Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4661
Ozon uygulamasının devital ağartma yapılan dentinde rezin simanın shear bağlanma dayanımına etkisi
Published 2014-08-01“…Ozon uygulanan Secure siman örnekleri (G5), G1, G3, ve G7 gruplarından anlamlı derecede daha düşük bağlanma dayanımı gösterdi (P < 0.05). …”
Get full text
Article -
4662
Efficient task scheduling and computational offloading optimization with federated learning and blockchain in mobile cloud computing
Published 2025-03-01“…Consequently, maintaining MCC security and optimization of resources according to the task becomes significant task. …”
Get full text
Article -
4663
-
4664
ASD-YOLO: a lightweight network for coffee fruit ripening detection in complex scenarios
Published 2025-02-01Get full text
Article -
4665
ENSURING HUMAN RIGHTS IN THE CONTEXT OF IMPLEMENTATION OF ELECTRONIC VOTING IN UKRAINE: PERSPECTIVES AND RISKS
Published 2024-05-01“…Switzerland, the United States, Norway, Sweden, India, and Brazil have also used e-voting, with varying degrees of success and challenges related to security and privacy. For example, in Switzerland, e-voting was used experimentally in some cantons but faced significant security issues, while in India, EVMs have become standard in most polling stations, increasing public confidence in the electoral process. …”
Get full text
Article -
4666
-
4667
-
4668
Tea Growing and Socio-Economic Development of Small Holder Farmers: A Case Study of Rushoroza Kabale District.
Published 2025“…The study findings indicated that there were contributions of tea growing to welfare they included; poverty alleviation, food security, illiteracy level, financial support, capital base, collateral security, and illiteracy level. …”
Get full text
Thesis -
4669
Četnictvo v Hradci Králové: Úvod do jeho struktury ve třicátých letech 20. století
Published 2015-01-01“…The organization and activity of the gendarmerie in Hradec Králové are presented in the context of the statewide events and the organization of security. …”
Get full text
Article -
4670
GLONASS AS A TOOL TO ENSURE THE SAFETY OF TRANSPORTATION OF DANGEROUS GOODS
Published 2016-05-01“…The article describes the definition of dangerous goods, shows the reasons for the increased control over the transportation of such kind of goods and special security measures, gives the peculiarities of satellite navigation systems, the algorithm of implementation of the global navigation tracking system in practice, and shows a need for further measures to ensure safety transportation of dangerous goods.…”
Get full text
Article -
4671
Accountability of algorithms in data management of data subjects and business users
Published 2021-04-01“…In particular, the paper will try to understand how the security of automated and algorithmic decision-making processes can be verified ex post, due to their impact on privacy of both public and private entities. …”
Get full text
Article -
4672
Historic Abu Ghraib verdict: U.S. Contractor held accountable for torture
Published 2024-01-01“…After years of legal battles, three Iraqi survivors of torture in the Abu Ghraib prison have secured justice in a historic victory in U.S. courts. …”
Get full text
Article -
4673
Asymptotic hyperfunctions, tempered hyperfunctions, and asymptotic expansions
Published 2005-01-01Get full text
Article -
4674
-
4675
Analisis Kualitas Performa Aplikasi Digital Banking X Menggunakan Framework ISO 25010
Published 2023-07-01“…The conclusion is that the critical characteristic is security, which can refer to the evaluation quality of performance X application. …”
Get full text
Article -
4676
HIV and the gut microbiome: future research hotspots and trends
Published 2025-02-01Get full text
Article -
4677
Desain Layanan E-Surat untuk Desa Waru Barat, Pamekasan, Madura menggunakan QR-Code
Published 2021-11-01“…The functionality testing showed the application successfully generated e-certificate along with the unique QR Code to secure and maintain the validity of the document. …”
Get full text
Article -
4678
-
4679
Usefulness of 3-Dimensional Flexible Endoscopy in Esophageal Endoscopic Submucosal Dissection in an Ex Vivo Animal Model
Published 2019-01-01“…The degree of sense of security using 3D vision (3.67 [0.82]) was significantly higher than that using 2D vision (2.67 [0.52]) in trainees (P=.04), but was equivalent in experts. …”
Get full text
Article -
4680
Nurturing care during COVID-19: a rapid review of early evidence
Published 2022-06-01“…A relatively large number of studies examined child safety and security and indicate a reduction in maltreatment referrals. …”
Get full text
Article