Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7421
«Basically, I am here to help you»
Published 2021-09-01“…We argue that this intervention clearly demonstrates certain dilemmas and conflicts inherent in the Norwegian Government’s recent policies on counter-extremism, where the concept of «concern» [bekymring] encompasses control and care, and includes agendas related to security and welfare, respectively. Applying a Foucauldian conceptual framework, we analyse the conversation of concern as a technique of pastoral power in which conflicting agendas interact in problematic ways, and the exercising of state power and control is neutralised through a notion of a general common good; «concern».…”
Get full text
Article -
7422
Combating economic crime in Ukraine in 1946–1949
Published 2023-12-01“…The most common crimes were the following: 1) maliciously delaying the repair of agricultural machinery, allegedly due to the lack of spare parts and specialists; 2) theft of grain during its transportation and sowing by persons responsible for this (weighers, field crew leaders, guards); 3) theft of seeds and fuel by security guards; 4) theft and embezzlement of seeds by officials of collective and state farms and subsidiary farms; 5) theft of seed by reducing the seeding rate and theft of fuel due to lack of control over its consumption; 6) theft of seeds by employees of storage facilities with their subsequent resale at markets at speculative prices; 7) creation of surplus seeds by weighing, moistening, writing off for drying, and increasing waste during sorting. …”
Get full text
Article -
7423
Design of miner type identification mechanism based on reputation management model
Published 2022-02-01“…In the public mining pool, miners can freely enter the mining pool to submit proof of work to obtain rewards, and there are no conditions to restrict different types of miners.There will be malicious miners submitting invalid workloads and miners not submitting workloads in the mining pool, occupying the verification computing resources of the mining pool, reducing the verification efficiency of the mining pool, and causing the mining pool system to collapse.Aiming at the problem that it is difficult to distinguish the type of miners in the mining pool, which leads to the collapse of the mining pool system, a reputation management mechanism was introduced to measure the behavior of miners, and contracts were deployed to prevent miners from colluding with the pool manager.A design of miner type identification mechanism based on reputation management model was proposed.A reputation mechanism was constructed to measure the behavior of miners.When a miner conducts malicious behavior, the miner's reputation value would be lowered.When the miner's reputation value was less than the reputation threshold of the mining pool, the system would remove the miner, so that the miner can no longer enter the mining pool to submit proof of work and get rewards.The miners in the mining pool were dynamically updated by Markov process, so that the miners in the mining pool were conducting honest behaviors and submitting proof of work.At the same time, a reward system was designed to motivate the miners in the mining pool, and smart contracts were deployed in the mining pool to prevent miners from collusion with the mining pool manager.Finally, analyzing the scheme from the perspective of security and performance, the proposed scheme was not only safe in the process of miners submitting proof of workload, but also solved the problem of identifying miner types in public mining pools, thereby solving the problem of malicious miners submitting invalid workloads, eliminating malicious miners, and avoiding mining pools verifying invalid workloads, to improve the verification efficiency of the mining pool.…”
Get full text
Article -
7424
A Comparison Study of Person Identification Using IR Array Sensors and LiDAR
Published 2025-01-01“…Person identification is a critical task in applications such as security and surveillance, requiring reliable systems that perform robustly under diverse conditions. …”
Get full text
Article -
7425
Effect of agro industrial wastes compost on soil health and onion yields improvements: Study at field condition
Published 2024-01-01“…This can be recommended for small scale farmerâs food security improvement and combined with agro industrial wastes management.…”
Get full text
Article -
7426
The work of return to work. Challenges of returning to work when you have chronic pain: a meta-ethnography
Published 2019-06-01“…All were influenced by societal expectations in relation to work, self (self-belief, self-efficacy, legitimacy, autonomy and the meaning of work for the individual), health/illness/pain representations, prereturn to work support and rehabilitation, and system factors (healthcare, workplace and social security). A mismatch of expectations between the individual with pain and the workplace contributed to a feeling of being judged and difficulties asking for help. …”
Get full text
Article -
7427
Beyond boundaries: Charting the frontier of healthcare with big data and ai advancements in pharmacovigilance
Published 2025-03-01“…It delves into the notable benefits and challenges encountered in advancing data analytics of the early 21st century.In many countries, Post-marketing surveillance of drug safety relinquishes on a systematic analysis of spontaneous using Generative artificial intelligence (AI) to overcome gaps in the present PV ecosystem is critical to maintaining an uninterrupted record of security and effectiveness within healthcare analytics, data mining techniques, predictive analytics, and the emergence of scientific fields like bioinformatics and health informatics are empowered by Big Data. …”
Get full text
Article -
7428
Analysis and modeling of factor determinants of food provision at consumer market of Ukraine
Published 2019-08-01“…It is entity content and main macroeconomic functions oriented at production, sales, and consumption of food, undertaken by the state to maintain the ongoing process of social reproduction and security guaranteeing in the country. It is hypothesized that the change in income of the population, Consumer Price Index, total expenditures of households on food and agricultural production per capita have the largest influence on food provision of the consumer market in the country. …”
Get full text
Article -
7429
Evaluating the validity of self-reported smoking in Mexican adolescents
Published 2015-10-01Get full text
Article -
7430
TRANSNATIONAL THREATS AND FOREIGN POLICY SHIFTS: INVESTIGATING THE IMPACT OF GLOBALIZATION ON WEST AFRICAN COUNTRIES
