Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6341
The Impact of Digitalization on the Constitutional Rights of Citizens
Published 2024-04-01“…The current legislation of the Russian Federation is primarily focused on the protection of personal data and personal security on the Internet, and by introducing special norms into basic laws, it creates conditions for the implementation of the rights such as active suffrage, the right to education, the right to access to justice and other rights. …”
Get full text
Article -
6342
Design and Experimental Validation of Clutch Protection Structure of Miniature Reducer
Published 2022-09-01“…For service robots, security reconnaissance vehicles, etc. their mobile range is large and working space is complex. …”
Get full text
Article -
6343
Participation of Citizens in Pre-Trial Hearings. Review of an Experiment in the Netherlands
Published 2014-10-01“…In 2011 the Dutch Central Appeals Tribunal, the highest Dutch court of appeal in legal areas pertaining to social security and the civil service, started consulting the parties of a dispute at an early stage in the procedure, in order to include them in the decisions about the procedural steps to be taken in the settlement of the appeal. …”
Get full text
Article -
6344
Improving Data Privacy in the Internet of Things by Using Artificial Immune System, in Regard with the Internet Limitations
Published 2022-03-01“…Studies show that the lack of a complete, efficient and standard model has caused many security flaws in these networks. By using the Internet limitations, this study discusses how to create a target function to protect data privacy in the Internet of Things. …”
Get full text
Article -
6345
Design of Fully Automatic Drone Parachute System with Temperature Compensation Mechanism for Civilian and Military Applications
Published 2018-01-01“…Due to high cost of top-end drones and requirements for secure landing, development of reliable drone recovery systems is a hot topic now. …”
Get full text
Article -
6346
Prophet: A Context-Aware Location Privacy-Preserving Scheme in Location Sharing Service
Published 2017-01-01“…In this paper, we design a Prophet framework, which provides an effective security scheme for users sharing their location information. …”
Get full text
Article -
6347
Navigating the landscape of remote patient monitoring in Canada: trends, challenges, and future directions
Published 2025-02-01“…We explore the regulatory, technical, and operational challenges that RPM faces, including critical issues around data privacy, security, and interoperability, factors essential for sustainable integration. …”
Get full text
Article -
6348
The Food Safety Modernization Act of 2011 – Proposed Rule for Preventive Controls for Human Food
Published 2014-09-01“…FSMA aims to ensure the safety and security of the US food supply by focusing on preventing food safety problems rather than responding after they occur. …”
Get full text
Article -
6349
Parish revival in Southern Russia in the context of revolutionary upheavals and the Civil War
Published 2023-09-01“…Its functions were to be extended to the level of a grass-roots zemstvo, to ensure the legal and economic security of the parishioners, and to influence the surrounding society.…”
Get full text
Article -
6350
Discharge against Medical Advice in Surgical Patients with Posttraumatic Stress Disorder: A Case Report Series Illustrating Unique Challenges
Published 2017-01-01“…In all three subjects, the stress of feeling misunderstood by clinicians and the distress of public detainment by hospital security in the setting of chronic PTSD led to aggressive and risky behavior. …”
Get full text
Article -
6351
Industry 4.0: digital twins characteristics, applications, and challenges in-built environments
Published 2025-12-01“…Despite these potential benefits, several challenges prevent the widespread adoption of DT technology such as data security and ownership concerns, the lack of common data standards and interoperability, and difficulties in managing diverse source systems.…”
Get full text
Article -
6352
NOISE A FAVORITE FACTOR IN THE INDUSTRIAL WORK ENVIRONMENT
Published 2023-05-01“…After the implementation of the measures at the organization level, the increase in the level of security and the decrease in the level of risk will result. …”
Get full text
Article -
6353
Anesthetic Management for Emergent Repair of Tracheoinnominate Fistula
Published 2020-01-01“…The tracheostomy tube was then removed over a Cook catheter to maintain secure passage in case of airway collapse. The oral endotracheal tube was then inserted distal to the arterial and tracheal defect. …”
Get full text
Article -
6354
SIGNS OF THE ADMINISTRATIVE AND LEGAL REGIME IN THE SYSTEM OF EVENTS OF THE NORTHERN DELIVERY
Published 2024-11-01“…The relevance of the research lies in the strategic importance of events for early delivery of goods to hard-to-reach territories of the North and the Arctic of Russia to ensure national security, including the preservation and development of the local population. …”
Get full text
Article -
6355
Multicast communication protocol based on quantum key distribution against trojan horse attacking
Published 2014-07-01“…The communication protocols of throughput, channel utilization, security proof were analyzed theoretically. By analyzing, the protocol can effectively counter Trojan horse attacking, guarantee the multicast communication information safely.…”
Get full text
Article -
6356
Morphological and molecular characterization of Stenocranus pacificus (Hemiptera: Delphacidae) on maize plants
Published 2024-11-01“…Additionally, maize contributes to food diversification and security. One of the main threats to maize production is pest attacks, including Stenocranus pacificus and Peregrinus maidis. …”
Get full text
Article -
6357
Review on Cement Stabilization/Solidification of Municipal Solid Waste Incineration Fly Ash
Published 2018-01-01“…Municipal solid waste incineration (MSWI) fly ash must be treated properly prior to being disposed in the security landfill due to its serious pollution toxicity. …”
Get full text
Article -
6358
Optimizarea generării de itinerarii pentru ghizi turistici autonomi prin integrarea datelor în timp real în algoritmi genetici
Published 2024-12-01“…Research in the field of autonomous vehicles has made good progress in the last years, but mass adoption is unlikely to happen very soon due to, in most part, important ethical and security concerns. The authors consider that niche uses of autonomous vehicles are more likely to be researched and developed, since they can substantially make an immediate difference in specific applications. …”
Get full text
Article -
6359
Distributed Power Trading System Based on Blockchain Technology
Published 2021-01-01“…The traditional centralized power trading model has some problems, such as low data security and trust crisis of regulators. Blockchain technology provides prominent ideas for solving these problems. …”
Get full text
Article -
6360
An Economic Policy Exit Strategy from the Corona Lockdown
Published 2020-04-01“…This requires a clear exit strategy and following several steps to return to previous welfare and growth data levels. After securing survival during this crisis via various liquidity lines and bridging loans, the economy’s restart requires the relaunch of public infrastructure, especially of schools and kindergartens. …”
Get full text
Article