Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7521
Addressing technology-mediated stigma in sexual health-related digital platforms: Insights from design team members.
Published 2025-02-01“…., pop-up notifications, infographics, and video-based testimonials, and avoiding the use of cookies or other security-risk features) and non-functional design considerations (i.e., adopting an interprofessional and collaborative approach to design, educating software designers on domain knowledge about stigma, and ensuring consistent user testing of content). …”
Get full text
Article -
7522
Application of Classical and Genomic Cryptography on Textual Dataset
Published 2024-12-01“…Cryptology is one of the methods used when sharing confidential or private data over any communication network that poses a security risk. It is applied to restrict access, minimize or completely prevent dangerous situations. …”
Get full text
Article -
7523
Finding influential nodes in complex networks based on Kullback–Leibler model within the neighborhood
Published 2024-06-01“…Abstract As a research hot topic in the field of network security, the implementation of machine learning, such as federated learning, involves information interactions among a large number of distributed network devices. …”
Get full text
Article -
7524
Human drone interaction in delivery of medical supplies: A scoping review of experimental studies.
Published 2022-01-01“…Users must become integral part of the whole development process of medical drone services to reduce concerns, and to improve security, usability and usefulness of the system. Human drone interaction should be developed according to the identified categories of human drone interaction by using demand- and technology-driven approaches.…”
Get full text
Article -
7525
Advancing Sustainable Development Goals through Earth Observation Satellite Data: Current Insights and Future Directions
Published 2025-01-01“…For example, Sentinel data support both marine ecosystem monitoring (SDG 14) and climate adaptation (SDG 13), while Landsat data contribute to food security (SDG 2) and water resource management (SDG 6). …”
Get full text
Article -
7526
Factors influencing academic staff satisfaction and continuous usage of generative artificial intelligence (GenAI) in higher education
Published 2025-02-01“…The social influence did not correlate positively with the use of GenAI. Security and privacy were positively associated with staff satisfaction. …”
Get full text
Article -
7527
Integrating artificial intelligence and Internet of Things (IoT) for enhanced crop monitoring and management in precision agriculture
Published 2024-01-01“…Developing robust AI models and IoT devices for varied agricultural conditions, creating user-friendly interfaces for farmers, and addressing privacy and security concerns are essential. Addressing these gaps can enhance the effectiveness and adoption of AI and IoT in precision agriculture, leading to more sustainable and productive farming practices.…”
Get full text
Article -
7528
Process of effective management of the Eurasian transport system on the terms of integration
Published 2023-12-01“…Ensuring stability, security and prosperity in the Eurasian region meets interests of many states, primarily Russia and China, as well as their closest partners. …”
Get full text
Article -
7529
Impacts of Soil and Water Management Measures on Crop Production and Farm Income of Rural Households in the Damota Area Districts, Southern Ethiopia
Published 2021-01-01“…Improving crop productivity and farm income of rural households and ensuring food security through soil and water conservation (SWC) measures are one of the integral parts of sustainable livelihood approaches. …”
Get full text
Article -
7530
Newton Raphson based optimizer for optimal integration of FAS and RIS in wireless systems
Published 2025-03-01“…In modern wireless networks, the integration of Reconfigurable Intelligent Surface (RIS) and Fluid Antenna System (FAS) technologies offers a promising solution to the critical challenges such as signal attenuation, interference management, and security enhancement. This paper presents an application of a novel population-based metaheuristic algorithm of Newton Raphson Based Optimizer (NRBO) to efficiently integrating of FAS and RISs in wireless systems. …”
Get full text
Article -
7531
A Method for Trust Quantification in Cloud Computing Environments
Published 2016-02-01“…In such environments, ownership and control over the data may lead to potential conflict between the protection of data and the provision of services. Thus, cloud security has received a great deal of attention in recent years. …”
Get full text
Article -
7532
Batch-in-Batch: a new adversarial training framework for initial perturbation and sample selection
Published 2025-01-01Get full text
