Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5061
Key Discourses of Turkish Eurasianism and Their Impact on Turkey’s Foreign Policy
Published 2024-12-01“…From this standpoint, it would be premature to talk about the Turkish disengagement from the West and its pivot to Eurasia, as Ankara’s security and foreign policy are closely intertwined with the West and deeply embedded within the Western security system. …”
Get full text
Article -
5062
Is there a relationship between human development and dependence on fisheries?
Published 2023-06-01“…International food and raw material security issues has gained much more importance than ever. …”
Get full text
Article -
5063
BNPL in the Consumerism World: About the Excessive Debt Trap
Published 2024-12-01“…Like other digital services, BNPL requires the sharing of personal data, introducing potential security concerns. Therefore, BNPL providers must prioritize data protection to secure consumer information. …”
Get full text
Article -
5064
Breaking the Barriers for Women Participation in Agroforestry in the Context of AfCFTA
Published 2025-01-01“…With the establishment of the African Continental Free Trade Area (AfCFTA), there arises a unique opportunity to leverage agroforestry for food security, environmental protection, and poverty alleviation. …”
Get full text
Article -
5065
Factoring Central Asia in the Russia-India Energy Trade
Published 2020-12-01“…India and Russia share a very special relationship due to long-standing cultural and political ties and this has been a facilitator to India’s energy security needs. The Central Asian Republics hold a special position for Russia and India in terms of strategic security across South and Central Asian region. …”
Get full text
Article -
5066
Application of BIM Digital Information Technology in the Economic Optimization Operation of Integrated Energy Systems
Published 2022-01-01“…Energy is an important support for national economic development, and energy security directly affects national security, sustainable development, and social stability. …”
Get full text
Article -
5067
Questions of the legal nature of the Minsk agreements (international legal analysis)
Published 2020-12-01“…For Ukraine, which in the framework of the «hybrid war» faced such factors as the temporary occupation of the territory of Ukraine by the Russian Federation, issues of peace and security in the east of the state have become extremely important. …”
Get full text
Article -
5068
UKRAINE’S ENERGY POLICY IN THE POST-SOVIET ERA
Published 2016-08-01“…In the post-Soviet era the Ukrainian authorities, irrespective of their political affiliations, have tried to diversify the Russian oil and gas supplies either by securing deliveries from other sources or by enhancing production within the country. …”
Get full text
Article -
5069
-
5070
A Collision Avoidance MAC Protocol with Power Control for Adaptive Clustering Underwater Sensor Networks
Published 2025-01-01Get full text
Article -
5071
Explainable correlation-based anomaly detection for Industrial Control Systems
Published 2025-02-01“…The method is evaluated on the Secure Water Treatment (SWaT), Hardware-in-the-loop-based augmented ICS security (HIL-HAI), and Internet of Things Modbus dataset using precision, recall, and F-1 score metrics. …”
Get full text
Article -
5072
Electronic invoice public verification scheme based on SM2 coalition signature algorithm
Published 2022-04-01“…In order to solve the current problems of electronic invoices, such as anti-counterfeiting, privacy leakage and low verification efficiency, an electronic invoice public verification architecture based on the national signature algorithm was proposed.Electronic invoice documents have complex data sources, sensitive user information on the ticket surface, frequent data flow and other characteristics as well as the demand for efficient public verification.Based on these motivations, the e-invoice generation and verification protocol was designed.Besides, a signature code generation scheme for invoice anti-counterfeiting was proposed based on certificate-free joint signature.Then multiple data verification and signatures of the invoicing party and the taxation authority can be realized.All kinds of invoice holders can not only verify the authenticity and data integrity of electronic invoices, but also publicly check the authenticity and data integrity of electronic invoices.The integration of data encryption algorithms protects user privacy data in electronic invoices, and at the same time can fulfill the requirements for authenticity or status verification under various invoice application scenarios.The checking party only needs to verify one signature to confirm the authenticity of the electronic invoice signed by both parties.Scyther security simulation tools were used to analyze the security of the proposed solution, which can verify the integrity and authenticity of the data source and check the confidentiality of the privacy data under various types of attacks.Compared with a typical overseas e-invoice checking scheme and a similar digital signature-based e-invoice checking scheme, the proposed scheme has obvious advantages in terms of checking efficiency and invoice file size.…”
Get full text
Article -
5073
POLITICAL ECONOMY OF RUSSIA-UKRAINE WAR AND THE MACRO-ECONOMIC INSTABILITY IN EUROPE
Published 2024-12-01“…The findings of this paper showed that the war has far-reaching implications, notably impacting energy security in Europe due to disruptions in energy supply routes. …”
Get full text
Article -
5074
Analyzing Key Features of Open Source Software Survivability with Random Forest
Published 2025-01-01Get full text
Article -
5075
Coverless Steganography for Face Recognition Based on Diffusion Model
Published 2024-01-01“…It ensures the higher security of hidden images and solves the limitation of existing methods in protecting the privacy of face images. …”
Get full text
Article -
5076
Hybrid quantum enhanced federated learning for cyber attack detection
Published 2024-12-01“…Abstract Cyber-attack brings significant threat and become a critical issue in the digital world network security. The conventional procedures developed to detects are centralized and often struggles with concerns like data privacy and communication overheads. …”
Get full text
Article -
5077
SINO-NIGERIA RELATIONS AND GLOBAL OIL POLITICS, 1999-2023: ASYMMETRICAL OR SYMMETRICAL?
Published 2024-07-01“…This paper examines Sino-Nigerian relations within the context of global politics, focusing on China's primary interest in securing access to Nigeria's natural resources to sustain its expanding economy. …”
Get full text
Article -
5078
Intensive care nurses’ experiences of teamwork during the covid-19 pandemic. a qualitative study.
Published 2025-01-01“…Conclusion Losing the security of the intensive care unit team, having to adapt to constant changes, and the need to provide care to an increased number of critically ill patients led to a sense of being left to manage on their own. …”
Get full text
Article -
5079
Formation and development of the militia: historical and legal analysis
Published 2024-06-01“…The necessity of studying the historical processes of formation of the modern police, its institutional origins in the context of the State development is emphasised, and the crucial role of the police in maintaining the rule of law, public order and security of citizens of modern Ukraine is noted. The study of historical factual material contributes to a better understanding of the evolution, nature and role of state institutions designed to protect Ukraine's sovereignty and solve other tasks in the field of national security and law enforcement in response to the needs of society, offering ideas for future effective strategies based on historical experience and current challenges.…”
Get full text
Article -
5080
Soil quality indicator-based land productivity modelling for agricultural sustainability.
Published 2025-01-01“…Rapid population expansion has made food security a global concern for humanity, necessitating a sustainable assessment of natural resources. …”
Get full text
Article