Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2621
Evolutionary modeling and robustness analysis of multi-domain cooperative communication network under the environment of Internet of things
Published 2022-11-01“…Through real-time monitoring and updating of the performance and security indicators of the multi-domain cooperative communication networks, it provides a strong guarantee for the node deployment and security management of the Internet of things cooperative communication system.…”
Get full text
Article -
2622
Quantum Private Comparison Protocol with Cluster States
Published 2025-01-01“…In this paper, we introduce a quantum private comparison (QPC) protocol designed for two players to securely and privately assess the equality of their private information. …”
Get full text
Article -
2623
A one health approach to plant health
Published 2022-09-01“…In this opinion piece, based on a webinar of the same name, we argue that a One Health perspective can help optimize net benefits from plant protection, realizing food security and nutrition gains while minimizing unintentional negative impacts of plant health practices on people, animals and ecosystems. …”
Get full text
Article -
2624
Making Simple Repairs: Holes in the Wall
Published 2019-05-01“… Landlords will deduct money from your security deposit if they have to fill in holes when you leave. …”
Get full text
Article -
2625
Asymmetric Information and Quantization in Financial Economics
Published 2012-01-01“…We illustrate the utility of this approach by deriving arbitrage-free derivative-security dynamics.…”
Get full text
Article -
2626
Profiles of the Hard to Employ and the Implications for Job Success
Published 2003-03-01“… This report, Profiles of the Hard to Employ and the Implications for Job Success, is part of the UF/IFAS Welfare-to-Work Initiative (Grant #A6218) funded by the Florida Agency for Workforce Innovation (formerly Florida Department of Labor and Employment Security). The Principal Investigator is Elizabeth B. …”
Get full text
Article -
2627
Employer Sponsored Retirement Savings Plans
Published 2012-05-01“…A financially secure retirement is a goal for many workers, and the ability to achieve that plan can be helped by employer-sponsored retirement plans. …”
Get full text
Article -
2628
Employer Sponsored Retirement Savings Plans
Published 2012-05-01“…A financially secure retirement is a goal for many workers, and the ability to achieve that plan can be helped by employer-sponsored retirement plans. …”
Get full text
Article -
2629
Making Simple Repairs: Holes in the Wall
Published 2019-05-01“… Landlords will deduct money from your security deposit if they have to fill in holes when you leave. …”
Get full text
Article -
2630
Profiles of the Hard to Employ and the Implications for Job Success
Published 2003-03-01“… This report, Profiles of the Hard to Employ and the Implications for Job Success, is part of the UF/IFAS Welfare-to-Work Initiative (Grant #A6218) funded by the Florida Agency for Workforce Innovation (formerly Florida Department of Labor and Employment Security). The Principal Investigator is Elizabeth B. …”
Get full text
Article -
2631
MODERN CYBERNETIC TERRORISM AND HIS SOCIAL CONSEQUENCES
Published 2016-05-01“…Given that policy now covers all spheres of public life and, therefore, increasing the problem of information security of society in General and each person in particular. …”
Get full text
Article -
2632
Signature Scheme Using the Root Extraction Problem on Quaternions
Published 2014-01-01“…The performance and other security related issues are also discussed.…”
Get full text
Article -
2633
-
2634
-
2635
Dataset of shotgun metagenomic evaluation of Sorghum bicolor rhizosphere microbiome in soils preceded by Glycine maxNCBINCBINCBINCBI
Published 2025-02-01“…Furthermore, the functional data and the function unknown from this dataset could enrich our understanding of microbial roles in nutrient cycling, plant growth promotion, and stress mitigation, which are critical for addressing challenges in food security and environmental sustainability.…”
Get full text
Article -
2636
Effect of Low-Frequency Vibration on Muscle Response under Different Neurointact Conditions
Published 2019-01-01Get full text
Article -
2637
Tannin alleviated reproductive dysfunction in pregnant ewes infected with Haemonchus contortus
Published 2025-02-01Get full text
Article -
2638
The role of wireless sensor networks in the modern landscape: a concise examination
Published 2022-06-01“…Wireless sensor networks are fast process of connection in part such as agriculture, healthcare, environmental monitoring, security, and manufacturing and also it thesaurus and measure physical signals and it also have wireless communication. …”
Get full text
Article -
2639
Why most African states may be at war with each other in 2063
Published 2019-10-01“…The Agenda 2063, which was created in 2015, groups its objectives into four broad categories: inclusive growth; integration; governance; security; cultural identity; women and youth; and partnership …”
Get full text
Article -
2640
Kink of Subclavian Artery Mimicking Stenosis
Published 2016-01-01“…In this asymptomatic case, we have merged clinical and multiple imaging modalities to secure the diagnosis and treatment plan.…”
Get full text
Article