Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3101
Digital finance, maize productivity, and welfare of farm households in Burkina Faso
Published 2025-12-01“…Maize productivity is thus important for food security and household welfare but is constrained by financial issues that can be alleviated by digital finance. …”
Get full text
Article -
3102
Cost Share Programs for Florida's Agricultural Producers and Landowners
Published 2009-01-01“… SL-264, a 4-page fact sheet by Rao Mylavarapu, Kelly Hines, and Alyssa Dodd, describes several conservation programs included in the 2008 Farm Bill — the Environmental Quality Incentives Program (EQIP), Wetlands Reserve Program (WRP), Grassland Reserve Program (GRP), Wildlife Habitats Incentive Program (WHIP), and the Conservation Security Program (CRP) — which may be of high interest to farmers, ranchers, land owners, agricultural consultants, local decision-makers and extension agents. …”
Get full text
Article -
3103
Talk About Crime Among Young People in Northern Mexico: The Impact of Drug Trafficking in the Neighborhood
Published 2025-01-01“…The main changes pointed out by the young people were the intensification of insecurity, the expansion of drug dealing in the community, mental health problems (especially addictions), the restriction of mobility on the streets, and changes in the relationship with security institutions. They also refer to changes such as the normalization of drug trafficking and the decline of the neighborhood’s image.…”
Get full text
Article -
3104
THE MAIN PROBLEMS OF THE DEVELOPMENT OF INSURANCE SERVICES IN THE AGRICULTURAL SECTOR OF THE REPUBLIC OF TAJIKISTAN AND THE WAYS OF ITS SOLUTION
Published 2017-03-01“…The article dwells on problems of development of insurance services in the Republic of Tajikistan, the insurance market, in particular the development of insurance services in the agricultural sector and its influence on the further development of agriculture and food security in Tajikistan. The author determines that among the most pressing problems which inhibit the insurance, is not well-developed banking system, not profitability and productivity of existing farms and farms, insufficient government subsidies in the agricultural sector, macroeconomic factors, increased differentiation of agricultural producers in terms of income, the bankruptcy of a large part of dehkan (farmer) economy and the lack of necessary infrastructure. …”
Get full text
Article -
3105
Tributary
Published 2023-05-01“…Tributary explores covert, 'black-boxed' data centres (remote and highly secure sites) by tracking water and geothermal sources to the infrastructure required to power and house these physical locations of intensive computational processing. …”
Get full text
Article -
3106
Safe Harbor Agreement: A Regulatory Assurance under the Endangered Species Act
Published 2016-02-01“… The involvement of the private sector is critical for the conservation and recovery of many species, but landowners’ fears that increased management restrictions could keep them from enjoying their land can present a challenge to securing their trust and assistance in conservation efforts. …”
Get full text
Article -
3107
Identification of critical nodes in supply chain networks
Published 2025-01-01“…The accurate identification of the critical nodes in a SCN is important for securing the supply chain. This study proposes a new method for identifying critical nodes in SCNs based on the topological and functional characteristics of SCNs. …”
Get full text
Article -
3108
A Laryngoscope with Shape Memory Actuation
Published 2024-09-01“…Endotracheal intubation is a medical procedure to secure a patient’s airways, which can be challenging in emergency situations due to an individual’s anatomy. …”
Get full text
Article -
3109
Individual Agency and the Diversity of Traditional Practice: The Iji Nla Association of Ijede
Published 2021-12-01“…Over time, it increasingly functioned as an institution providing traditional social control mechanisms and security. This article focuses on the origin, structure, and diversity of the Iji Nla Association as a traditional social mechanism and its continued relevance in Ijede. …”
Get full text
Article -
3110
An Improvement of the Camshift Human Tracking Algorithm Based on Deep Learning and the Kalman Filter
Published 2023-01-01“…Automated human tracking in real time has been applied in many areas such as security, surveillance, traffic control, and robots. …”
Get full text
Article -
3111
Delay-Range-Dependent H∞ Control for Automatic Mooring Positioning System with Time-Varying Input Delay
Published 2014-01-01“…Aiming at the economy and security of the positioning system in semi-submersible platform, the paper presents a new scheme based on the mooring line switching strategy. …”
Get full text
Article -
3112
CRITICAL ARGUMENTS ABOUT READMISSION PRACTICES AND POLICIES BETWEEN EU AND TURKEY
Published 2021-03-01“…Within the scope of the analyses, it is aimed to discuss the critical arguments on political approaches and security policies of the European Union and Turkey on migration control and elaborate why both sides preferred to solve the migration crisis through regional, and specifically, bilateral instruments.…”
Get full text
Article -
3113
Hybrid Intrusion Detection System for DDoS Attacks
Published 2016-01-01“…Distributed denial-of-service (DDoS) attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS), for detection of DDoS attacks. …”
Get full text
Article -
3114
Countering detector manipulation attacks in quantum communication through detector self-testing
Published 2025-01-01“…In practical quantum key distribution systems, imperfect physical devices open security loopholes that challenge the core promise of this technology. …”
Get full text
Article -
3115
The Environmentally Friendly Practices to Fight Plants’ Diseases: Scope Review
Published 2025-01-01“… Plant diseases reduce the production and affect the food security. The use of synthetic chemicals affects the environment and individual health quality. …”
Get full text
Article -
3116
Long-Term Remission of a Spinal Atypical Teratoid Rhabdoid Tumor in Response to Intensive Multimodal Therapy
Published 2019-01-01“…Provided clinical and diagnostic suspicion is high, the histopathological diagnosis is relatively straightforward to secure by testing for the characteristic loss of the tumor suppressor protein SMARCB1/INI1. …”
Get full text
Article -
3117
Ambitions et limites du grand projet chinois des Nouvelles Routes de la soie
Published 2021-12-01“…What is more original is to understand China's proposal to project beyond its borders in the aim to deploy a very extensive network both in economic and security fields is a worldwide and massive global strategy for the future. …”
Get full text
Article -
3118
Sub-regional efforts to achieve gender equality in land ownership
Published 2025-01-01“…Results: The results obtained from my analysis are: the mechanisms for implementing women’s tenure security; the tools for codifying women’s land tenure; and the monitoring progress for strengthening women’s land rights in Africa. …”
Get full text
Article -
3119
Transformative adaptation: from climate-smart to climate-resilient agriculture
Published 2023-08-01“…Abstract In response to the climate crisis, there has been much focus on climate-smart agriculture (CSA); namely, technologies and practices that enhance adaptation, reduce greenhouse gas emissions, and contribute to food security; the so-called triple win. Success has tended to be measured in terms of the number of farmers adopting CSA with less focus given to the impacts especially on human development. …”
Get full text
Article -
3120