Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7401
MODELING OF POWER SYSTEMS AND TESTING OF RELAY PROTECTION DEVICES IN REAL AND MODEL TIME
Published 2017-05-01“…Examples are given of the use of RTDS systems by foreign energy companies to test relay protection systems and control, to test the equipment and devices of automatic control, analysis of cyber security and evaluation of the operation of energy systems under different scenarios of occurrence of emergency situations. …”
Get full text
Article -
7402
Rehabilomics Strategies Enabled by Cloud-Based Rehabilitation: Scoping Review
Published 2025-01-01“…In particular, a comprehensive analysis was conducted on 28 studies, including 16 (57%) focused on personalized rehabilitation and 12 (43%) on data security and privacy. The distribution of articles among the 28 studies based on specific keywords included 3 (11%) on the cloud, 4 (14%) on platforms, 4 (14%) on hospitals and rehabilitation centers, 5 (18%) on telehealth, 5 (18%) on home and community, and 7 (25%) on disease and disability. …”
Get full text
Article -
7403
Counteraction to Political Terrorism in the Russian empire on the Example of Ukrainian provinces in Late ХІХ – Early ХХ Century
Published 2021-07-01“…Among them were: the palace guard, the police department, the palace agency, security departments of the Ministry of Internal Affairs, the corps of gendarmes. …”
Get full text
Article -
7404
-
7405
Hydroclimatic Variability, Characterization, and Long Term Spacio-Temporal Trend Analysis of the Ghba River Subbasin, Ethiopia
Published 2022-01-01“…Despite its importance for improved and sustainable water allocation for water supply-demand and food security, varying patterns of streamflow and their association with climate change are not well understood in the basin. …”
Get full text
Article -
7406
PRAPD: A novel received signal strength–based approach for practical rogue access point detection
Published 2018-08-01“…Rogue access point attack is one of the most important security threats for wireless local networks and has attracted great attention from both academia and industry. …”
Get full text
Article -
7407
-
7408
Service Quality (Servqual) Toward Rawa Bebek’s Rusunawa Residents in Dki Jakarta
Published 2023-08-01“…Fiscal Responsibility, and 8). Security. While Methods used are Descriptive methods with a qualitative approach. …”
Get full text
Article -
7409
Trends in urban edible landscapes: a comprehensive bibliometric analysis
Published 2025-01-01“…In response to the dual challenges of urbanization and population growth, urban edible landscapes have emerged as innovative green infrastructure with the potential to address ecological, social, economic, and food security issues. This study systematically analyzes 3,089 publications from 2000 to 2024, sourced from the Web of Science database, using keywords such as ‘Edible Landscapes,’ ‘Edible Garden,’ ‘Rooftop Garden,’ ‘Community Garden,’ and ‘Productive Landscape.’ …”
Get full text
Article -
7410
Food insecurity confrontation by pastoralist and agrarian communities in South Omo Zone, Ethiopia: a facility-based qualitative study
Published 2025-01-01“…Tailored intervention is highly demanding to implement policies to stabilise food supply chains and mitigate food shortages in both agrarian and pastoralist areas, invest in modern agricultural technologies to boost productivity, encourage the adoption of climate-smart agricultural practices to help farmers adapt to changing weather patterns, optimise the productive use of available farmland, promote income-generating activities, and diversify livelihoods to alleviate income constraints and improve food security.…”
Get full text
Article -
7411
A Critical Appraisal of Emergency Medicine Specialty Training and Resignation among Residents in Emergency Medicine in Turkey
Published 2019-01-01“…Most frequent reasons of resignation were violence/security concerns (63.4%), busy work environment (53.7%), and mobbing (26.8%). …”
Get full text
Article -
7412
Software diversification method based on binary rewriting
Published 2023-04-01“…Software diversity is an effective defense against code-reuse attacks, but most existing software diversification technologies are based on source code.Obtaining program source code may be difficult, while binary files are challenging to disassemble accurately and distinguish between code pointers and data constants.This makes binary file diversification difficult to generate high levels of randomization entropy, and easily compromised by attackers.To overcome these challenges, a binary file oriented software diversification method was proposed based on static binary rewriting technology, namely instruction offset randomization.This method inserted NOP instructions of varying byte lengths before program instructions with a certain probability, reducing