Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2601
An Analysis of Chinese Transport Infrastructure Loans and Investment in ICT in Nigeria
Published 2022-12-01“…The possibility of debt insolvency has serious implications for national security and socio-economic development the future. …”
Get full text
Article -
2602
Sustainable Planning of Cross Border Cooperation Development (CBC): The factors and drivers that affect the stability of border regions
Published 2020-03-01“…The results showed that in the area of planning for unity in Sistan and Baluchestan except for the determination of the right of the Hirmand River in the Sistan region, which was concluded with the country over a period of time, the plan was not approved or implemented, and among the five factors Economic, social, cultural-religious, institutional-structural and political security, three economic factors (0.478), political-security (0.473) and cultural-religious (0.363) have the most effect on the stability of unity of border regions in Studied area. …”
Get full text
Article -
2603
THE IMPACT OF INSECURITY ON THE HOSPITALITY INDUSTRY IN GUSAU METROPOLIS: A CASE STUDY OF HOTELS
Published 2024-09-01“…Hotel managers have implemented various strategies to mitigate these challenges, including enhanced security personnel, surveillance systems, and regular staff training. …”
Get full text
Article -
2604
Government interventions in supporting SME growth in Lira district, northern Uganda
Published 2018“…The study discovered that inadequacy of collateral security and struggle for financial resources come into view to limit the use and access to financial services. …”
Get full text
Article -
2605
Government interventions in supporting SME growth in Lira district, northern Uganda
Published 2018“…The study discovered that inadequacy of collateral security and struggle for financial resources come into view to limit the use and access to financial services. …”
Get full text
Article -
2606
Design of a GSM Based Switching and Monitoring System Using a Mobile Phone.
Published 2023“…This GSM based switching and monitoring system is recommended for implementation in homes, offices and industries to prevent appliance damage due over heating, for security purposes and to tackle the rampant energy wastage in Uganda…”
Get full text
Thesis -
2607
Patients’ Experiences with Specialist Care via Video Consultation in Primary Healthcare in Rural Areas
Published 2014-01-01“…Additionally, good communication was essential for the patient’s perception of security during the VC encounter.…”
Get full text
Article -
2608
A Novel Scheme for Construction of S-Box Using Action of Power Associative Loop and Its Applications in Text Encryption
Published 2024-01-01“…The Avalanche Effect test is used to examine the effectiveness of our technique, and it confirmed the robustness and security of our encryption scheme.…”
Get full text
Article -
2609
A New Method of Image Steganography Using 7th Bit of a Pixel as Indicator by Introducing the Successive Temporary Pixel in the Gray Scale Image
Published 2018-01-01“…As the internet has become the medium for transferring the sensitive information, the security of the transferred message has become the utmost priority. …”
Get full text
Article -
2610
Oil and Iran Regions Rural Economic Structure Alteration
Published 2018-03-01“…The oil has gradually obtained a predominant place in national economy since 1950 and nowadays, is the main important resource securing country financial needs. Two questions are the base of this research regarding contradiction of oil rent and traditional economic sectors including agriculture and livestock rearing which always have been intensified. …”
Get full text
Article -
2611
Trust-Centric and Economically Optimized Resource Management for 6G-Enabled Internet of Things Environment
Published 2024-12-01“…TEO-IoT presents an end-to-end solution for security management and network traffic optimization, utilizing advanced algorithms for trust score estimation and anomaly detection. …”
Get full text
Article -
2612
An Efficient Cluster Authentication Scheme Based on VANET Environment in M2M Application
Published 2013-11-01“…We have successfully included the establishment of secure channels, the detection of replay attacks, mutual cluster authentication, prevention of vehicle identity fabrication, and secure distribution of provisional session key.…”
Get full text
Article -
2613
Armies of War Without Uniforms: Mercenaries and Private Military Companies in Russia’s Interventions in Syria and Ukraine
Published 2023-04-01“…The changing perception of security is the main reason for the resurgence of mercenary activities. …”
Get full text
Article -
2614
Transformation of the currency regulation regime and foreign economic relations of Russia in the context of expanding anti-Russian sanctions
Published 2024-11-01“…The article discusses the features of currency regulation and foreign economic relations of the Russian Federation (hereinafter referred to as RF, Russia) in the context of the introduction and growth of anti-Russian sanctions by the United States of America, European Union countries and other unfriendly countries, issues related to ensuring the sustainability of the Russian economy and its ability to withstand negative internal and external influences, issues of financial security, which is an important component of the country’s economic security, issues of the current state of the state’s banking system and the Russian economy as a whole. …”
Get full text
Article -
2615
Antecedents of smart tourism destination perceived attractiveness and behavioral intention for digital natives
Published 2024-11-01“…The study has found that digital natives view of interactivity and digital security can influence their assessment of STD attractiveness. …”
Get full text
Article -
2616
Detection and diagnosis of unknown threats in power equipment using machine learning and Spark technology
Published 2025-01-01“…This approach allows for more efficient and accurate detection of unknown threat attacks on power grid equipment, providing robust network security for power systems. Our findings offer a new theoretical perspective for the evolving field of network security.…”
Get full text
Article -
2617
Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method
Published 2015-01-01“…Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. …”
Get full text
Article -
2618
Explaining The Territoriality Of Fundamentalist Organizations in Fragile States(Case Study: ISIS in Libya)
Published 2018-03-01“…Fundamentalism is one of the security issues of today's world, and the Territorialize and , Territoriality of fundamentalist terrorist groups has attracted a large part of the world's security literature. …”
Get full text
Article -
2619
Performance Improvement Based Authentication Protocol for Intervessel Traffic Service Data Exchange Format Protocol Based on U-Navigation System in WoT Environment
Published 2014-01-01“…And the vessel traffic information requires high security since it is highly protected by the countries. …”
Get full text
Article -
2620
ORGANIZATIONAL AND LEGAL ASPECTS OF THE REGULATION OF LABOR RELATIONS OF AN EDUCATIONAL ORGANIZATION AND AN ADVISER TO THE DIRECTOR OF EDUCATION
Published 2024-07-01“…Law enforcement practice demonstrates problems in the field of concluding an employment contract and its essential conditions, securing a list of labor functions, securing a position in the staffing table, calculating wages, etc. …”
Get full text
Article