Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2701
The Learning Continuum: A Model for Sustained Participation with Hard-to-Serve Clients
Published 2002-11-01“… This report, The Learning Continuum: A Model for Sustained Participation with Hard-to-Serve Clients, is part of the UF/IFAS Welfare-to-Work Initiative (Grant #A6218) funded by the Florida Agency for Workforce Innovation (formerly Florida Department of Labor and Employment Security). The Principal Investigator is Elizabeth B. …”
Get full text
Article -
2702
Observational research in epidemic settings: a roadmap to reform
Published 2025-02-01Get full text
Article -
2703
ASSESSMENT OF THE REGION'S INVESTMENT ENVIRONMENT AND POLICY INSTRUMENTS FOR THE IMPLEMENTATION OF ITS INVESTMENT POTENTIAL IN WARTIME
Published 2024-12-01“…It is substantiated that effective instruments of regional investment policy in the context of critical instability are: military risk insurance and diversification; use of concession agreements; private and public investments in the defence industry and critical infrastructure industries/sectors (energy, transport and logistics, medicine and pharmaceuticals, natural resources); support for innovative and technological startups in the areas of security, the real economy and infrastructure; stimulation of investments in human resources; support for investments in business projects of demobilised persons, war veterans and other combatants; encouragement of investments in the development of export potential to maintain the country's financial security.…”
Get full text
Article -
2704
Assessing groundwater level variability in response to climate change: A case study of large plain areas
Published 2025-02-01Get full text
Article -
2705
-
2706
-
2707
Implementasi Algoritme Clefia 128-Bit untuk Pengamanan Modul Komunikasi Lora
Published 2022-12-01“…One way to secure the LoRa communication module is to implement a security system that can prevent irresponsible parties from reading the messages sent, by using the encryption method. …”
Get full text
Article -
2708
Minimum Dietary Diversity and Associated Factors among Lactating Mothers in Ataye District, North Shoa Zone, Central Ethiopia: A Community-Based Cross-Sectional Study
Published 2020-01-01“…Therefore, efforts should be made to improve the mother’s decision-making autonomy, nutrition knowledge, household food security, and wealth status.…”
Get full text
Article -
2709
Detention of a person under suspicion of committing a criminal offence and the possibility to appeal in criminal proceedings
Published 2023-12-01“…It is emphasized that in addition to the inquirer, investigator, prosecutor, bodies authorized to carry out a pre-trial investigation, subjects who also have the right to detain a person under suspicion of having committed a criminal offense include all policemen, all military personnel serving in the National Guard of Ukraine, all employees of the special law enforcement military formation of the law enforcement service, employees of the State Security Department, military personnel performing duties for the protection of the state border, employees of the special law enforcement body of the Security Service of Ukraine, employees of the state law enforcement agency (NABU), employees of the customs service, officials involved in the anti-terrorist operation, officials and officials of enforcement agencies prisons and detention centers, captains of sea or river vessels of Ukraine located outside its borders, employees of the Department of Economic Security. …”
Get full text
Article -
2710
Evolutionary Algorithms and Quantum Computing: Recent Advances, Opportunities, and Challenges
Published 2025-01-01Get full text
Article -
2711
BCSE: Blockchain-Based Trusted Service Evaluation Model over Big Data
Published 2022-03-01“…The registration and authentication records of users’ identity and the reviews for service vendors are all stored in the blockchain network. The security analysis shows that this model can ensure the credibility of users’ reviews for service vendors, and other users can obtain credible reviews of service vendors via the review publicity module. …”
Get full text
Article -
2712
Value Added Tax and Economic Development: Focus on Human Capital Development
Published 2025-03-01“…The recommendations outlined in the study emphasize the importance of training, oversight, exchange rate stabilization, investment in education, and financial security in promoting Economic Development and Human Capital Development in Nigeria. …”
Get full text
Article -
2713
XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System
Published 2025-01-01“…By leveraging SHAP values, XI2S-IDS enhances transparency in decision-making, allowing security analysts to gain clear insights into feature importance and the model’s rationale. …”
Get full text
Article -
2714
Protecting Florida Panthers by Protecting Domestic Animals: Building a "Panther-Proof" Pen
Published 2016-11-01“…To maintain support for panther conservation, it is paramount that rural residents protect and secure their pets and livestock. This 3-page fact sheet explains how to make a locking, secure enclosure to protect livestock from panther predation—and protect the fragile panther, as well. …”
Get full text
Article -
2715
Optimizing Data Interoperability for System Efficiency: One Data Standard in the Government Environment
Published 2024-10-01“…Technical challenges relate to differences in communication protocols, data formats, and security. The results of the implementation show that with a careful and collaborative approach, these technical challenges can be overcome, as seen from the network revitalization and increased data security at the Ministry of Manpower with the help of BSSN. …”
Get full text
Article -
2716
A Survey of Post-Quantum Cryptography Migration in Vehicles
Published 2025-01-01“…A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography (PQC) algorithms. …”
Get full text
Article -
2717
Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks
Published 2018-08-01“…Since Internet of Things involve wireless channel for communication that is open for all types of malicious adversaries, therefore many security protocols have been proposed to ensure encryption over wireless channel. …”
Get full text
Article -
2718
Exploring Diet Quality, Food Insecurity, and Health Status among Utah Residents
Published 2024-12-01“…The findings revealed an association between very low food security and poor diet quality, particularly for individuals with reduced fruit and vegetable intake. …”
Get full text
Article -
2719
Cooperative Behaviors and Multienergy Coupling Through Distributed Energy Storage in the Peer-to-Peer Market Mechanism
Published 2025-01-01“…A consortium blockchain-based framework ensures secure and private registration. A peer-to-peer network facilitates multienergy trading, enabling efficient energy generation and storage. …”
Get full text
Article -
2720
Flexibility matters: Impact assessment of small and medium enterprises flexibility on the German energy transition
Published 2025-01-01“…By 2045, wind power becomes vital for supply security and is operated as a dispatchable ramping-up technology. …”
Get full text
Article