the number of unintended gadgets in the program and randomly offsetting the original instruction address.This disrupts the program’s original memory layout and increases the cost of code-reuse attacks.At the same time, an optimization strategy based on hot code was designed for this method.The execution times of basic blocks in binary files were obtained by dynamic pile insertion, so as to adjust the NOP instruction insertion probability in each basic block.The higher the execution frequency, the fewer NOP instructions were inserted into the basic block, which can ensure lower performance overhead and produce higher randomization entropy.In the experimental part, the SPEC benchmark program was used to test the optimized method from the aspects of performance overhead, gadget survival rate and file size.The results show that a 15% insertion probability achieves the best effect, with an average gadget survival rate of less than 1.49%, increasing attackers’ difficulty in reusing the same gadget attack chain.Furthermore, only a 4.1% operation overhead and 7.7% space overhead are added, maintaining high levels of security.…”
Get full text
Article -
7413
Research on Spread Spectrum Codes Optimized by Sparrow Search Algorithm and Extreme Gradient Boosting
Published 2024-12-01“…【Objective】Direct Sequence Spread Spectrum (DSSS) has been widely used in military and civilian communications due to its strong resistance to various common interferences, high security, and ease of implementation. It has been widely used in Code Division Multiple Access (CDMA) system. …”
Get full text
Article -
7414
The <i>OsGATA</i> gene family as a promising candidate for applying the CRISPR/Cas genome editing technology to improve the nutritional and yield qualities of rice (<i>Oryza sativa...
Published 2025-01-01“…Molecular breeding of rice (Oryza sativa L.) for yield is of great importance for ensuring food security of the population. Living organisms manifest genetically determined responses to environmental factors, including stressors. …”
Get full text
Article -
7415
Integrative multi-omics analysis reveals the translational landscape of the plant-parasitic nematode Meloidogyne incognita
Published 2025-01-01“…Abstract Root-knot nematodes (RKNs) of the genus Meloidogyne pose the most significant threats to global food security due to their destructive nature as plant-parasitic nematodes. …”
Get full text
Article -
7416
Features of law enforcement practice in the collection and evaluation of evidence to protect the social rights of police officers
Published 2022-03-01“…The peculiarities of the sources of evidence in the construction of the legal position of protection of social rights of police officers, including the receipt of additional surcharges to the financial security during quarantine, are formulated. Proposals on the use of documents, as well as high-quality motivation of the actual circumstances of the performance of police duties in quarantine, related to the livelihood of the population, the provision of services and law enforcement are analyzed and provided. …”
Get full text
Article -
7417
CHIEF OBAFEMI AWOLOWO’S POLITICAL PHILOSOPHY AND WELFARIST APPROACH TO STATECRAFT IN NIGERIA’S FIRST AND SECOND REPUBLIC
Published 2024-07-01“…He made sure that effective governance includes the following: transparency, accountability, social justice, fairness, and equity, and selflessness, critical observation of the rule of law, purposeful leadership, effective institutions, and legitimacy of political economic and administrative authority, security and order. Awolowo believed the intellectual capacity of people is crucial. …”
Get full text
Article -
7418
Smart In-Cabin Air Monitoring System using IoT Technologies
Published 2024-01-01“…This step allows the owner to resolve the situation without compromising the security of the vehicle. If the readings continue to depreciate, the Arduino will roll down the windows slightly allowing fresh air into the cabin, message the driver again to inform them of the action taken and alert the authorities to act immediately in case medical assistance is required. …”
Get full text
Article -
7419
Physical and chemical processes driven by natural iron minerals in aquatic environments
Published 2025-01-01Get full text
Article -
7420
IMPACT OF AUDIT QUALITY ON EARNINGS MANAGEMENT OF CONSUMER GOODS FIRMS IN NIGERIA
Published 2024-09-01“…Based on findings and conclusion, it is therefore, recommends that the regulatory bodies such as Financial Reporting Council of Nigeria and Security and Exchange Commission in Nigeria should ensure that audited reports for private companies are release within a regulated period, this is because prolonged audit lagged increase earnings management by giving management of the companies enough time to manipulate earnings. …”
Get full text
Article