Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
7561
-
7562
Complexities in Financial Network Topological Dynamics: Modeling of Emerging and Developed Stock Markets
Published 2018-01-01Get full text
Article -
7563
Internet marketing organization with the use of intellegent and block chain technologies
Published 2020-05-01“…Blockchain technology is used to control and guarantee the authorship of startups and signed contracts.As IM development trend, the development of models for joint activity of intelligent agents in the cloud environment to support decision-making using blockchain technology to legally secure the authorship of innovations is proposed. …”
Get full text
Article -
7564
New Generation of Smart Highway: Framework and Insights
Published 2021-01-01“…Several urgent problems in the current stage are pointed out in terms of system compatibility, standard specification, and information security. This paper provides new insights for sustainable and reproducible highway reformation, drawing some implications for NGSH design.…”
Get full text
Article -
7565
A multidimensional momentum chain model for tennis matches based on difference equations.
Published 2024-01-01“…Furthermore, the likelihood of scoring is substantially greater for players possessing higher momentum, with data suggesting that the serving side has an 84% chance of securing a match victory. When applied to 6,870 tennis matches, our model achieves a prediction accuracy exceeding 80%. …”
Get full text
Article -
7566
IF-MABAC Method for Evaluating the Intelligent Transportation System with Intuitionistic Fuzzy Information
Published 2021-01-01“…ITS can effectively employ the existing traffic facilities and ensure the safety of traffic, urban traffic, and public security management for effective control in order to satisfy people’s travel demand. …”
Get full text
Article -
7567
Political ecology survey of human-chimpanzee coexistence within postwar Mabi-Yaya Nature Reserve, Côte d’Ivoire
Published 2024-11-01“…Given the Ivorian political context, this local support and the persistence of high canopy forest appear to be more related to a local understanding of the protected area as a land-securing device against “outsiders” in a context of strong political and identity crises than to any agreement with conservation policies. …”
Get full text
Article -
7568
Infiltration of Small Arms and Light Weapons into Benue Valley and Its Impact on the Conflict Between Pastoralists and Farmers
Published 2023-07-01“…This problem is more pronounce in developing countries where there are porous borders and weak institutions responsible for border security like Nigeria. The proliferation and misuse of small arms and light weapons in the country is progressively complex and multifaceted phenomenon that affects people and insecurity. …”
Get full text
Article -
7569
Experimental Research on the Influence of Temperature on the Static Properties of Skarn
Published 2021-01-01Get full text
Article -
7570
The Rising Religious Extremism and Mob violence in Nigeria
Published 2024-07-01“…Looking beyond human security threats like poverty and illiteracy, the paper utilised desk review of published documents to establish the historical and political factors that sowed in the country, the seeds of religious extremism now germinating. …”
Get full text
Article -
7571
Research on the cross-contagion between international stock markets and geopolitical risks: the two-layer network perspective
Published 2025-01-01“…Finally, the study on the dynamic changes of the double-layer network connectedness between the international stock market and geopolitics found that the shock of extreme events, such as military conflict and public health security, is an important factor in triggering the cross-contagion of risks. …”
Get full text
Article -
7572
User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
Published 2025-01-01“…The increasing number of security issues with cloud data raises confidentiality concerns about keeping these stored or shared data. …”
Get full text
Article -
7573
MEDIA COMMUNICATIONS IN THE INFORMATION STRATEGY OF UKRAINE'S INTEGRATION INTO THE EU
Published 2024-12-01“…The topic of Ukraine's integration into the European Union is vital not only for the political, economic, security, and humanitarian aspects of the state's life but also for the national media space. …”
Get full text
Article -
7574
The European Union's Mediterranean Policy in the Context of the "Arab Spring"
Published 2014-04-01“…While the EU Foreign Policy in the Mediterranean region was historically conditioned by the security interests of the European Union, it suffered from securitization/democratization dilemma. …”
Get full text
Article -
7575
Attribution Analysis of Runoff Variability in Northern-Huai River Plain Based on Improved Budyko-Fu Equation
Published 2024-07-01“…Issues like insufficient water resource security capacity and competition for water among different sectors are common. …”
Get full text
Article -
7576
The influence of communication on an effective relationship marketing strategy for sport unions in the new millennium
Published 2022-10-01“…A long-term relationship is recognised as a very important and basic ingredient of marketing, securing and keeping customers and can be regarded as a tool for the new millennium. …”
Get full text
Article -
7577
De frontier até pós-frontier: regiões pioneiras no Brasil dentro do processo de transformação espaço-temporal e sócio-ecológico
Published 2017-02-01“…This holds particularly true inasmuch as the incorporation of land through settler colonisation after Latin American countries’ independence – mainly in Argentina, Chile, Paraguay and Brazil – became one of the key instruments for opening up and developing areas, for geostrategic securing, and for economic valorisation of hinterland spaces discursively framed as free of settlements and populations. …”
Get full text
Article -
7578
The Mechanism of Safety Culture Construction in Chinese Universities Based on POI Data and Gravity Model
Published 2022-01-01“…With the development of social economy, the importance of safety culture has been recognized by the whole society. Campus security is not only related to the common interests of the campus teachers and students but also related to the fundamental interests of each individual in the campus. …”
Get full text
Article -
7579
Prediction Model of Water Demand for Scouring Siltation in Coastal River Networks Based on APSO and SVM: A Case Study of Doulong Port
Published 2024-12-01“…Siltation in coastal river networks is a serious water security issue, and balancing siltation through water diversion is an important measure in ecological water resource dispatching. …”
Get full text
Article -
7580
Cloud Trust-Driven Hierarchical Sharing Method of Internet of Things Information Resources
Published 2021-01-01“…This paper sorts according to the value of the Internet information security model, obtains the optimal model to avoid human tampering, and designs the information resource acquisition process to ensure the reliability of the source data. …”
Get full text
Article