Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7121
Comparison of Bureaucratic Neutrality in the 2019 and 2024 Elections From The Perspective of Online Mass Media in Achieving SDG 16 (Peace, Justice, and Strong Institutions)
Published 2025-01-01“…Meanwhile, in 2019, the dominance of content is a commitment to neutrality, securing elections, the threat of hoaxes and cyber, and the potential for election vulnerability.…”
Get full text
Article -
7122
INVESTIGATING THE COST EFFECTIVENESS OF BIODIESEL DISTRIBUTION IN INDONESIA
Published 2023-05-01“… The implementation of biodiesel in Indonesia has been regarded as one of the main strategies to improve country’s energy security equally and equitably. However, as the largest archipelago country in the world, the activity in distributing their biodiesel production bears a key problem. …”
Get full text
Article -
7123
Proactive Detection of Malicious Webpages Using Hybrid Natural Language Processing and Ensemble Learning Techniques
Published 2024-01-01“…The proliferation of malicious webpages presents a growing threat to online security, necessitating advanced detection methods to mitigate risks. …”
Get full text
Article -
7124
Stability of Bar Code Information Stored in Magnetic Nanowire Arrays
Published 2017-01-01“…Firmware applications such as security codes, magnetic keys, and similar products can be stored in magnetic bar codes similar to optical bar codes. …”
Get full text
Article -
7125
Development of the bank of russia’s fast payment system in modern conditions
Published 2024-10-01“…The potential of FPS in the context of ensuring the Russian payment infrastructure security represents an important direction for strengthening user confidence and system sustainability. …”
Get full text
Article -
7126
Brand Image as a Strategic Lever for Mergers and Acquisitions in the Financial Services Sector in South Africa
Published 2024-10-01“…Companies in a M&A are in most instances preoccupied in pursuit of increasing the shareholder value and securing the biggest market share through effective branding. …”
Get full text
Article -
7127
Network Packet Sniffer: A Case Study of Kabale University.
Published 2024“…As a fundamental procedure of network security measurement, network data collection executes real-time network monitoring, supports network performance evaluation, assists network billing, and helps traffic testing and filtering. …”
Get full text
Thesis -
7128
Assessment of Records Management Practices at Uganda College of Commerce Kabale.
Published 2024“…Proposed solutions included ensuring retention and durability, providing secure storage, offering continuous training programs, acknowledging the diversity of paper and electronic records, maintaining authenticity, proper disposal, and utilizing computer-based management practices. …”
Get full text
Thesis -
7129
Investment and Saving Among House Hold in Kabale District: A Case Study of Kitumba Sub-County Kabale District.
Published 2024“…Motives identified included retirement planning, economic development, income security, savings, precautionary measures, inheritance, employment, education, income levels, and social status. …”
Get full text
Thesis -
7130
Response of Yield and Quality Attributes to Plant Spacing In potato Growing.
Published 2025“…Potato (Solanum tuberosum) is a staple food crop worldwide, contributing significantly to food security and economic stability in many regions. One factor that significantly influences potato productivity and quality is plant spacing which is the distance between individual plants within a crop plantation. …”
Get full text
Thesis -
7131
Googling Patients
Published 2022-11-01“…Federal Trade Commission, https://www.ftc.gov/business-guidance/privacy-security/health-privacy. [14] “Complying with FTC's Health Breach Notification Rule.” …”
Get full text
Article -
7132
Les nouveaux modes de gestion de la proximité euromaghrébine
Published 2013-10-01“…As regards multilateral relationships, the failure of Europe-Mediterranean partnership fosters “5+5” dialogue, through which West-Mediterranean rimming countries try to strengthen bilateral and transnational relationships and to extend sub-regional cooperation imbued with security concerns. So doing, the “5+5” system indirectly helps restart the Union of Arab Maghreb. …”
Get full text
Article -
7133
Human-Vehicle Intersection Traffic Lights Timing Optimization Research
Published 2022-01-01“…The VISSIM software was used for traffic simulation, aimed at improving traffic volume and right-turning vehicle average speed for less vehicle queuing delays, less human-vehicle conflicts, and better security for pedestrians without excessive interruption on their street crossing efficiency. …”
Get full text
Article -
7134
ENVIRONMENT AND CONFLICTS IN NIGERIA: CAUSES AND TRENDS OF FARMERS – HERDERS CONFLICTS
Published 2023-12-01“… The nomadic pastoralists and sedentary farmers’ conflict is one of the reoccurring security challenges Nigeria. The constant insecurity and overbearing uncertainty which had come to characterise Nigeria’s existence compelled scholars to focus their attention on formulating an all- encompassing explanation of the phenomenon. …”
Get full text
Article -
7135
An access control scheme for IoT based on smart contracts and CP-ABE
Published 2024-10-01“…Simulation experiments and performance analysis demonstrate that compared to existing solutions, this approach enables data owners to securely authorize access for a large number of requesting subjects in a shorter time frame. …”
Get full text
Article -
7136
Islandora and TEI: Current and Emerging Applications/Approaches
Published 2013-06-01“…The Islandora framework is designed to ease the management of security and workflow for digital assets, and to help implementers create custom interfaces for display, search, and discovery. …”
Get full text
Article -
7137
Prison efforts to protect escaped prisoners (study at prison class II B Kuantan Singingi, Riau Province)
Published 2024-06-01“…In addition, in terms of facilities and building conditions, building and security improvements are also carried out to minimize residents from escaping or running away from prisons such as the addition of barbed wire so that fences are not easy to climb. …”
Get full text
Article -
7138
Quaternion Fractional Fourier Transform: Bridging Signal Processing and Probability Theory
Published 2025-01-01Get full text
Article -
7139
Federated Learning Applications in Fingerprint and Finger Vein Recognition
Published 2025-01-01“…Fingerprints and finger veins are widely used in security identification in many fields due to their uniqueness and identifiability. …”
Get full text
Article -
7140
Active Ageing Level of Older Persons: Regional Comparison in Thailand
Published 2016-01-01“…Implementation of an Integrated Active Ageing Package (IAAP), containing policies for older persons to improve their health and economic security, to promote participation in social groups and longer working lives, and to arrange learning programs, would be helpful for increasing older persons’ active ageing level in Thailand.…”
Get full text
Article