Results 151 to 160 of about 683,063 (342)
Open-source cyber intelligence research through PESTEL framework: Present and future impact
Recent scholarly endeavors in the domain of Cyber Intelligence have unveiled its multifaceted implications, intricately interwoven with various Sustainable Development Goals (SDGs), notably encompassing Goal 9 (Industry, Innovation, and Infrastructure ...
Fahim K. Sufi
doaj +1 more source
A broadband cholesteric liquid crystal (CLC) combined with a bottom‐up metasurface absorber enables the realisation of thermoplasmonic‐controlled optical filters. These filters combine a CLC reflector for visible light with a metasurface absorber operating in the near‐infrared (NIR) range.
Federica Zaccagnini+6 more
wiley +1 more source
IntroductionStalking is a serious and often overlooked form of gender-based violence that disproportionately affects adolescent girls. In Pakistan, especially in Sindh, the issue remains under-researched, despite legal reforms aimed at criminalizing such
Abdul Hadi, Yaser Snoubar
doaj +1 more source
Use of technology to educate patients with celiac disease
Abstract Celiac disease is an autoimmune disorder with no treatment outside of strict dietary avoidance of gluten, which makes effective patient education essential for appropriate disease management. Use of technology to deliver patient information has advanced over the past decade to include virtual visits (telehealth), easy‐to‐use information ...
Alyson Basil+3 more
wiley +1 more source
ABSTRACT As a global concept and initiative, the Humanitarian‐Development‐Peace Nexus (HDPN) aims to improve integration across the traditionally siloed humanitarian, development, and security sectors, while foregrounding the involvement of local actors.
Marie‐Eve Desrosiers+1 more
wiley +1 more source
Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed+8 more
wiley +1 more source
UN Peace-Building, Transitional Justice and the Rule of Law in East Timor:The Limits of Institutional Responses to Political Questions [PDF]
McAuliffe, Padraig
core +2 more sources
ABSTRACT In recent decades, policy capacity has garnered increasing attention from scholars in the Global North. However, there has been limited focus on policy capacity in developing countries, particularly in Africa. While various factors, such as experience, the nature of policy tasks, and educational background, can influence the policy capacity of
Kiflie Worku Angaw+3 more
wiley +1 more source
Advancing SDGs and performance management strategies for security personnel in higher education
Orientation: Performance management aligns individual and organisational goals, enhancing employee motivation, sustaining organisational success.
Nikkita G. Shankar, Anisha Ramsaroop
doaj +1 more source
USAID's Locally‐Led Development Agenda: Open Government and Independent Monitoring
ABSTRACT USAID's ambitious localization agenda between 2021–2024—suspended in early 2025—aimed to provide more funding for local organizations, strengthen local systems, and co‐create with local communities. This study uses pre‐2025 open government data to identify continuity and change during USAID’s localization push.
Jeffrey Hallock+2 more
wiley +1 more source