Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
6881
ECONOMIC AND INSTITUTIONAL DETERMINANTS OF INTERNATIONAL TOURISM DEMAND IN THE ECOWAS REGION
Published 2023-11-01“…The study recommends government, authorities in charge of crime prevention (security agencies) and other key players (both private and public) to team up and map out plans to tackle terrorism and insecurity in the West African region; the region should consider adopting single currency to stabilize prices; and ensure effective communication is maintained so that tourists are adequately informed about dangerous zones. …”
Get full text
Article -
6882
Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
Published 2012-12-01“…Recent research efforts have shown that NC can be combined with classical error control codes and cryptography for secure communications or misbehavior detections. Nevertheless, when it comes to Byzantine attacks, these results have limited effects. …”
Get full text
Article -
6883
Collaborative Governance of Rural Relative Poverty under Blockchain and Back Propagation Neural Network
Published 2022-01-01“…Therefore, the constructed poverty data visualization governance model can achieve good data transmission security performance while ensuring high classification accuracy. …”
Get full text
Article -
6884
-
6885
Les rituels : des espaces de marge pour construire sa place
Published 2015-09-01“…The present article shows how ritual practices can be considered as secured spaces where individuals can experiment new possibilities. …”
Get full text
Article -
6886
Скандал в эго-документах позднесоветских писателей: попытка “насыщенного описания”
Published 2025-02-01“…Since the primary audience for such scandals was international public opinion, prominent writers frequently leveraged the threat of an ‘international scandal’ to secure desired outcomes from editors, censors, and – most critically – special ‘curators’ responsible for overseeing literature on behalf of the Central Committee of the Communist Party. …”
Get full text
Article -
6887
How the EU’s Eastern Enlargement Changed the German Productive Model. The Case of the Automotive industry
Published 2014-06-01“…The metalworking union and the works councils still remain strong enough to reach compromises that guarantee employment security in exchange for higher flexibility and that set limits on the use of precarious employment forms.…”
Get full text
Article -
6888
Digital Twin Satellite Internet: Architecture and Key Technologies
Published 2022-03-01“…A digital twin satellite internet (DTSI) architecture was proposed, which provided support for the whole life cycle of satellite internet through the three-dimensional closed-loop mechanism of parallel twin, security endogenous and intelligent evolution.Then, the key problems and technologies of DTSI were discussed.Aiming at the complex and changeable satellite internet system, a standardized model processing and generation method based on mechanism and data driving was proposed.In the face of the data torrent formed by massive information and uneven distribution, a pool computing-storage strategy of three-level diversion strategy was proposed.In order to achieved high fi delity with the characteristics of the actual system, an intelligent orchestration and distributed heterogeneous processing platform was designed to classifi ed and quickly calculated diff erent models and events.In order to achieved high fi delity with the characteristics of the actual system, an intelligent orchestration and distributed heterogeneous processing platform was designed to classifi ed and quickly calculated diff erent models and events, the satellite internet twin cycle evolution system of observation-orientationdecision-act was formed, so as to realized the stable development of the whole life cycle of satellite internet.…”
Get full text
Article -
6889
EVALUATING ON-FARM WATER MANAGEMENT IN SMALL-SCALE IRRIGATION SCHEMES IN SOUTHERN ETHIOPIA
Published 2024-11-01“…Ethiopia's agricultural sector is predominantly dependent on rain-fed farming, and irrigation systems are becoming increasingly essential for enhancing productivity and ensuring food security. This study assesses on-farm water management practices within small-scale irrigation schemes in southern Ethiopia, focusing on two irrigation schemes, Wosha and Werka, located in the Wondo Genet District Sidama Region. …”
Get full text
Article -
6890
Des SIG aux observations de terrain : étude de la « trame jardinée potagère » dans les petites villes du Vexin français
Published 2024-07-01“…Our results show that the existence of these gardens is rooted in a manual culture associated with the working classes and that their renewal is declining. Securing the tenure of unbuilt land advocated by the Regional National Park does not therefore seem to be enough to maintain the food-growing function of the green belts. …”
Get full text
Article -
6891
Representing succession: Tudor royal portraits, 1544–1546: context, production and analysis
