Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6841
The Main Directions of Construction of Red Army in Days of the Great Patriotic War
Published 2015-02-01“…The current situation in the world draws public attention to the problems of building the armed forces and keeping their readiness to provide defense and security of the country. Rigid centralization of military construction in such collective bodies as the State Defense Committee, the General Headquarters of the Supreme Commander, determination and meticulous work of folk commissioners and the General Staff to identify areas of building and resource mobilization for the implementation of decisions taken can serve as a guide for solving similar problems in our days. …”
Get full text
Article -
6842
analysis the effective factors on the formation of women\'s ideal territory in urban parks (Case study: El Goli, shams , valiasr of Tabriz)
Published 2023-09-01“…At first at the descriptive level were investigated with subject statistics indicators and then at the inferential level used of exploratory factor analysis to determine the model.the results include 5 influential components.these components are landscape-functional-security-morphology-psychological.…”
Get full text
Article -
6843
Optical Image Encryption Using Devil’s Vortex Toroidal Lens in the Fresnel Transform Domain
Published 2015-01-01“…The use of a DVTL-based structured mask enhances security by increasing the key space for encryption and also aids in overcoming the problem of axis alignment associated with an optical setup. …”
Get full text
Article -
6844
Estimation of Minimum Torsional Reinforcement of Reinforced Concrete and Steel Fiber-Reinforced Concrete Members
Published 2019-01-01“…However, since there are many researches, in which even the concrete members with the minimum torsional reinforcement fail to secure sufficient reserved strength after torsional cracking, continuous research needs to be carried out. …”
Get full text
Article -
6845
Comparative analysis of state support for agricultural producers in Russia and in the world
Published 2023-07-01“…In the conditions of the WTO member countries open markets, the world countries food security, including Russia, largely depends not only on the competitiveness of their own agriculture, but also on the support of their own agricultural sector commensurate with other states. …”
Get full text
Article -
6846
Customer Satisfaction Affected by Service Quality with the Scale of Service Quality in Hotels (SSQH) Method
Published 2024-12-01“…The results of the study show that partially accommodation, employee attitudes, and behavior, interaction with customers, employee skills, food and beverage quality, front desk quality, room quality, safety and security, friendliness, and waiting time have an influence on customer satisfaction. …”
Get full text
Article -
6847
<i>Heterotis niloticus</i> (African Bonytongue) Domestication: Potentials, Efforts, and Challenges
Published 2024-12-01“…Overcoming these challenges is essential to promote the full potential of <i>H. niloticus</i> aquaculture and contribute to improved food security. Future research should focus on refining breeding programs, improving water quality management, and exploring innovative aquaculture systems. …”
Get full text
Article -
6848
Economic valuation of the thermal inertization of asbestos waste—an Italian case study
Published 2024-10-01“…However, their success is contingent on securing public funding, a thorough examination of hidden environmental costs and risks, and the establishment of supportive regulations fostering a circular economy. …”
Get full text
Article -
6849
Chemical Engineer George L. Standart – between Science and Ideology
Published 2025-01-01“…Standart and his wife spent in Prague nevertheless provides an opportunity to trace their personal and academic lives, the development of their attitudes shaped by their ideology and idealism and, partially, also the process by which the Czechoslovak security and intelligence services were established from the close of the 1940s to the late 1960s and the view they took of foreign nationals. …”
Get full text
Article -
6850
Vitamin D, Essential Minerals, and Toxic Elements: Exploring Interactions between Nutrients and Toxicants in Clinical Medicine
Published 2015-01-01“…It appears preferable to secure essential mineral status in conjunction with adequate vitamin D, as intake of vitamin D in the absence of mineral sufficiency may result in facilitation of toxic element absorption with potential adverse clinical outcomes.…”
Get full text
Article -
6851
THE IMPACT OF DEMOGRAPHIC CHANGES ON THE PENSION SYSTEM FINANCING SUSTAINABILITY IN THE FEDERATION OF BOSNIA AND HERZEGOVINA
Published 2014-05-01“…According to long-term projections of the reformed pension system of the FBiH, the greater stability of initial and average pensions, as well as stable social security of pensioners, will result in a relatively stable share of pension expenditures in GDP, of about 10%. …”
Get full text
Article -
6852
Online Auction System for Guma Stocks
Published 2025“…The system's objectives include streamlining the online trading process, fostering a sense of community engagement, and providing a user-friendly platform for secure transactions. It incorporates features such as user authentication, product listings, real-time bidding. …”
Get full text
Thesis -
6853
Spatiotemporal Assessment and Modelling of Roof-Harvested Rainwater Quality in Kigezi Highlands, Uganda
Published 2023“…The challenge of achieving water security in Africa is contingent upon the hydrological variability and its extremes (UN-Water, 2010). …”
Get full text
Other -
6854
-
6855
-
6856
Using data analytics to distinguish legitimate and illegitimate shell companies
Published 2025-03-01Get full text
Article -
6857
La relation économique et commerciale sino-marocaine : De la coopération au partenariat stratégique
Published 2013-10-01“…Since the 1990s, Morocco has made the opening of its economy a strategic focus of its trade policy. Securely fastened to the European Union, by far its largest trading partner, the Kingdom of Morocco has stepped up trade agreements, especially with emerging powers. …”
Get full text
Article -
6858
Lightweight searchable medical data sharing scheme
Published 2022-05-01“…The attribute-based encryption scheme supporting policy hiding and keyword search had a good application prospect in medical scenarios.However, most of the existing schemes did not support large attribute university or adopt the &quot;AND gate&quot; structure, which limited their scalability and flexibility of access control, and many schemes could not resist offline dictionary guessing attacks.In addition, attribute-based encryption involved a large number of bilinear pairing operations, which was inconvenient for user equipment with limited computing resources.A lightweight searchable medical data sharing scheme was proposed.Based on the support for keyword search and policy hiding, a large attribute university and a linear secret sharing structure were adopted to improve the scalability and flexibility of access control.The Intel SGX was used to re-encrypt data to achieve anti-offline dictionary guessing attack.The computational overhead of decryption was reduced to a constant level, which was suitable for user equipment with limited computing resources.Finally, it is proved that the proposed scheme has the security of selecting plaintext indistinguishable and can resist offline dictionary guessing attacks.…”
Get full text
Article -
6859
The long-term and short-term effects of interest rate volatility on corporate bankruptcy risk: An industry and supply chain perspective.
Published 2025-01-01“…This mismatch of short-term debt and long-term investments undermines the sustainability of the supply chain, ultimately reducing financial security-sacrificing safety for profitability. In the long term, higher interest rates exacerbate the overcapacity problem in industries, increasing the unsustainability of the production and sales balance. …”
Get full text
Article -
6860
Influential Nodes in the OBOR Fossil Energy Trade Network Based on D-S Theory: Detection and Evolution Analysis
Published 2022-01-01“…Therefore, the above aspects should be considered when ensuring national trade security. At last, the rationality and comprehensiveness of EVC are verified by comparing with some benchmark centralities.…”
Get full text
Article