Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2801
Central Bank Digital Currencies: Benefits, Risks and the Role of Blockchain Technology
Published 2020-07-01“…The main motives are higher financial stability, higher security and efficiency of payment systems and a higher degree of automation of business processes. …”
Get full text
Article -
2802
Biosecurity and Biological Risk Management for Livestock Enterprises
Published 2008-04-01“… AN-194, a 6-page fact sheet by Matt Hersom, Max Irsik, and Todd Thrift, describes biosecurity and biological risk management practices, basic biosecurity and BRM management practices, disease transmission routes, enterprise security, reasons to have a BRM plan, and biosecurity best management practices. …”
Get full text
Article -
2803
Machine learning models and methods for solving optimization and forecasting problems of the work of seaports
Published 2022-12-01“…A special attention is paid to the port planning and development a wide range of topics in port operations, including port planning and development, their safety and security, water and land port operations.…”
Get full text
Article -
2804
Adoption of Drone Technology for the Smart Safety Mechanism of Women
Published 2022-09-01“…These DRONES helps them to keep secure and do all the patrol or Police work during nights.…”
Get full text
Article -
2805
The conservation of a 19th century framed miniature portrait painted on ivory
Published 2018-05-01“…The object was in poor condition, with all the pieces necessary to hold the object separated and with the attempt of securing these parts with brown and clear adhesive tape. …”
Get full text
Article -
2806
On the optimal exercise boundary for an American put option
Published 2001-01-01“…An American put option is a derivative financial instrument that gives its holder the right but not the obligation to sell an underlying security at a pre-determined price. American options may be exercised at any time prior to expiry at the discretion of the holder, and the decision as to whether or not to exercise leads to a free boundary problem. …”
Get full text
Article -
2807
Darknesses over the Bistrica. On some unacceptable interpretations of the history of Prizren and its monuments
Published 2023-01-01“…It is shown that those views and opinions have no basis in the sources and are a result of unsound methodology and ignoring securely ascertained facts in a bid to reshape tendentiously the image of the past.…”
Get full text
Article -
2808
Korean Brinkmanship, American Provocation, and the Road to War: The Manufacturing of a Crisis
Published 2010-12-01“…The exchange of artillery fire between South and North Korea on 23 November, 2010 had predictable results - a great increase of tension on the peninsula, a show of force by the United States, and a torrent of uninformed media articles and pontificating from the security industry.Tim Beal probes the historical background to the recent incident that has brought the two Koreas, as well as the United States and China, to the brink of a new Korean War, and what can be done to address the issues.…”
Get full text
Article -
2809
Analytical and scientific support mechanism of the US foreign policy process
Published 2009-12-01“…The U.S. intellectual leadership in many spheres is rarely challenged nowadays. However it is secured not only through the ability to formulate a great amount of new ideas, including fundamental innovations, but perhaps even more due to the effective system for integration of intellectual products into practice. …”
Get full text
Article -
2810
Biosecurity and Biological Risk Management for Livestock Enterprises
Published 2008-04-01“… AN-194, a 6-page fact sheet by Matt Hersom, Max Irsik, and Todd Thrift, describes biosecurity and biological risk management practices, basic biosecurity and BRM management practices, disease transmission routes, enterprise security, reasons to have a BRM plan, and biosecurity best management practices. …”
Get full text
Article -
2811
Respite Care for Caregivers of Older Adults
Published 2012-08-01“…My grandmother knew she was safe, secure, and loved.” This 2-page Family Album Radio transcript was written by Suzanna Smith and published by the UF Department of Family, Youth and Community Sciences, August 2012. …”
Get full text
Article -
2812
ECOLOGICALLY ORIENTED MATHEMATICAL MODELS OF RISK MANAGEMENT AND SAFETY
Published 2016-09-01“…Recommendations on the implementation and development of eco-friendly models in the interests of rational nature management, resource saving, human security and natural-anthropogenic complexes are formulated.…”
Get full text
Article -
2813
ANALYSING EFFICIENCY OF AGGRESSIVE ETF-COMPOSED PORTFOLIO STRATEGIES
Published 2014-06-01“…Based on the results of the t-tests, one can conclude whether the above-mentioned market segment is inefficient or partially inefficient, which would mean one can find an "aggressive"strategy to secure stable above-market returns.…”
Get full text
Article -
2814
Analysis of Natural Aging Behavior of Asphalt Binder in Cold and Arid Region
Published 2022-01-01Get full text
Article -
2815
-
2816
EPPTA: Efficient partially observable reinforcement learning agent for penetration testing applications
Published 2025-01-01“…Abstract In recent years, penetration testing (pen‐testing) has emerged as a crucial process for evaluating the security level of network infrastructures by simulating real‐world cyber‐attacks. …”
Get full text
Article -
2817
-
2818
A Multi-Signature Scheme for Defending Malleability Attack on DeFi
Published 2025-01-01“…Signatures are crucial in blockchain-based Decentralised Finance (DeFi) protocols because they ensure the security and integrity of transactions and smart contracts. …”
Get full text
Article -
2819
Levels Politechnic Community Satisfaction to The Use of Lebuhraya Pantai Timur 2
Published 2018-11-01“…Results of this analysis showed a mean value for items 'security level' in LPT2 is 2.29, i.e. at low mean score. …”
Get full text
Article -
2820
Examination and the State of Intoxication: Features of Legal Regulation and Observance of Human Rights and Freedoms
Published 2020-06-01“…In other circumstances, such an examination of intoxication should be considered inadmissible evidence in an administrative offense case, since it was obtained in substantial violation of human rights and freedoms, including the right to liberty and security, as well as a number of other rights, which the detained person failed to exercise. …”
Get full text
Article