Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6361
Constitutional basis of Austria’s accession to the European Union
Published 2009-12-01“…Finally, a special provision confirming Austria’s participation in the Common Foreign and Security Policy of the Union was introduced.…”
Get full text
Article -
6362
THE PROCESS OF ESTABLISHING THE ADMINISTRATIVE SYSTEM FROM NGANG PASS TO THE SOUTHWESTERN REGION (XI - XVII CENTURY)
Published 2020-03-01“…The article deals with the establishment of sovereignty, production organization, and security - cultural - social stability of the dynasties. …”
Get full text
Article -
6363
Fracture Behavior of Ion-Nitrided AISI 4140 Steel in accordance with Variable Applied Current Density
Published 2022-01-01“…In addition, the compressive stress generated by nitrogen-ion bombardment and implantation had an advantageous effect on the substantially enhanced fatigue strength; it acted as a protective layer to secure the surface from any external impact. It was found that fatigue strength is increased with increasing fracture toughness index on the surface on the sample. …”
Get full text
Article -
6364
L’émirat de Barqa et les Fatimides : les enjeux de la navigation en Méditerranée centrale au xie siècle
Published 2016-06-01“…They created a corsary emirate in charge of the security of the shipping lanes in the name of the Fatimids. …”
Get full text
Article -
6365
Germany's Immigration Policy Towards Highly-Skilled Workers in the 21stCentury
Published 2012-12-01“…In turn, developed and developing countries, faced with a shortage of personnel in high-tech industries and the "brain drain", modernize their immigration policy to attract highly qualified foreign personnel from all over the world and to secure its own intellectual resources. The article examines recent changes in the modern migration policy in Germany, which has become, on the one hand, more selective to different categories of workers, and on the other hand - more open for skilled personnel, especially from developing countries. …”
Get full text
Article -
6366
Rehabilitation of Maxillary Defect Using Zygomatic Implant Retained Obturator
Published 2021-01-01“…A surgical obturator was secured in position subsequent to the implant placement. …”
Get full text
Article -
6367
Mathematical Modeling and Optimal Control Strategy for a Discrete Time Drug Consumption Model
Published 2020-01-01“…We use four control strategies which are awareness programs through media and education, preventing contact through security campaigns, treatment, and psychological support along with follow-up. …”
Get full text
Article -
6368
Problems of investing in enterprises for processing and disposal of solid municipal waste
Published 2022-03-01“…The issues of investing in enterprises engaged in the utilisation and processing of municipal solid waste are currently relevant due to increasing consumption, correspondingly increasing production and the amount of waste and require the most careful approach from the point of view of environmental security. The object of the research are the factors that determine the potential benefits of investing in enterprises of this industry. …”
Get full text
Article -
6369
Transformation of the Strategic Culture of Ukraine under the Influence of the Russian Threat
Published 2024-12-01“…This was based on an analysis of military-political behavior patterns, components, and manifestations of strategic culture, as reflected in state strategies on national security and defense, as well as in other relevant documents and texts. …”
Get full text
Article -
6370
Navigating diversity: Assessing gender inclusivity at the 2023 Association of Geographical Societies in Europe (EUGEO) Congress
Published 2025-01-01“…Additionally, gender disparities were identified in debate participation and feelings, with women expressing less comfort and security during discussions. The research aims to contribute to reflections on gender representation at academic conferences and to provide ideas for possible strategies to foster greater inclusion at such conferences. …”
Get full text
Article -
6371
Algorithm Domination As A New Surveillance System
Published 2024-12-01“…Algorithms constitute a domination form because they threaten people's freedoms and security. Algorithm domination is seen as a form of control and discipline in today's world. …”
Get full text
Article -
6372
Effects of Neutralization, Decoloration, and Deodorization on Polycyclic Aromatic Hydrocarbons during Laboratory-Scale Oil Refining Process
Published 2017-01-01“…Data obtained in this study suggest that the use of activated carbon during oil refining process is highly recommended; moreover, these results provide a useful guidance for oil refining plant to reduce security risk and ensure the quality of the vegetable oil products.…”
Get full text
Article -
6373
Study and Analysis of Barriers for Implementation of Industry 4.0 Technologies Using Spherical Fuzzy TOPSIS Method
Published 2025-01-01“…Drivers such as government initiatives, establishment of fast internet connectivity, job security, etc., are recommended in this research work for minimizing the effect of barriers.…”
Get full text
Article -
6374
Covert Network Analysis for Key Player Detection and Event Prediction Using a Hybrid Classifier
Published 2014-01-01“…National security has gained vital importance due to increasing number of suspicious and terrorist events across the globe. …”
Get full text
Article -
6375
ptimal Allocation of Orders in the Online Load Distribution and Load Balancing of Assembly Lines
Published 2022-03-01“…Proper assembly line planning is one of the challenges production managers face at the tactical level. Failing to apply a secure way of assembly line balancing can cause various complications and problems for the production system. …”
Get full text
Article -
6376
Effects of biological agents on rhizosphere microecological environment and nutrient availability for rice
Published 2025-01-01“…As the world’s population grows, pursuing sustainable agricultural production techniques to increase crop yields is critical to ensuring global food security. The development and application of biological agents is of great significance in promoting the sustainable development of agriculture. …”
Get full text
Article -
6377
Status of Biomass Derived Carbon Materials for Supercapacitor Application
Published 2017-01-01“…Environmental concerns and energy security uncertainties associated with fossil fuels have driven the world to shift to renewable energy sources. …”
Get full text
Article -
6378
Temporary employment and its impact on wages in Latin America
Published 2019-05-01“…The high incidence of informality becomes a source of low wages and lack of social security benefits. Even within formal employment, the significant prevalence of non-permanent contracts frequently leads to consequences similar to those of informal occupations. …”
Get full text
Article -
6379
Analysis of the self-sufficiency of wheat production in Bosnia and Herzegovina
Published 2024-01-01“…These insights offer a foundation for future research that could delve deeper into the spatial-temporal, economic, and food security dimensions of wheat production.…”
Get full text
Article -
6380
Selected Topics on Business Information Systems Research: Editorial Introduction to Issue 26 of CSIMQ
Published 2021-04-01“…This CSIMQ issue contains five articles that deal with various information system (IS) issues, including IS security, product-related ISs, blockchain technology and sensor technology. …”
Get full text
Article