzed and verified by introducing the non-transitive non-interference theory.To validate the effectiveness of the access control policy mining method of the proposed model, experimental comparisons were conducted between the SAAC model and baseline models such as ABAC-L, PBAC-X, DTRM, and FB-CAAC using four datasets.The experimental results demonstrate that the SAAC model and its strategy mining method outperforms the baseline models in terms of metrics such as area under the curve AUC, monotonicity, and steepness of the ROC curve.This verification confirms that the proposed model can support multiple types of dynamic factors and dynamic factor extensions, and that the combined effect of the access control rules obtained from its mining algorithm is relatively high.…”
Get full text
Article -
7326
HSTCN-NuSVC: A Homogeneous Stacked Deep Ensemble Learner for Classifying Human Actions Using Smartphones
Published 2025-02-01“…Smartphone-based human activity recognition (HAR) is an important research area due to its wide-ranging applications in health, security, gaming, etc. Existing HAR models face challenges such as tedious manual feature extraction/selection techniques, limited model generalisation, high computational cost, and inability to retain longer-term dependencies. …”
Get full text
Article -
7327
Combating antibiotic resistance: mechanisms, challenges, and innovative approaches in antibacterial drug development
Published 2025-01-01“…This review provides valuable insights for researchers and developers aiming to combat antibiotic resistance and advance the development of robust antibacterial therapies for future health security.…”
Get full text
Article -
7328
A Four-Year Monocentric Study of the Complications of Third Molars Extractions under General Anesthesia: About 2112 Patients
Published 2013-01-01“…One-day hospitalization offers a good balance between comfort, security, and cost. The incidence of complications is in agreement with the literature data, especially regarding pain, edema, and infectious and nervous complications. …”
Get full text
Article -
7329
The Surrogate Safety Appraisal of the Unconventional Elliptical and Turbo Roundabouts
Published 2018-01-01“…Therefore this comparative analysis allows reducing, in the preliminary phase, possible security impacts and also economic ones for the community.…”
Get full text
Article -
7330
Review of models for estimating 3D human pose using deep learning
Published 2025-02-01“…The review identifies key applications of HPE in industries like healthcare, security, and entertainment. Our findings suggest that while deep learning models have made significant strides, challenges in handling occlusion, real-time estimation, and generalization remain. …”
Get full text
Article -
7331
Government crisis communication tools in the light of the extreme drought of 2022
Published 2024-11-01“…According to satellite gravimetric measurements, the water security of the Carpathian Basin is changing in a negative direction. …”
Get full text
Article -
7332
A Collaborative Privacy Preserved Federated Learning Framework for Pneumonia Detection using Diverse Chest X-ray Data Silos
Published 2025-04-01“…Pneumonia detection from chest X-rays remains one of the most challenging tasks in the traditional centralized framework due to the requirement of data consolidation at the central location raising data privacy and security concerns. The amalgamation of healthcare data at the centralized storage leads to regulatory concerns passed by the governments of various countries. …”
Get full text
Article -
7333
An inquary on how to apply the approach of of Residents in Codification of conceptual concepts of the Persistent Iranian Neighbourhood updated with uses the Grounded theory meth...
Published 2019-09-01“…By means of position analysis, the final criteria were fixed. The parameters of security, sense of place, social status, spirituality and modern technology are one of the most important criteria for the survival of residents. …”
Get full text
Article -
7334
Redundancy and conflict detection method for label-based data flow control policy
Published 2023-10-01“…To address the challenge of redundancy and conflict detection in the label-based data flow control mechanism, a label description method based on atomic operations has been proposed.When the label is changed, there is unavoidable redundancy or conflict between the new label and the existing label.How to carry out redundancy and conflict detection is an urgent problem in the label-based data flow control mechanism.To address the above problem, a label description method was proposed based on atomic operation.The object label was generated by the logical combination of multiple atomic tags, and the atomic tag was used to describe the minimum security requirement.The above label description method realized the simplicity and richness of label description.To enhance the detection efficiency and reduce the difficulty of redundancy and conflict detection, a method based on the correlation of sets in labels was introduced.Moreover, based on the detection results of atomic tags and their logical relationships, redundancy and conflict detection of object labels was carried out, further improving the overall detection efficiency.Redundancy and conflict detection of atomic tags was based on the relationships between the operations contained in different atomic tags.If different atomic tags contained the same operation, the detection was performed by analyzing the relationship between subject attributes, environmental attributes, and rule types in the atomic tags.On the other hand, if different atomic tags contained different operations without any relationship between them, there was no redundancy or conflict.If there was a partial order relationship between the operations in the atomic tags, the detection was performed by analyzing the partial order relationship of different operations, and the relationship between subject attribute, environment attribute, and rule types in different atomic tags.The performance of the redundancy and conflict detection algorithm proposed is analyzed theoretically and experimentally, and the influence of the number and complexity of atomic tags on the detection performance is verified through experiments.…”
Get full text
Article -
7335
Some Basic Aspects of Militia Activities in Ukrainian SSR in 1933
Published 2019-03-01“…The introduction of the passport system positively affected the organization of combating crime and ensuring state security, the registration of receptees was established. …”
Get full text
Article -
7336
Ultra-Short-Term Distributed Photovoltaic Power Probabilistic Forecasting Method Based on Federated Learning and Joint Probability Distribution Modeling
Published 2025-01-01“…For the central server, information sharing among clients is realized through the interaction of global models and features while avoiding the direct interaction of raw data to ensure the security of client data privacy. For local clients, a Transformer autoencoder is used as the forecasting model to extract local temporal features, which are combined with global features to form spatiotemporal correlation features, thereby deeply exploring the spatiotemporal correlations between different power stations and improving the accuracy of forecasting. …”
Get full text
Article -
7337
Factors influencing street-vended foods quality and safety in developing countries: a review
Published 2025-01-01“…Abstract Street foods are an economic activity and source of income for the poor while contributing to the population’s food and nutritional security. However, they are among the main transmission routes for foodborne diseases. …”
Get full text
Article -
7338
Increasing Neural-Based Pedestrian Detectors’ Robustness to Adversarial Patch Attacks Using Anomaly Localization
Published 2025-01-01“…The results of the research demonstrate that the proposed method is promising for improvement of object detection systems security.…”
Get full text
Article -
7339
Transforming healthcare: Saudi Arabia's vision 2030 healthcare model
Published 2025-12-01“…Additionally, we addressed the challenges associated with it, such as the imperative to address the digital divide and ensure data security. Vision 2030 in Saudi Arabia brought about a significant transformation in the provision of healthcare. …”
Get full text
Article -
7340
Internet communications of military personnel and their families in social networks as an object of digital sociology’s study
Published 2020-02-01“…At the same time, ensuring military security involves protecting the minds of their military personnel from negative impact, including in the case of their use of services in the Internet space. …”
Get full text
Article