Published 2025-12-01“…Evidence suggests that it was Kateryn, who helped achieve for Mary and Elizabeth the dynastic legitimacy that secured their subsequent reigns. In celebration of this achievement, between 1544 and 1546, evidence also suggests that it was the queen who was instrumental in commissioning a campaign of portraits of her stepchildren as a visual affirmation of their enhanced status. …”
Get full text
Article -
6892
-
6893
A COMPREHENSIVE REVIEW ON-APPLICATION AND FUTURE PROSPECT OF CYTOPLASMIC MALE STERILITY
Published 2023-05-01“…Moreover, the review elucidates on the recent advancements in biotechnology, omics technologies, and breeding approaches, which promise to further harness the potential of CMS in addressing global food security challenges. From the identification of diverse CMS sources to the utilization of advanced genetic engineering techniques like CRISPR-Cas gene editing, the future of CMS in crop breeding appears promising. …”
Get full text
Article -
6894
Analyse des défis de la filière viande de brousse sur la durabilité faunique au Gabon
Published 2024-08-01“…In addition, certain legal texts should be updated and rigorously applied to truly meet the objectives of sustainable wildlife management and to secure the professions of these actors.…”
Get full text
Article -
6895
Theoretical and Experimental Demonstration on Grating Lobes of Liquid Crystal Optical Phased Array
Published 2016-01-01Get full text
Article -
6896
Blockchain-based digital copyright trading system
Published 2018-07-01“…In the current era of digitalization and networking,the demand for digital copyright transactions is increasing.The traditional centralized copyright protection system has series of problems such as high registration costs,long work acceptance times,and being vulnerable to tampering by saboteurs.Blockchain as a decentralized network structure and based on P2P network and cryptographic technology,which can establish trust relationship on the network by pure mathematics.Without relying on the middle platform,blockchain technology can naturally alleviate the above problems.With the help of self-regulatory,traceable and decentralized features of blockchain technology and digital copyright trading scenarios,a digital copyright trading system model was designed.The new system is based on the advanced permissioned blockchain provided by IBM.The implementation of copyright registration and copyright transaction can ensure the integrity and tamper-resistant of the information.Finally,the installation time of chain code deployment was tested.The results show that the system is simple to install and has low maintenance costs.Compared with the traditional trusted third party copyright authentication mechanism,the blockchain-based digital rights trading system has a short registration time,no registration fee,and better architecture security and scalability.…”
Get full text
Article -
6897
“Invading Your Hearts and Minds”: Call of Duty® and the (Re)Writing of Militarism in U.S. Digital Games and Popular Culture
Published 2017-03-01“…The conclusion invites players to think about ways to criticize the way games like Call of Duty employ and deploy values that (re)write the militarist mindset that has often pervaded the post-9/11 U.S. national security debate.…”
Get full text
Article -
6898
-
6899
The paradox when managing the riparian zones of rivers with engineered embankments in The French prealps
Published 2014-07-01“…However, alluvial vegetation and riparian zones can play important ecological roles by providing often very biodiverse environments and acting as biological corridors.There is a paradox when managing these embankments between the security requirement to exclude woody plants and the ecological imperative to add vegetation. …”
Get full text
Article -
6900
Establishment and Implementation of Sponge City Monitoring System— A Case Study of Zhenjiang
Published 2022-01-01“…In order to effectively deal with urban water pollution and waterlogging,China proposes the concept of sponge city for stormwater management,which takes the control rate of total annual runoff,urban non-point pollution control,and urban rainstorm and waterlogging prevention as evaluation indicators to comprehensively improve the water resources,water security,water environment,and water ecological quality of cities.In the process of sponge city planning,construction,operation,and maintenance,it is necessary to establish a complete online monitoring system to assist the whole life cycle management of the sponge city construction.With Zhenjiang city listed in the first batch of pilot sponge cities in China as an example,a multi-level and organically nested sponge city monitoring system is constructed,and it mainly monitors rainfall,underlying surface,land area (sponge facilities,project sites,drainage zones),rivers and lakes,and basins.In addition,its monitoring indicator,distribution principle,monitoring frequency,as well as selection,recognition,and effective utilization of data are specified.The construction and implementation of the sponge city monitoring system are of great theoretical significance and application value for evaluating the construction and operation optimization of sponge cities,strengthening urban waterlogging prevention and control,and systematically promoting sponge cities in the whole area.…”
Get full text
Article