Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8201
Interrogating green social prescribing in South Wales; A multi-stakeholder qualitative exploration.
Published 2025-01-01“…<h4>Conclusions</h4>To ensure the continued provision of social prescribing schemes which are highly valued by service users, voluntary and third sector organisations require funding security and stability. The delivery of green, nature-based, schemes require maintenance of trusting, long-term relationships with local service co-ordinators and referrers, secure equitable funding models and agreement over conceptual basis of social prescribing itself, particularly in relation to 'where' social prescribing is located within health and social care models. …”
Get full text
Article -
8202
-
8203
Harnessing the Potential of Local Snacks Produced from African Yam Beans and Local Rice for Improved and Sustainable Livelihoods in Nigeria
Published 2024-12-01“…In order to improve food security and support sustainable livelihoods in Nigeria, this study recommends employing these indigenous crops to make nutritious snack options.…”
Get full text
Article -
8204
Scientific support of small fruit growing in Russia and prospects for its development
Published 2021-07-01“…It is possible to achieve the target indices of the Russian Doctrine of Food Security (self-sufficiency in fruits and berries should be at least 60 %) by combining the competencies of science and business. …”
Get full text
Article -
8205
Yield, Quality, Antioxidants, and Mineral Composition of Traditional Italian Storage Onion Cultivars in Response to Protein Hydrolysate and Microalgae Biostimulation
Published 2025-01-01“…Increasing interest is being devoted to environmentally friendly strategies, such as the use of plant biostimulants, to enhance crop performance and concurrently ensure food security under the perspective of sustainable management. …”
Get full text
Article -
8206
FRR: A Fast Routing Recovery mechanism minimizing network formation time in smart grids
Published 2025-03-01“…The adopted standards allow Wi-SUN FAN networks to take advantage of features such as security, frequency hopping, multi-hop packet routing, and IPv6 addressing, ensuring a wide coverage area and immunity against electromagnetic interference. …”
Get full text
Article -
8207
Microbial Contamination and Food Safety Aspects of Cassava Roasted Flour (“Rale”) in Mozambique
Published 2025-01-01“…Cassava is an important staple food that contributes to the food security of small-scale Mozambican farmers. In southern Mozambique, cassava roots are usually processed into cassava roasted flour, locally known as “rale”. …”
Get full text
Article -
8208
The role of fMRI in the mind decoding process in adults: a systematic review
Published 2025-01-01Get full text
Article -
8209
Improving the Quality of Meteorological Data and Services by Designing the Management Model of Information Systems and Information Technology
Published 2023-09-01“…The final findings of the research with 61indicators, 20categories and 5 themes include "information systems & information technology", "meteorological information infrastructure and technology", "meteorological data and information management", "meteorological service management" and "meteorological information and communication security" and in each of them four subclasses with the help of strategic reference points method was determined. …”
Get full text
Article -
8210
-
8211
Enhancing voice spoofing detection in noisy environments using frequency feature masking augmentation
Published 2025-03-01“…This technological evolution, however, introduces heightened security vulnerabilities such as voice spoofing attacks. …”
Get full text
Article -
8212
EAST ASIA - REGIONAL OR GLOBAL FINANCIAL INTEGRATION?
Published 2018-11-01“…As regional financial cooperation in Asia has not yet developed as in Western Europe and North America, it is important to pay attention to such essential elements as economic and financial supervision, normative harmonization of banking and securities market, strengthening of regional financial security system and maintenance of development of various segment of financial market, first of all bonds in local currency. …”
Get full text
Article -
8213
Metode Deteksi Intrusi Menggunakan Algoritme Extreme Learning Machine dengan Correlation-based Feature Selection
Published 2021-02-01“…Abstract Intrusion detection of computer networks is a very important activity carried out to maintain data and information security. Intrusion detection is the process of monitoring traffic on a network to detect any data patterns that are considered suspicious, which allows network attacks. …”
Get full text
Article -
8214
The Clinical Pharmacokinetics and Pharmacodynamics of Glimepiride—A Systematic Review and Meta-Analysis
Published 2025-01-01Get full text
Article -
8215
Cocoa pod husk wastes derived biochar for overcoming potassium deficiency in organic agriculture
Published 2024-10-01“… Purpose: Potassium (K) deficiency is emerging as a significant global agricultural challenge impacting 20% of farming areas and posing a threat to food security. In India, the potassium deficit has aggravated due to a focus on nitrogen and phosphorus application, with the net potassium balance declining from -3.29 million tonnes in 2000–01 to -7.2 million tonnes in 2015–16. …”
Get full text
Article -
8216
Consumption of vitamin A-rich foods among lactating mothers in Girawa district, Eastern Ethiopia
Published 2024-12-01“…Therefore, public health measures should focus on family planning, ANC, food security and nutritional counseling/education to improve the consumption of vitamin A-rich foods by lactating mothers.…”
Get full text
Article -
8217
Study on its application and unstable risk subarea estimation method of mountainous traffic engineering’s spoil ground
Published 2025-01-01“…Residues disposal areas with different quantities and scales are produced with the traffic engineering construction in mountainous areas construction, whose environment security threats need to be termly estimated. Countermeasures are adopted by estimated results, and safety risk management and control of waste dump engineering are realized. …”
Get full text
Article -
8218
Global demand for rice genetic resources
Published 2022-05-01“…As we address food and nutrition security challenges in a changing context, we are motivated by the need to enhance the conservation, management, and use of rice genetic resources. …”
Get full text
Article -
8219
Validation of Mortality Data Sources Compared to the National Death Index in the Healthcare Integrated Research Database
Published 2025-02-01“…At the same time, positive predictive value (PPV) was 93.4% (95% CI = 93.1%, 93.7%), negative predictive value (NPV) was 82.3% (95% CI = 81.7%, 82.9%), and when comparing each individual source, each had a high PPV but limited sensitivity.Conclusion: The composite algorithm was demonstrated to be a sensitive and precise measure of mortality, while individual database sources were accurate but had limited sensitivity.Plain Language Summary: What is known on this topic:The National Death Index (NDI) is the gold standard for ascertaining death in the US, with several limitations, such as time lag and population restrictions.What this study adds:A composite mortality algorithm of several sources of death was shown to be a sensitive and precise in death ascertainment compared to the NDI.Individual mortality sources, such as the Social Security Death Master File and online obituaries, had limited sensitivity on their own compared to the NDI.Keywords: mortality, validation, National Death Index, real word evidence, obituary, claims…”
Get full text
Article -
8220
Justification of military neutrality of the Republic of Serbia at a time of erosion of neutrality in Europe
Published 2023-01-01“…However, we can conclude that neutrality has existed in continuity in Europe throughout the entire modern period of history, and that there were always some states that chose neutrality, with larger or lesser prospects of success in realization of their security interests. The great revolution, one might say the collapse of neutrality or even a frenzy to align, was the result of the Russo-Ukrainian conflict and new increasing tensions between the West and Russia. …”
Get full text
Article