Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8101
-
8102
Lifesaving surgical approaches for severe penetrating knife injury to the neck
Published 2025-01-01“…As tracheal repair was not possible posterior wall was approximated with 3 − 0 polypropylene and size 7 tracheostomy tube was inserted and secured. The patient was managed post-operatively in the ICU and was discharged in stable condition on the 25th day adviced regular follow-up. …”
Get full text
Article -
8103
Experimental Research on Damping Effect of Double-Layer Tuned Mass Damper for High-Rise Structure
Published 2021-01-01Get full text
Article -
8104
Protection System Design of Induction Motor for Industries
Published 2022-01-01“…Providing industrial motors, pumps, lift motors, and other similar devices with security is a major motivation behind the emergence of this issue. …”
Get full text
Article -
8105
Legal Regulation of Spreading Opinions and Beliefs through TV Broadcasting
Published 2021-07-01“…It has been stated that the right to information may be limited by law in the interests of national security, territorial integrity or public morality. …”
Get full text
Article -
8106
-
8107
A sector fast encryption algorithm for color images based on one-dimensional composite sinusoidal chaos map.
Published 2025-01-01“…Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
Get full text
Article -
8108
Acceptability of improved cook stoves-a scoping review of the literature.
Published 2025-01-01“…Sustained use of ICS depended on fuel supply, fuel security and policies promoting its use. Policies offering subsidies in support of supply-chain garnered institutional trust among community members and resulted in the sustained use of ICS. …”
Get full text
Article -
8109
SHADOW GLOBALIZATION
Published 2014-06-01“…Some of the world development trends been observed over the past years raise serious concerns about the security and welfare of the peoples of the world. One of such trends has been the globalization of shadow economic activities. …”
Get full text
Article -
8110
Organizing the spatial space of the urban rivers\' margin of tourism development (case study of Poldokhtar city)
Published 2023-03-01“…The range of results showed that the most important strategy for creating urban river tourism in Poldokhtar is the attempt to create a social and secure environment with facilities and ease of access and special emphasis on environmental and ecological issues. …”
Get full text
Article -
8111
Detection of network intelligence features with the decision tree model
Published 2022-03-01“…Early detection of network intelligence allows to reduce the risks of information security of organizations. The study was carried out to develop software module for detecting the features of network intelligence by machine learning methods.M e t h o d s . …”
Get full text
Article -
8112
Soviet Diplomatic Efforts to Prevent Hungary’s Alignment with Germany in World War II (1939– 1941)
Published 2024-01-01“…Hungary, as strategized by Budapest, hoped to secure a position among these observers, avoiding direct conflict participation, and to later engage in territorial reconfiguration post-World War II. …”
Get full text
Article -
8113
Effect of lactose-free milk powder on lactose intolerance symptoms and nutritional status of pet dogs
Published 2022-11-01Get full text
Article -
8114
Toxicity of acaricides to kanzawa spider mite Tetranychus kanzawai Kishida (Acari: Tetranychidae)
Published 2024-11-01“…Considering cassava's importance as a vital root crop, educating farmers on the responsible use of these acaricides is vital for the effective management of T. kanzawai , thereby ensuring cassava crop yield preservation and food security. These efforts can contribute to the development of targeted and sustainable pest management strategies for T. kanzawai in cassava cultivation.…”
Get full text
Article -
8115
Effects of Land Use Change on Chlorophyll Concentration in Shahe River Basin of Tianmu Lake in the Past 20 Years
Published 2023-01-01“…The Shahe River Basin of Tianmu Lake provides drinking,irrigation,tourism,fishery,and other functions,which plays a crucial role in regional ecological security.In view of the actual demand and pressure of coexisting protection and development in this region,this study aims to make clear the comprehensive impact of regional eutrophication and human activities on the main water environmental factors in the reservoir area.Satellite remote sensing images and monitored chlorophyll-a concentrations in 2001,2011,and 2021 were used as basic data for research:① During the study period,the basin was in a state of moderate eutrophication.② According to remote sensing images,the land types in the Tianmu Lake area can be divided into water body,forest land,grassland,cultivated land,building land,and bare land.The cultivated land area was increased by 83% due to human activities.③ A correlation analysis was conducted between the area of each land use type and the change of chlorophyll-a concentration (the key index of water quality objective management) in the reservoir area.The results show that chlorophyll-a concentration is positively correlated with the areas of water body,forest land,building land,and cultivated land and negatively correlated with the areas of grassland and bare land.The correlation coefficients of chlorophyll-a concentration with the areas of building land and cultivated land are 0.536 and 0.773,respectively,which both influenced the water environment of the reservoir area to a certain extent.There is a close relationship between land use and water environment protection in the Shahe River Basin,which can provide important reference for the system planning and protection of the reservoir area.…”
Get full text
Article -
8116
The Everyday Commoning Practices in Urbanising Localities
Published 2025-01-01“…Negotiating Rights to Inhabit Common Lands for Housing in Two Cities of South India This paper presents a framework for understanding the everyday political dynamics of commoning initiated by residents to secure their claims to ‘common land’ in urbanising localities. …”
Get full text
Article -
8117
Digital technologies in territorial development: Opportunities and challenges of application in state and municipal administration
Published 2025-01-01“…To ensure effective digitalization of territories at different levels, it is necessary to define the boundaries and standards for the use of digital technologies, develop technical com petencies of decision-makers, guarantee information security and protection of personal data, and reduce fraud risk.…”
Get full text
Article -
8118
Leveraging Social Engineering Techniques for Ethical Purposes: An Approach to Develop Fake Android App for Collecting Valuable Data Discreetly
Published 2024-09-01“…However, these techniques can also be utilized ethically, as many cybersecurity professionals do, particularly when evaluating vulnerabilities and testing security defenses. This paper presents EDC (Ethical Data Collector), an Android application that utilizes social engineering techniques to discreetly collect valuable data from an Android device for ethical purposes. …”
Get full text
Article -
8119
The interplay of perceived benefit, perceived risk, and trust in Fintech adoption: Insights from Sub-Saharan Africa
Published 2025-01-01“…Conversely, perceived legal risk, security risk, and privacy concerns act as significant inhibitors of Fintech adoption. …”
Get full text
Article -
8120
Operating Thermal Power Plants Efficiency Improvement under Current Conditions
Published 2022-12-01“…In the limit, the share of natural gas in the incoming part of the energy balance should be reduced to values not exceeding 50 %, in accordance with the requirements of energy security. The article considers examples of utilization of low-temperature secondary energy flows occurring at thermal power plants: the heat of the cooling processes of the generator, lubrication systems, as well as the heat of condensation of turbine exhaust steam and deeper cooling of flue gases. …”
Get full text
Article