Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7341
The effects of environmental patents on renewable energy consumption
Published 2024-10-01“…Environmental degradation and energy security are two of policymakers' most crucial concerns, with an increasing emphasis on renewable energy development. …”
Get full text
Article -
7342
Until you have something to lose! Loss aversion and two-factor authentication adoption
Published 2025-01-01“…While 2FA increases the security level of authentication methods, it also requires extra efforts that can translate to some level of inconvenience on the user's end. …”
Get full text
Article -
7343
Nurses’ health and work experiences during the COVID-19 pandemic in Swedish prehospital and hospital care: a deductive content analysis through the lens of the swAge model
Published 2025-01-01“…Abstract Working as a nurse offers job security but also poses risks for mental health issues. …”
Get full text
Article -
7344
CHALLENGES OF LOCALIZATION OF THE POLICY FRAMEWORK AND NATIONAL ACTION PLAN FOR PREVENTING VIOLENT EXTREMISM IN PLATEAU STATE, NIGERIA
Published 2023-12-01“…These threats have gravely undermined economic development, social progress, political stability, national and human security, and peaceful coexistence in the country. …”
Get full text
Article -
7345
Hydrogeochemical characteristics and environmental significance of travertine landscape in Muji area
Published 2025-01-01“…It is urgent to strengthen the investigation of its environmental status and the assessment of water resources security. This study analyzed the hydrochemical characteristics of groundwater and the distribution of 21 trace heavy metals in a typical travertine landscape in Muji, Xinjiang. …”
Get full text
Article -
7346
Formal Verification of ERC-Based Smart Contracts: A Systematic Literature Review
Published 2025-01-01“…Despite the trusted implementations that smart contracts offer, including those based on standards, different security problems and vulnerabilities arise during their development and execution. …”
Get full text
Article -
7347
Analysis of Techno–Economic and Social Impacts of Electric Vehicle Charging Ecosystem in the Distribution Network Integrated with Solar DG and DSTATCOM
Published 2025-01-01“…The study aims to maximize the technical, financial, and social benefits while ensuring that all security constraints are met. To assess the financial viability of the proposed model over a 10-year horizon, a detailed economic analysis comprising installation cost, operation, and maintenance cost is conducted. …”
Get full text
Article -
7348
A two-stage flexible scheduling method for power systems with wind power considering the coordination of multiple resources
Published 2025-01-01“…The intermittency and uncertainty of renewable energy generations, such as wind power, present great challenges to the secure and stable operation of power grids. To accommodate a high penetration of renewable energy, it is vital to coordinate multiple flexible resources to deal with the intermittency and uncertainty of renewable energy and ensure the network security. …”
Get full text
Article -
7349
Improved insulator location and defect detection method based on GhostNet and YOLOv5s networks
Published 2024-09-01“…Outdoor, real-time, and accurate detection of insulator defect locations can effectively avoid the occurrence of power grid security accidents. This paper proposes an improved GhostNet-YOLOv5s algorithm based on GhostNet and YOLOv5 models. …”
Get full text
Article -
7350
A voltage weak node identification method considering fault reconstruction in distribution networks
Published 2025-01-01“…Finally, the weak node evaluation index system and identification method are proposed according to the relative position relationship between the voltage visible security region of distribution network and the node voltage index trajectory by considering the normal state and N-1+1 fault state operation conditions of the distribution network. …”
Get full text
Article -
7351
A Survey on True Random Number Generators Based on Chaos
Published 2019-01-01“…With the rapid development of communication technology and the popularization of network, information security has been highly valued by all walks of life. …”
Get full text
Article -
7352
Study of Multi-Service Networks and Communication Systems Using Distributed Network Technology in Mountain Areas
Published 2025-01-01“…It was found that the integrated performance indicators of multiservice corporate networks are largely determined by the reliability, information security and quality of service of IP / MPLS switching nodes and the IMS-Internet Protocol Multimedia Subsystem multimedia communication system using the signaling system and protocols for providing multimedia services and establishing session sessions. …”
Get full text
Article -
7353
Structural Characterization of Functional Ingredient Levan Synthesized by Bacillus siamensis Isolated from Traditional Fermented Food in Thailand
Published 2020-01-01“…The rising global population continues to threaten the world’s food security. The discovery of new technologies to produce food of nutritional and functional properties is urgently needed. …”
Get full text
Article -
7354
Assessment of Heavy Metal Contamination in Paddy Field Soils: A Case Study in Ranau Valley, Sabah, Malaysia
Published 2024-01-01“…Regular monitoring and sustainable soil management practices will be essential to safeguard soil health, ensure food security, and reduce environmental risks in the Ranau Valley.…”
Get full text
Article -
7355
Transforming Education Through Blockchain: A Systematic Review of Applications, Projects, and Challenges
Published 2025-01-01“…The unique features of blockchain, notably decentralization, trustworthiness, and security, have attracted considerable attention from researchers investigating its application in education. …”
Get full text
Article -
7356
-
7357
Single-Cell protein for feed and food
Published 2025-01-01“…As global demand for protein sources continues to rise due to increasing populations and changing dietary preferences, the shortage of conventional protein for feed and food poses significant challenges for food security. Single-cell protein (SCP), derived from microorganisms such as yeasts and bacteria, represents a promising alternative to traditional protein sources. …”
Get full text
Article -
7358
Digitalisation factors influencing the dynamic capabilities of small and medium enterprises in the healthcare sector
Published 2024-06-01“…Results: The empirical results show that SME performance (β=0.132, p<0.05), task-technology fit (β=0.052, p<0.05), internet access (β=0.235, p<0.05), customer service (β=0.057, p<0.05), information sharing (β=0.022, p<0.05), innovation (β=0.125, p<0.05), and data security (β=0.427, p<0.05) are highly significant in the digitalisation of DC of SMEs. …”
Get full text
Article -
7359
UJI SITOTOKSITAS DAN ANTIPROLIFERATIF SEL KANKER PAYUDARA T47D DAN SEL VERO BIJI Nigella sativa, L.
Published 2012-05-01“…Ethanol extract of cumin seeds have a higher potential due to the highest security index compared to ether extract and infusa. …”
Get full text
Article -
7360
Generative adversarial synthetic neighbors-based unsupervised anomaly detection
Published 2025-01-01“…Abstract Anomaly detection is crucial for the stable operation of mechanical systems, securing financial transactions, and ensuring network security, among other critical areas. …”
Get full text
Article