Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2221
Women’s visibility and bargaining power in the common bean value chain in Mozambique
Published 2023-11-01Subjects: Get full text
Article -
2222
Problems and prospects for the strategic development of the world energy system
Published 2022-11-01Subjects: “…energy security…”
Get full text
Article -
2223
Traffic measurement algorithm based on least recent used and Bloom filter
Published 2013-01-01Subjects: “…network security…”
Get full text
Article -
2224
Determinants of corruption in the global financial order
Published 2024-01-01Subjects: Get full text
Article -
2225
Protocol to implement and evaluate a culturally secure, strength-based, equine-assisted learning program, "Yawardani Jan-ga" (horses helping), to support the social and emotional wellbeing of Australian aboriginal children and young people.
Published 2024-01-01“…We anticipate that findings will build an evidence base that informs policy and practice by understanding key intervention elements of social and emotional wellbeing support for Aboriginal youth, how to incorporate Aboriginal worldviews across different stages of interventions, and how to capture impact best using culturally secure methods.…”
Get full text
Article -
2226
Application of quality control circle activity in reducing the rate of defects in security management of medical oxygen supply system (降低医用供氧系统安全管理缺陷率的品管圈实践)
Published 2022-02-01“…T和rate of defects in security management. The rates of defects in security management before and after implementation of QCC activities were compared. …”
Get full text
Article -
2227
-
2228
-
2229
STATE REGULATION OF ECONOMY AND ENSURING NATIONAL INTERESTS IN THE USA: SOME INSTITUTIONAL ASPECTS
Published 2016-07-01Subjects: “…office of strategic industries and economic security…”
Get full text
Article -
2230
Ekoturizm Aktivitelerinde Bitki Yoğunluklu Manzaranın İleri Yaştaki İnsanların Güvenlik Hissine Etkisi
Published 2025-01-01Subjects: “…security in ecotourism…”
Get full text
Article -
2231
Logistic Infrastructure, Informational Technology and Crop Production: Role of Food and Crop Production in Economic Miseries
Published 2024-12-01Subjects: Get full text
Article -
2232
Composable information flow verification for service chain based on model checking
Published 2014-11-01Subjects: Get full text
Article -
2233
Research on penalty mechanism against selfish behaviors in anonymous communication system
Published 2006-01-01Subjects: “…information security…”
Get full text
Article -
2234
“ADAPTING TO A CHANGING WORLD: STRATEGIES FOR MITIGATING THE GLOBAL CONSEQUENCES OF CLIMATE CHANGE”
Published 2024-10-01Subjects: Get full text
Article -
2235
Design keyed Hash function based on couple chaotic system
Published 2006-01-01Subjects: “…data security…”
Get full text
Article -
2236
Research on structure and defense of adversarial example in deep learning
Published 2020-04-01Subjects: Get full text
Article -
2237
ADAPTING TO A CHANGING WORLD: STRATEGIES FOR MITIGATING THE GLOBAL CONSEQUENCES OF CLIMATE CHANGE
Published 2024-09-01Subjects: Get full text
Article -
2238
-
2239
Sensitive information filtering based on kernel method
Published 2008-01-01Subjects: Get full text
Article -
2240