-
321
A/B testing as an effective instrument for adaptation of the user interface at the iterative model of developing applications for mobile devices
Published 2021-02-01“…There was also a data security issue in the application, which put users at risk of data loss. …”
Get full text
Article -
322
-
323
Localization of the production: international experience and imperatives of russia in the conditions of sanctions regime
Published 2022-06-01“…We have made a conclusion about the necessity of forming of effective localization strategy, overcoming of declarative character of import substitution in the key spheres of real sector of Russian economy which will help to solve the problems of national security provision and technological independence. …”
Get full text
Article -
324
Imagined pet touch versus non-tactile presence: A within-person experimental study of emotional support during stress
Published 2025-08-01“…In a within-person experiment conducted in April 2025, 196 US cat and dog owners imagined receiving support from their pet in two scenarios during a guided visualization task. In both conditions, participants visualized the same stressful life event; one scenario involved imagined pet presence without touch, and the other involved imagined physical contact. …”
Get full text
Article -
325
Social science research in Indonesia (1999–2023): Identifying hotspots and trends through bibliometrics
Published 2024-12-01“…Significant efforts are needed to enhance the presence and impact of Indonesian social science thought globally.Objectives: To identify hotspots and trends in research from Indonesia in social sciences from 1999 to 2023 and also to identify dominant research clusters, their alignment with the UN Sustainable Development Goals, and prevalent methodologies to serve as a guide to future research and policymaking.Methods: We employed bibliometric analysis and VOSviewer visualization to examine articles by Indonesian authors in the Scopus database, to group the articles into clusters based on their research focus, and to examine their alignment with various SDGs.Results: We identified five dominant research clusters: (1) climate change and environmental governance, (2) Sunda Isles and archaeological evidence, (3) urban development, (4) rural development and economic impact, and (5) empowerment and food security. …”
Get full text
Article -
326
Understanding the Effects of Changing Weather: A Case of Flash Flood in Morogoro on January 11, 2018
Published 2019-01-01“…Regardless of where, when, and how the event has happened, floods affect social security as well as environmental damages. Understanding floods dynamics, their impacts, and management is thus critical, especially in climate risk assessment. …”
Get full text
Article -
327
Mapping the research landscape of livestock adaptation to climate change: a bibliometric review using Scopus database (1994–2023)
Published 2025-05-01“…Analytical tools such as Biblioshiny and VOSviewer were used for data processing and visualization. Findings reveal a consistent growth in research output, particularly post-2007, with the United States, China, and France emerging as leading contributors. …”
Get full text
Article -
328
Internet of Things in Medicine: a Bibliometric Review
Published 2024-07-01“…The research analyzes 7,205 articles indexed in the Web of Science (WoS) database, covering the period from 2013 to August 2024. Data visualization was conducted using VOSviewer software. …”
Get full text
Article -
329
-
330
ESP32-CAM-based Smart Surveillance: Real-time Transmission and Alerts Via Telegram
Published 2025-06-01“… Currently, mobile video surveillance systems represent a fundamental role in security and remote monitoring, allowing continuous and real-time access from any location. …”
Get full text
Article -
331
MODEL OF THE PROCESS OF FUNCTIONING OF THE INFORMATION PROTECTION SYSTEM FROM UNAUTHORIZED ACCESS CREATED IN THE SOFTWARE ENVIRONMENT OF IMITATION MODELING "CPN TOOLS"
Published 2019-07-01“…The presented im-model model of protecting information from unauthorized access in the software environment “CPN Tools” can be used as a tool in assessing the security of special bodies for the attestation of informatization objects and structural divisions of authorized departments. …”
Get full text
Article -
332
-
333
Identifikasi Malicious Host dalam Local Area Network Menggunakan Teknik Graph Clustering dan Filtering
Published 2020-05-01“…Abstract Local Area Network (LAN) security is a serious problem to consider. The cause of LAN becomes insecure because firewall technology is not able to protect the host (computer) in LAN from spreading malware. …”
Get full text
Article -
334
-
335
-
336
A comparative study of deepfake facial manipulation technique using generative adversarial networks
Published 2025-06-01“…Due to the development of image processing tools and visualization techniques integrating deep learning and artificial intelligence (AI) algorithms (in particular generative adversarial networks–GAN), this can pose serious threats to privacy and security. …”
Get full text
Article -
337
INTERPRETATION OF FINANCIAL ASPECTS OF INTELLECTUAL PROPERTY COMMERCIALIZATION AS AN INNOVATIVE PRODUCT
Published 2021-01-01“…The process of intellectual property commercialization is modeled, in the form of a generalized visualization of its movement to an innovative product, which involves four successive steps (the path to the market), choosing one of the forms of commercialization typology that provides the maximum possible variability for choosing the optimal strategy. …”
Get full text
Article -
338
Mapping Longitudinal and Transverse Displacements of a Dam Crest Based on the Synergy of High-Precision Remote Sensing
Published 2024-01-01“…Reservoirs are highly relevant infrastructure assets, and now, more than ever, they play an essential role in society’s welfare and national security. Their importance is related to regional socioeconomic development due to their capacity to store water for different uses, such as human consumption, agricultural irrigation, flood control, and hydroelectric energy production, among other important services. …”
Get full text
Article -
339
Bioluminescent imaging of an oomycete pathogen empowers chemical selections and rational fungicide applications
Published 2025-05-01“…Abstract Fungicides play an indispensable role in ensuring food security. However, rational chemical selection and fungicide precision application guidance remain constrained by the limitations in real-time monitoring of tracking pathogens within plant tissues. …”
Get full text
Article -
340
You Only Attack Once: Single-Step DeepFool Algorithm
Published 2024-12-01“…Adversarial attacks expose the latent vulnerabilities within artificial intelligence systems, necessitating a reassessment and enhancement of model robustness to ensure the reliability and security of deep learning models against malicious attacks. …”
Get full text
Article