Article -
7533
Simultaneous Classification of Objects with Unknown Rejection (SCOUR) Using Infra-Red Sensor Imagery
Published 2025-01-01“…Recognizing targets in infra-red images is an important problem for defense and security applications. A deployed network must not only recognize the known classes, but it must also reject any new or <i>unknown</i> objects without confusing them to be one of the known classes. …”
Get full text
Article -
7534
Public Perception of Genetically Modified Organisms and the Implementation of Biosafety Measures in Kenya
Published 2024-01-01“…Fifty-seven percent of the respondents indicated GMOs and genetically modified (GM) foods are a solution to food security in Africa. A majority believe that the introduction of GMO technology and the use of GM food is beneficial (52.3%). …”
Get full text
Article -
7535
-
7536
Generative AI, IoT, and blockchain in healthcare: application, issues, and solutions
Published 2025-01-01“…Blockchain verifies and secures IoT data, improving medical care and treatment, according to case studies. …”
Get full text
Article -
7537
Philosophical Ideas of Arne Næss in the Humanitarian Diplomacy of Norway
Published 2015-06-01“…The author of the arcticle makes it a point to show on separate examples to what extend the ideas of Næss A. are compatible with the basic principles of Norway's contemporary humanitarian diplomacy - humanity, neutrality, impartiality and independence, - as well as with the aims put forward by Norway in this respect which are to encure the needed with the necessery security and assistance; to finance humanitarian actions based on the international principles of humanity, neutrality, impartiality and independence; to prepare international community to responses to global humanitarian challenges of the future; to prevent and respond to humanitarian crises and participate in eleminating their aftermath. …”
Get full text
Article -
7538
Effects of intravaginal curcumin gels combined with electroporation on vulvovaginal candidiasis
Published 2025-01-01Get full text
Article -
7539
Business Process Modeling Patterns for Blockchain Application Development
Published 2025-01-01“…To address this gap, this study proposes a comprehensive collection of data-driven patterns for business process modeling, comprising nine patterns that capture various blockchain-specific aspects, including token circulation, supply, and authorization, as well as smart contract security and authorization. Through a trend analysis of real-world blockchain applications, we identified recurring business processes across domains and validated our patterns by comparing them to existing literature and a proof-of-concept application. …”
Get full text
Article -
7540
Reversible data hiding scheme based on enhanced image smoothness
Published 2022-06-01“…With the prosperity of Internet technology and the popularity of social networks, reversible data hiding technology has been widely adopted in concealed information transmission of medical and military fields with its advantages on secret information recovery.Traditional reversible data hiding schemes mainly focus on the enhancement of embedding capacity and the reduction of the distortion rate of stego image, but pay less attention to the understanding of image details with the human eyes.Thus, it is difficult to resist hidden information detection methods.To solve the above challenge, a reversible data hiding algorithm was proposed, which ensured the visual quality of the stego image in the process of data hiding through the image visual smoothness enhancement.Specifically, the original image was divided into reference area and non-reference area.The secret data was embedded through the translation of the difference, which was calculated according to the predicted pixel value and the original pixel value of the non-reference area.To guarantee the visual quality of the image, smoothing mechanism was constructed, in which a Gaussian filter was utilized as a template to filter the predicted value and to add the filter difference into the cover image without loss.The pixel value of the reference region was used as edge information for lossless restoration of the original image.The filtering coefficient in Gaussian function was exploited as the embedded key to ensure the security of secret information.Simulation results regarding a large number of classical image data sets illustrated that the visual smoothness of stego image processed by this scheme was effectively enhanced with lower distortion rate, higher embedding rate, and higher embedding and extraction efficiency.In a typical circumstance, the similarity between the generated stego image and the Gaussian filter image can reach 0.9963.The PSNR and the embedded capacity can be up to 37.346 and 0.3289 BPP, respectively.…”
Get full text
Article