Published 2024-08-01“…Therefore, the findings revealed that globalisation, while promoting economic growth, cultural interaction, and technical progress in West Africa states, has also given rise to non-state actors like terrorists and has disruptive consequences for sovereignty and national security. Therefore, the paper concluded that it is necessary for West Africa nations to establish efficient governance systems, regional collaboration platforms, and policies that capitalise on the advantages of globalisation while minimising its negative consequences. …”
Get full text
Article -
7431
RESIDENTS’ COMPLIANCE WITH BUILDING SETBACKS IN IBADAN NORTH LOCAL GOVERNMENT AREA OF OYO STATE, NIGERIA
Published 2024-08-01“…The majority of the setbacks that were converted to other uses in low residential areas was used for security post (81.6%) while the largest proportion (35.4%) in medium and high-density areas (15.7%) were used for shop construction. …”
Get full text
Article -
7432
Joint Frequency Stabilisation in Future 100% Renewable Electric Power Systems
Published 2025-01-01“…Due to the energy transition, the future electric power system will face further challenges that affect the functionality of the electricity grid and therefore the security of supply. For this reason, this article examines the future frequency stabilisation in a 100% renewable electric power system. …”
Get full text
Article -
7433
From the guest editors
Published 2013-07-01“…Specifically, he co-authored a textbook in Mathematical Biology in 2001 (second edition in 2012); a volume (with Harvey Thomas Banks) on the use of mathematical models in homeland security published in SIAM's Frontiers in Applied Mathematics Series (2003); and co-edited volumes in the Series Contemporary Mathematics entitled ``Mathematical Studies on Human Disease Dynamics: Emerging Paradigms and Challenges'' (American Mathematical Society, 2006) and Mathematical and Statistical Estimation Approaches in Epidemiology (Springer-Verlag, 2009) highlighting his interests in the applications of mathematics in emerging and re-emerging diseases. …”
Get full text
Article -
7434
Insider threat detection based on operational attention and data augmentation
Published 2023-06-01“…In recent years, there has been an increased focus on the issue of insider threats.Insider threats are a major cause security breaches in organizations and pose an ongoing challenge.By analyzing the existing insider threat data, it was identified that the biggest challenge in insider threat detection lies in data imbalance and the limited number of labeled threat samples.In the Cert R4.2 dataset, which is a classic dataset for insider threat detection, there are over 3.22 million log data, but only 7,423 are marked as malicious operation logs.Furthermore, most of the operation types in the logs are not related to malicious behavior, and only two types of operations are highly correlated with malicious behavior, such as leaking company data, creating interference in the detection process.To address this challenge, a data processing framework was designed based on operational attention and data augmentation.Anomaly evaluation was first performed on operations by the framework, and operations with low anomaly scores were then masked.This makes the model better focus on operations related to malicious behavior, which can be considered as a hard attention mechanism for operations.Next, the characteristics of the insider threat dataset were analyzed, and three rules were designed for data augmentation on malicious samples to increase the diversity of samples and alleviate the substantial imbalance between positive and negative samples.Supervised insider threat detection was regarded as a time-series classification problem.Residual connections were added to the LSTM-FCN model to achieve multi-granularity detection, and indicators such as precision rate and recall rate were used to evaluate the model.The results indicate superior performance over existing baseline models.Moreover, the data processing framework was implemented on various classic models, such as ITD-Bert and TextCNN, and the results show that the methods effectively improve the performance of insider threat detection models.…”
Get full text
Article -
7435
Burden of scabies in a Ghanaian penitentiary.
Published 2024-01-01“…Therefore, we aimed to assess the burden of scabies and ascertain if prevalence was high enough to warrant mass drug administration (MDA) with ivermectin in a medium security prison in central Ghana.<h4>Methods</h4>We conducted a cross-sectional study in December 2022 and recruited inmates at the Kumasi central prison in Ghana. …”
Get full text
Article -
7436
About a concept of creating a social network users information aggregation and data processing system
Published 2019-02-01“…The developed universal system is based on the information technology of data warehousing, and it has the following aspects: an expandable complex subject area, the integration of stored data that come from various sources, the invariance of stored data in time with mandatory labels, relatively high data stability, the search for necessary trade-off in data redundancy, modularity of individual system units, fl and extensibility of the architecture, high security requirements vulnerable data.The proposed system organizes the process of collecting data and filling the database from external sources. …”
Get full text
Article -
7437
Decentralized electrochemical biosensors for biomedical applications: From lab to home
Published 2025-01-01“…However, potential risks such as data security vulnerabilities, privacy concerns, and regulatory challenges must be addressed to ensure safe and ethical deployment of these technologies. …”
Get full text
Article -
7438
Revolutionizing Agriculture: A Comprehensive Review of AI-Enabled Precision Irrigation and Water Quality Forecasting
Published 2024-12-01“…This review emphasizes AI's role in addressing water scarcity and optimizing irrigation in agriculture by utilizing different technologies to ensure sustainable water management and food security. Future researchers will find this review valuable for understanding AI's current impact on irrigation and identifying avenues for further innovation. …”
Get full text
Article -
7439
Realizacja prawa człowieka do żywności: uwagi wstępne na temat oceny bezpieczeństwa żywnościowego
Published 2022-03-01“…Celem pracy jest analiza realizacji prawa do żywności w różnych krajach oraz określenie wyzwań związanych z interpretacją wartości globalnego wskaźnika bezpieczeństwa żywnościowego (Global Food Security Index, GFSI). Liczba osób niedożywionych zwiększa się w Afryce Subsaharyjskiej i Południowej Azji, a jednocześnie rośnie udział osób z nadwagą w Ameryce Północnej i Europie. …”
Get full text
Article -
7440
An Exploratory Investigation of Chatbot Applications in Anxiety Management: A Focus on Personalized Interventions
Published 2024-12-01“…However, limitations persist, such as the lack of human empathy, ethical and privacy concerns related to data security, and technical challenges in understanding complex human emotions. …”
Get full text
Article