Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2761
Analysis of global experience in creating digital platforms and related risks
Published 2020-10-01“…The following types of digital risks have been considered: information security risks, organized cybercrime risks, reputational risks, legal risks, operational risks and risks of instability of participants’ income. …”
Get full text
Article -
2762
HUMAN RIGHTS, FUNDAMENTAL FREEDOMS AND UNIVERSAL VALUES IN INTERNATIONAL RELATIONS
Published 2016-08-01“…The author emphasizes the import role of the Conference on Security and Cooperation in Europe (CSCE) in transforming the issues of human rights and fundamental freedoms into the essential element of public diplomacy of contemporary states. …”
Get full text
Article -
2763
Privacy-Preserving Efficient Data Retrieval in IoMT Based on Low-Cost Fog Computing
Published 2021-01-01Get full text
Article -
2764
Quality of public services in the field of population administration in malang public administrative mall
Published 2023-12-01“…Employees in terms of helping people who need services, especially people who are confused about services, have been seen between officers and visitors who communicate with each other. Security at the Malang City Public Administration Mall has shown efforts to improve the quality of its services related to providing a sense of security for the community. …”
Get full text
Article -
2765
An Analysis of Spatial Pathology of the Physical and Social Structure of the City with Non-Relevant Defense Approach Case Study: Tehran Metropolitan Area
Published 2019-06-01“…In addition, it was revealed that education and awareness, resiliency against security-military threats, skill and expertise, respectively, are the effective indicators of the vulnerability of the social structure of the area.…”
Get full text
Article -
2766
ECP-IEM: Enhancing seasonal crop productivity with deep integrated models.
Published 2025-01-01“…Accurate crop yield forecasting is vital for ensuring food security and making informed decisions. With the increasing population and global warming, addressing food security has become a priority, so accurate yield forecasting is very important. …”
Get full text
Article -
2767
Prioritizing Signaling Information Transmission in Next Generation Networks
Published 2011-01-01Get full text
Article -
2768
The Kurdish Movement’s Factor in US Politics at the Peak of Iran and Afghanistan Crises, 1979 – January 1981
Published 2023-11-01“…Faced with the challenges presented by the Iranian and Afghan crises, the United States' analytical, intelligence, and military bodies navigated various resources in search of viable solutions.This study delves into the consideration of the Kurdish factor as a potential instrument in shaping the regional landscape. The National Security Council (NSC), State Department, Central Intelligence Agency (CIA), and the US Department of Defense all scrutinized the Kurdish movement, evaluating its prospects for advancing American interests. …”
Get full text
Article -
2769
-
2770
Short-Term Prediction of Electronic Transformer Error Based on Intelligent Algorithms
Published 2020-01-01Get full text
Article -
2771
Transformation in European Defence Supply Chains as Ukraine Conflict Fuels Demand
Published 2025-01-01“…This study contributes to a deeper understanding and theoretical advancement in managing military and security challenges, with particular emphasis on enhancing readiness, resilience, and the scaling of military capabilities across cross-border defence supply chains.…”
Get full text
Article -
2772
On Stability of Multi-Valued Nonlinear Feedback Shift Registers
Published 2019-01-01Get full text
Article -
2773
Efficient data possession–checking protocol with deduplication in cloud
Published 2017-08-01“…Data integrity verification with deduplication can not only save space of the cloud server but also ensure security of the stored data. In the existing integrity verification scheme, deduplications are implemented by the cloud server. …”
Get full text
Article -
2774
Virtual Simulation Design Facing Smart Payment Screen on the Background of Artificial Intelligence
Published 2022-01-01“…The design of the smart payment screen makes the user’s payment more secure, and the payment risk is greatly reduced.…”
Get full text
Article -
2775
Digitization and Preservation of Academic Records: A case Study of Kabale University Registry.
Published 2024“…The study also identified several threats to these records, such as inadequate data security measures, insufficient storage space, cybersecurity threats, poor maintenance of digitization equipment, technological obsolescence, and potential disasters. …”
Get full text
Thesis -
2776
Advanced Measuring (Instrumentation) Methods for Nuclear Installations: A Review
Published 2012-01-01“…The research of measurement in nuclear installations involves many aspects, such as nuclear reactors, nuclear fuel cycle, safety and security, nuclear accident, after action, analysis, and environmental applications. …”
Get full text
Article -
2777
STRUCTURE AND CONTENT OF PRODUCTION ANALYSIS IN RETAIL CHAINS
Published 2017-09-01“…The issues of analysis in the enterprise security system are touched.…”
Get full text
Article -
2778
Tropical Foliage Plant Development: Breeding Techniques for Aglaonema and Dieffenbachia
Published 2009-06-01“…Mellich, describes the techniques plant breeders can use for controlling flowering, effecting pollination, and securing seed production. Includes references. Published by the UF Department of Environmental Horticulture, May 2009. …”
Get full text
Article -
2779
IMPLEMENTATION OF PUBLIC-PRIVATE PARTNER-SHIP PROJECTS IN THE RUSSIAN ARCTIC
Published 2018-06-01“…The importance of this task is determined by the fact that the reserves of natural resources located in the Arctic should provide the basis for the energy and economic security of the country. The comparative analysis of ways of realization of infrastructure projects on the basis of the state order and public - private partnership is carried out. …”
Get full text
Article -
2780
THE COMINFORM EMIGRATION IN BULGARIA
Published 2025-02-01“…Research is mostly based on unpublished sources from the State Security Service (UDB) that are kept in the State Archives of Serbia, and also on relevant literature.…”
Get full text
Article