Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1621
A health security-based framework for prioritizing regions for digital learning in complex health emergencies
Published 2025-01-01Subjects: Get full text
Article -
1622
Library Material Security and Service Delivery in Uganda: A Case Study of Rwenzori International University.
Published 2023Subjects: “…Library Material Security…”
Get full text
Thesis -
1623
Perennial crop farming and food security in Kigezi: a case study of Kigezi highland tea
Published 2023Subjects: Get full text
Article -
1624
Perennial crop farming and food security in Kigezi: a case study of Kigezi highland tea
Published 2023Subjects: Get full text
Article -
1625
Security of Physical Library Materials and Utilisation: A Case Study of National Teachers College Kabale.
Published 2023“…The purpose of the study was to assess the status of the security of physical library materials and their utilization at National Teachers College Kabale. …”
Get full text
Thesis -
1626
Assessing the Influence of High Population Growth Rate on Food Security in Nyamweru Subcounty Rubanda District.
Published 2024Subjects: Get full text
Thesis -
1627
Perennial crop farming and food security in Kigezi: a case study of Kigezi highland tea
Published 2023Subjects: Get full text
Article -
1628
ABOUT RESULTS TRUST MANAGEMENT OF PENSION SAVINGS BY GOVERNMENTAL MANAGEMENT COMPANY OF THE VNESHECONOMBANK FOR 2004-2017
Published 2018-07-01Subjects: “…portfolio of government securities…”
Get full text
Article -
1629
INSTRUMENTS, THAT SEARCH AN ENTRANCE POSITION AT INVESTMENT IN A SMALL CAPITALIZATION
Published 2017-04-01Subjects: “…analysis securities of small capitalization…”
Get full text
Article -
1630
-
1631
TRADING PARTICIPANTS CONCENTRATION ANALYSIS, AS A SELECTION METHOD OF SMALL AND MEDIUM CAPITALIZATION FOR INVESTORS PORTFOLIOS
Published 2016-12-01Subjects: “…analysis securities of small and medium capitalization…”
Get full text
Article -
1632
Protection and Security Method for Multiple Energy Power Plant-Based Microgrids Using Dual Filtering Algorithm
Published 2025-01-01Subjects: Get full text
Article -
1633
Design and Construction of an Aquaponics System: A Sustainable Approach to Enhancing Local Food Security in Offa, Nigeria
Published 2025-02-01Subjects: Get full text
Article -
1634
-
1635
Design of an improved model using federated learning and LSTM autoencoders for secure and transparent blockchain network transactions
Published 2025-01-01“…Abstract With the advancement of this digital era and the emergence of DApps and Blockchain, secure, robust and transparent network transaction has become invaluable today. …”
Get full text
Article -
1636
Investigating the effect of sense of security and perceived value on tourists\' spatial attachment Case Study (Zanjan Province)
Published 2022-09-01Subjects: “…feelings of security…”
Get full text
Article -
1637
Retracted: Construction of Social Security Fund Cloud Audit Platform Based on Fuzzy Data Mining Algorithm
Published 2023-01-01Get full text
Article -
1638
Comparison of Port Security Switch Layer 2 MAC Address Dynamic With MAC Address Static Sticky
Published 2022-12-01Subjects: Get full text
Article -
1639
Investigating the relationship between the sense of belonging to the place and the level of social security of citizens - Case study: Qom-
Published 2021-06-01Subjects: “…security…”
Get full text
Article -
1640
A domain adaptive hybrid genetic algorithm and its verification in security service function chain orchestration
Published 2020-05-01Subjects: “…cloud security…”
Get full text
Article