Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7261
Psychiatric and Behavioral Complications of GPi DBS in an Adolescent with Myoclonus Dystonia
Published 2019-01-01“…The patient was transferred to a secure treatment centre where he was able to gain control over his behaviors with intense dialectical behavior therapy, but the aggressive behavior and safety concerns continue to persist today.…”
Get full text
Article -
7262
The current state of international economic relations between Russia and African countries
Published 2024-08-01“…There are also difficulties in securing financing for projects, especially for small and medium-sized enterprises.…”
Get full text
Article -
7263
Socialisation of student youth in social networks
Published 2024-06-01“…It was noted that the protection of privacy and the development of critical thinking are important for ensuring the security and information competence of social network users. …”
Get full text
Article -
7264
-
7265
Minasse Tcheraz’s Contacts of Europe and His Impressions of Berlin Congress
Published 2015-06-01“…Before Berlin Congress assembled, Armenian Patriarch Nerses Varjabedyan had sent a delegation to the Congress in order to present the countries participating in the Congress with a memorandum that contained the requests of Armenian people and to secure these countries’ support throughout the Congress. …”
Get full text
Article -
7266
Playing by the rules: Government regulation and consumer trust in the online poker industry
Published 2025-03-01“…Players are willing to pay an extra $1.83 per hour to play on government-regulated sites and players who view these sites as more secure are willing to pay even more. However, the size of the regulatory premium falls and, in some cases, becomes negative when players believe that government regulation increases the likelihood that their winnings will be taxed. …”
Get full text
Article -
7267
National Defense as fiscal policy during the Mauricio Macri administration (2015-2019)
Published 2020-09-01“…The article establishes that, although the security-oriented discourse was apparently predominant, in the end, a fiscal adjustment rationale prevailed over all the other proposals. …”
Get full text
Article -
7268
The Problem of Determining International Economic Sanctions in Modern Science
Published 2024-01-01“…For a long time, the doctrine was dominated by the approach that sanctions should be understood exclusively as sanctions of the UN Security Council. This approach is still seen as correct from the standpoint of the conceptual and categorical apparatus of international law, but at the same time, it is outdated, not reflecting modern international economic sanctions. …”
Get full text
Article -
7269
Weibo Rumor Recognition Based on Communication and Stacking Ensemble Learning
Published 2020-01-01Get full text
Article -
7270
Human-Terrestrial Wildlife Conflict in Ethiopia: A Systematic Review
Published 2022-01-01“…About 178 keywords’ analysis revealed a focus on “coexistence,” “mitigation,” and “food security.” The literature focused mainly on larger mammals, led by Ethiopian authors, and excluded the social dimensions of HWC. …”
Get full text
Article -
7271
Preparations of the Shipping Company “Żegluga Polska SA” for the Second World War
Published 2024-01-01“…Important preparations also included securing the port by state authorities.…”
Get full text
Article -
7272
Side Trip Multipath Routing Protocol for Spatial Node Failure in Data-Gathering WSNs
Published 2016-04-01“…We compare the ST scheme, STNC scheme, and two existing multipath protocols (i.e., H-SPREAD (Hybrid-Secure Protocol for REliable dAta Delivery) scheme and SMRP (Subbranch Multipath Routing Protocol) scheme) by means of a self-developed simulator. …”
Get full text
Article -
7273
Risk-based approach in external migration public management
Published 2024-03-01“…External migration state management should be aimed at solving the socio-economic development problems in Russia and ensuring national security and at the same time should minimize potential risks of social and cultural nature. …”
Get full text
Article -
7274
Assessment of Lag Screws in Treatment of Anterior Mandibular Fracture
Published 2024-12-01“…Two lag screws, ranging in length from 16 to 20 mm, were used to secure the fragments, depending on the needs of each case. …”
Get full text
Article -
7275
Implementation of Simplified Data Encryption Standard on FPGA using VHDL
Published 2022-03-01“…Due to enormous development in communication devices, globally internet-connected network largely used in all human activities. The security of information has been becoming a major concern for all users and clients, whom depend on network system. …”
Get full text
Article -
7276
TR-SDTN: Trust Based Efficient and Scalable Routing in Hostile Social DTNs
Published 2015-07-01“…In view of these defects, we propose a novel solution to address the selfish and security issues in social DTNs. Based on nodes’ social characteristics, a dynamic trust model is proposed to prevent bad-mouthing and ballot stuffing attacks and the Shannon entropy function is introduced to avoid blackhole and greyhole attacks. …”
Get full text
Article -
7277
The war inside your mind: unprotected brain battlefields and neuro-vulnerability
Published 2024-02-01“…Experts in neuromedicine, technology, societal security, and strategy must grasp that a variety of technologies that arguably enhance brain function, influence or augment intelligence, link brains with computers, and enablenon invasice access to the brain-are highly attractive. …”
Get full text
Article -
7278
-
7279
Modeling the Grain Import Trade: A Cointegration Analysis of China’s Panel Data
Published 2021-01-01“…Therefore, China should pay close attention to the impact of international factors on the fluctuation of its own food prices and enhance its ability to rationally utilize the international food market and international agricultural resources to ensure domestic food security.…”
Get full text
Article -
7280
The Political Economy of the Gifts on Tiktok
Published 2025-02-01“…It is a multifaceted object of study, allowing research on various topics such as security and surveillance, algorithms and addiction, and communication and online interactions. …”
Get full text
Article