Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8441
Overlooked discrepancies in protocols undermine coastal restoration practices in China
Published 2025-01-01Get full text
Article -
8442
THE STRUCTURE OF HAPPINESS REPRESENTATION FOR RUSSIAN AND AMERICAN REPRESENTATIVES
Published 2017-09-01“…The obtained results are the basis for the development of practical recommendations for improving the effectiveness of intercultural communication, the security of interpersonal interaction. The experience of using the method of analyzing the sign units can be the basis for developing an automated system for analyzing the emotional state of an individual based on video fragments.…”
Get full text
Article -
8443
Ecological networks construction and optimization in the Longdong Loess Plateau: The advantages of self-organizing map and complex networks
Published 2025-01-01“…The additional corridors also serve as an important reference for enhancing regional landscape connectivity and ecological security.…”
Get full text
Article -
8444
Development and validation of genome-informed and multigene-based qPCR and LAMP assays for accurate detection of Dickeya solani: a critical quarantine pathogen threatening the pota...
Published 2025-01-01“…These assays offer a robust, rapid, and reliable solution for routine testing, with applications in phytosanitary inspection, disease diagnosis, and epidemiological studies.IMPORTANCEDickeya solani, one of the most aggressive soft rot causing bacteria and a quarantine pathogen, poses a severe threat to food security by causing substantial economic losses to the potato industry. …”
Get full text
Article -
8445
-
8446
Syrian refugee and diaspora healthcare professionals: Case studies from the eastern mediterranean and European regions
Published 2025-01-01“…Without such policies, Syrian HCPs are forced to work in the informal health sector such as in Lebanon or Egypt, leading to potential exploitation and security risks. Discussion: Now is an important opportunity to support Syrian and other refugee HCPs who have been forced to leave their homes to capitalise on their skills to explore the impacts of potentially effective policies and interventions. …”
Get full text
Article -
8447
Barriers and Facilitators to the Preadoption of a Computer-Aided Diagnosis Tool for Cervical Cancer: Qualitative Study on Health Care Providers’ Perspectives in Western Cameroon
Published 2025-02-01“…Barriers included the system’s ease of use, particularly challenges associated with image acquisition, concerns over confidentiality and data security, limited infrastructure and resources such as the internet and device quality, and potential workflow changes. …”
Get full text
Article -
8448
-
8449
Spatiotemporal evolution and driving force analysis of drought characteristics in the Yellow River Basin
Published 2025-01-01“…Global warming intensifies extreme precipitation events, impacting society significantly, and drought is one of the most important stress factors for the ecological security of the Yellow River Basin (YRB). Understanding the time-domain abrupt changes and evolutionary mechanisms of drought events is crucial for comprehending the water resource dynamics in the basin. …”
Get full text
Article -
8450
Temporal analyses of global suitability distribution for fall armyworm based on Multiple factors
Published 2025-02-01“…The fall armyworm (FAW; Spodoptera frugiperda) has been a persistent threat to global food security due to its strong migratory ability and wide range of host plants. …”
Get full text
Article -
8451
A Local Adversarial Attack with a Maximum Aggregated Region Sparseness Strategy for 3D Objects
Published 2025-01-01“…The increasing reliance on deep neural network-based object detection models in various applications has raised significant security concerns due to their vulnerability to adversarial attacks. …”
Get full text
Article -
8452
-
8453
Presenting the internal evaluation model on the performance of the banking industry based on the data theory method of the foundation
Published 2024-06-01“…The results indicated that a total of 5 components of job security, training, employee motivation and satisfaction, positive communication, development and reward were identified as internal marketing features in the banking industry, and 14 components were identified and extracted in the form of causal conditions (establishing constructive interaction between employees and managers, generous rewards, employee empowerment, management support), foundational conditions (organizational leadership and management, human resource management measures, organizational culture), interventions (political climate, organizational costs), strategies (promotion of customer-oriented culture, person-job fit), and outcome (human development, value creation, increased commitment). …”
Get full text
Article -
8454
Резолюция Экспертного совета «Диагностика и лечение больных со сладжем в желчном пузыре»
Published 2018-08-01Get full text
Article -
8455
Intensified monsoonal rainstorm events over westerly-dominated Asian interior during the warm mid-Holocene
Published 2025-01-01“…Abstract Hydroclimatic change in the Asian interior plays a key role in regulating regional environmental sustainability, water security, and human-nature relationships. However, the influence of the summer monsoon and westerly circulation on the evolution of hydroclimate over the arid Asian interior remains controversial. …”
Get full text
Article -
8456
Evaluasi Kualitas Layanan E-Government Pada Aplikasi Pendaftaran Seleksi Calon Aparatur Sipil Negara Menggunakan Model E-GovQual Berdasarkan Perspektif Pengguna
Published 2022-12-01“…In terms of Trust and Citizen Support, BKN must start to make some improvements, such as increasing the level of application security and improving the quality of helpdesk support services for SSCASN application. …”
Get full text
Article -
8457
Assessment of the Diversity of Tomato (Solanum Lycopersicum L.) Accessions in the Nigeria National Gene Bank Using Simple Sequence Repeat (SSR) Markers
Published 2024-09-01“…The results showed that SSR markers were successfully used to discriminate among the tomato accessions based on the PIC and genetic diversity values, hence promoting their use for future crop improvement and contributing to food security.…”
Get full text
Article -
8458
Exploring the genotypic potential of perilla (Perilla frutescens L.) for climate-resilient agriculture in the North Eastern Himalayas
Published 2025-02-01“…Large-scale cultivation of perilla improves food security and offers numerous health benefits, including cardiovascular support and disease prevention, thereby enhancing human wellbeing. …”
Get full text
Article -
8459
Determinants of Dietary Diversity Practice among Pregnant Women in the Gurage Zone, Southern Ethiopia, 2021: Community-Based Cross-Sectional Study
Published 2022-01-01“…Maternal educations, mothers’ attitudes toward dietary diversity, women empowerment, food security status, and wealth index level of the household were determinant factors that influence dietary diversity practice in this study. …”
Get full text
Article -
8460
Analisis Faktor yang Berpengaruh pada Adopsi E-Commerce dan Dampaknya Bagi Kinerja UKM di Kabupaten Subang
Published 2022-02-01“…This research arrives at a suggestion that SMEs who have used e-commerce should be followed by an understanding of access control and security of e-commerce itself, not only can use it. …”
Get full text
Article