Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2881
Le système d’identification automatique (AIS)
Published 2015-12-01“…It enhances maritime safety and security. AIS’ contributions are undeniable in spite of some deficiencies and technical restrictions. …”
Get full text
Article -
2882
Research on reliability of pulsed electrothermal propulsion system of nanosatellite
Published 2021-12-01“…In the paper have been discussed nanosetellite propulsion system normalization actual themes, as well their acknowledgement by the testing results. To secure needed survival probability P≥0,995, the propulsion system bottlenecks normalized values are defined. …”
Get full text
Article -
2883
Synchronization for a Class of Fractional-Order Hyperchaotic System and Its Application
Published 2012-01-01“…Furthermore, this control scheme can be used in secure communication via the technology of chaotic masking using the complex nonperiodic information as trial message, and the useful information can be recovered at the receiver. …”
Get full text
Article -
2884
Financing Investments in the Future: Pragmatic Solutions Are Needed
Published 2022-01-01“…However, they need to be quantified in concrete terms as quickly as possible and designed to ensure legal security in order to send reliable signals for the necessary capacity building, particularly in the construction industry and public administration.…”
Get full text
Article -
2885
Les migrations en transit au Maroc. Attitudes et comportement de la société civile face au phénomène
Published 2009-11-01“…Responsiveness and variability on the part of Moroccan authorities highlight the double dependence of a management process focused on security issues yet influenced by external pressures, including the fragile compromise with the European Union and some member countries. …”
Get full text
Article -
2886
Extreme Precipitation and Floods: Monitoring, Modelling, and Forecasting
Published 2017-01-01Get full text
Article -
2887
Post-therapeutic support and rehabilitation for breast cancer women in complete remission in a thermal resort: study protocol for the PACThe Real-Life conditions observational tria...
Published 2025-01-01“…Although this allows better care organization and improved security, it is perceived as stressful and restrictive by the “cancer survivor”. …”
Get full text
Article -
2888
-
2889
The question of Baltic states in the policy of the Great Western powers in 1943
Published 2003-12-01“…Because the Western Allies hoped that Stalin would continue the cooperation with the Western powers, USA and Britain accepted Stalin's demands for security in Tehran. Baltic states in inter-Allied relations were used as a bargaining chip. …”
Get full text
Article -
2890
Optimization of Rendering Parameters of Cesium 3DTiles Model Based on Differential Evolution Algorithm
Published 2025-01-01Get full text
Article -
2891
THE ANALYSIS OF THE KEY DRIVERS AND BARRIERS OF CLOUD MIGRATION IN COMPANIES IN BOSNIA AND HERZEGOVINA
Published 2020-05-01“…According to the research results, the most significant obstacles of cloud migration include the fo-llowing: lack of internal experts, privacy, lack of respo-nsibility of cloud providers in case of security incident, costs and complexity of migration to the cloud, etc. …”
Get full text
Article -
2892
STATE POLICY TO COUNTER CRIME IN BORDER REGIONS IN A DIGITAL SOCIETY
Published 2024-03-01“…The purpose of the scientific report is to summarize the criminal risks of digitalization for the national security of border regions and to analyze some areas of state policy in the field of combating crime in a digital society. …”
Get full text
Article -
2893
Quantum theory-inspired inter-sentence semantic interaction model for textual adversarial defense
Published 2024-12-01“…Abstract Deep neural networks have a recognized susceptibility to diverse forms of adversarial attacks in the field of natural language processing and such a security issue poses substantial security risks and erodes trust in artificial intelligence applications among people who use them. …”
Get full text
Article -
2894
ASSESSING THE QUALITY OF MICROSERVICE AND MONOLITHIC-BASED ARCHITECTURES: A SYSTEMATIC LITERATURE REVIEW
Published 2024-06-01“…The outcome of the literature review brings forth the key quality attributes in addition to their sub-characteristics as follows: performance, scalability, coupling, cohesion, deployment, security, development, complexity, maintainability, and availability. …”
Get full text
Article -
2895
-
2896
Emergency nurses’ disaster preparedness competencies: A focused mapping review and synthesis
Published 2025-01-01“…Conclusion: Communication, incident management, safety and security, preparedness and planning are the most identified integral domains within other identified domains. …”
Get full text
Article -
2897
Migration and Residual Trapping of Immiscible Fluids during Cyclic Injection: Pore-Scale Observation and Quantitative Analysis
Published 2020-01-01“…In GCS operations, residual trapping is the most favorable form of a trapping mechanism because of its storage security and capacity. In this study, the effects of cyclic injection of CO2-water on the immiscible displacement and residual trapping in pore networks were examined. …”
Get full text
Article -
2898
Criminological Scenarios of Crime Situation’s Transformation in the Context of Armed Conflict on Donbass in the Midterm
Published 2019-09-01“…The author has expertly substantiated the highest probability of developing a crime situation in the midterm in the following three scenarios: “Stagnation and slight increase” (most realistic), “Control and security” (optimistic), “Turbulent crime” (negative). …”
Get full text
Article -
2899
Overcrowding in prisons: Health and legal implications
Published 2024-01-01“…Beyond the harm caused to persons in prisons, this may negatively impact society at large in terms of security, public health, and economy. Political will is essential in reducing prison overcrowding.…”
Get full text
Article -
2900
The EU Cooperation with South African Countries: Main Trends and Prospects for Development
Published 2024-06-01“…Stronger cooperation can contribute to economic growth, development, peace, and security.…”
Get full text
Article