Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2981
Russian-тajik cooperation as a factor of stability in Central Asia (1992– 2022)
Published 2022-12-01“…This position meets the national interests not only of both countries, but also of the Central Asian states, guaranteeing their security and stability.…”
Get full text
Article -
2982
Thoracic Anesthesia and Cross Field Ventilation for Tracheobronchial Injuries: A Challenge for Anesthesiologists
Published 2014-01-01“…Due to the difficult nature of these injuries and the demanding attributes of the involved surgery, the anesthesiologist faces tough challenges while securing the airway, controlling oxygenation, undertaking one-lung ventilation, maintaining anesthesia during tracheal reconstruction, and gaining adequate postoperative pain control. …”
Get full text
Article -
2983
Political activity of widows as an example of shaping cliental dependencies in the second half of the seventeenth and eighteenth centuries
Published 2019-12-01“…Widows, protected by privilegesand secured with property ownership, had a solid influence on the formation of cliental ties. …”
Get full text
Article -
2984
Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia)
Published 2011-05-01“…I suggest that hunters and herders aim to maintain their autonomy from goods and resources imported from cities, and, in spending little effort connecting with state powers in this way, securing their lives from socio-economic constraints.…”
Get full text
Article -
2985
IMPROVEMENT OF PROFESSIONAL TRAINING FOR THE MILITARY- INDUSTRIAL COMPLEX
Published 2016-12-01“…Strengthening of the defense capability and the national security of the country in the faceof the contemporary challenges requires the improvement of professional training, retraining, advanced training, additional training of personnel and specialists for the defense industries. …”
Get full text
Article -
2986
Food System Study of Martin County, Florida
Published 2023-04-01“…Farmers often face challenges finding sizable, secure, well-paying markets, and the most consumers do not participate in local food transactions. …”
Get full text
Article -
2987
Monitoring Heart Disease and Diabetes with Mobile Internet Communications
Published 2012-01-01“…As an extra layer of security in the data transmission, information embedded in the data is used in its verification. …”
Get full text
Article -
2988
Pseudonyms in IPv6 ITS Communications: Use of Pseudonyms, Performance Degradation, and Optimal Pseudonym Change
Published 2015-05-01“…Numerical results demonstrate that an appropriate pseudonym change interval should be changed depending on the packet arrival rate, mobility rate, and security level.…”
Get full text
Article -
2989
Le manager-ingénieur face aux tensions entre innovation et organisation
Published 2023-06-01“…The objectives of improving mobility and creativity clash with the organizational imperatives of ensuring safety and security. The manager then deals with the network of actors in place, trying to convince them and facilitate their support. …”
Get full text
Article -
2990
La ira anticlerical de mayo de 1931. Religión, política y propaganda
Published 2017-07-01“…The involvement of uncontrolled groups in the incidents caused the first clash between members of the Administration regarding the use of public security forces. The de facto adversaries of the Republicans, including the powerful Catholic Church, were forced into taking a political stance. …”
Get full text
Article -
2991
THE IMPLEMENTATION OF THE STATE FAMILY POLICY IN MODERN RUSSIA
Published 2017-01-01“…From the impact of family policy depends on the decision of all without an exception of problems - from security, to solve the problem of population reproduction, to the formation of human capital in ensuring the competitiveness of the economy and, ultimately, problem solving, historical survival. …”
Get full text
Article -
2992
The Horizon Europe AGEMERA Project: Innovative Non-Invasive Geophysical Methodologies for Mineral Exploration
Published 2025-02-01“…Funded by the Horizon Europe programme, it aligns with the European Critical Raw Materials Act to enhance resource security and sustainability. Utilising passive seismic methods, drone-based electromagnetic sensing, and muography, the project maps subsurface characteristics across multiple countries in Europe and Zambia. …”
Get full text
Article -
2993
UNIVERSITY RANKING: SOCIOLOGICAL SUPPORT
Published 2016-12-01“…The authors give recommendations for more sociologically consistent provision of ranking criteria, discuss the prospect of creation and status securing of the Russian university ranking system.…”
Get full text
Article -
2994
Fire Safety Policy
Published 2022“…The aim of this policy is, therefore, to provide a robust fire safety framework which will be implemented to secure the safety and wellbeing of everyone within the University Community. …”
Get full text
Other -
2995
Skema Kredibilitas Sertifikat Berbasis Ilearning Gamifikasi Blockchain pada Kampus Merdeka
Published 2023-02-01“…Blockchain technology is the answer to every security problem because of the permanent and peer-to-peer storage in a distributed network and significant security. …”
Get full text
Article -
2996
De la police coloniale française à la police nationale marocaine : décolonisation et héritages policiers (1953-1960)
Published 2023-12-01“…Among the numerous institutional continuities between the French protectorate over the Cherifian Empire (1912-1956) and independent Morocco, the security forces, particularly the police, stand out. …”
Get full text
Article -
2997
First aid guidelines for fragile contexts (conflict, disaster and remote areas): Contextualization & Adaptation
Published 2022-07-01“…In some instances, safety and security of the first aider and the person requiring help should be prioritized over providing care. …”
Get full text
Article -
2998
Novel Technique of Pneumatic Posterior Capsulorhexis for Treatment and Prevention of Posterior Capsular Opacification
Published 2019-01-01“…Setting. (1) Ophthalmology department, Faculty of Medicine, Minia University, 61519, El-Minia, Egypt. (2) Security Forces Hospital, Ophthalmology Department, Riyadh, Kingdom of Saudi Arabia. …”
Get full text
Article -
2999
Sorghum yield prediction based on remote sensing and machine learning in conflict affected South Sudan
Published 2025-02-01“…This paper demonstrates that despite ongoing conflict, reasonably good end-of-season sorghum yield prediction with relevant food security planning implications could be done with ML, but challenges remain in generalizing these results due to limited crop data and regional variability in South Sudan.…”
Get full text
Article -
3000
Nutritional management and maize variety combination effectively control Striga asiatica in southern Africa
Published 2022-07-01“…Abstract Maize (Zea mays L.) is an important staple food crop in sub-Saharan Africa (SSA) and contributes significantly to food security. Due to Striga, maize yield loss is estimated between 20 and 80% forcing some farmers to abandon their land therefore threatening food security. …”
Get full text
Article