Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3161
Methodological foundations of political-geographical studies of borders using the example of Hungary
Published 2024-01-01“…Border management involves control of movement, security, and cross-border cooperation, which is critical for regional stability and development. …”
Get full text
Article -
3162
Sharenting – skala i wielowymiarowość zjawiska (nierozważnego) ujawniania przez rodziców informacji o dzieciach w mediach społecznościowych
Published 2018-12-01“…There is a need of educational actions, directed to both parents and society, about the children’s security and safety of their privacy in the Internet. …”
Get full text
Article -
3163
Design and Implementation of Software-Based Simulator for Performance Evaluation of Transmission Protocol
Published 2014-03-01“…We propose a method of software-based transmission protocol simulation for the establishment of ubiquitous infrastructure as a method of securing reliability of a ubiquitous sensor network (USN), which is an important element of ubiquitous infrastructure establishment. …”
Get full text
Article -
3164
Food Insecurity and Obesity
Published 2017-05-01“…It is important that the coexistence of food insecurity and obesity is well understood so that community outreach programs and interventions can continue to be implemented in order to improve food security by increasing access to affordable, healthy foods and promoting good health nationwide. …”
Get full text
Article -
3165
Du détroit de Malacca jusqu’à sa périphérie
Published 2009-09-01“…Although the Malacca Strait was previously one of the main piracy prone areas, it is becoming increasingly secure, and presents itself as a good example. Nevertheless, field research tends to cast a shadow over this optimistic view. …”
Get full text
Article -
3166
Trucking, Owner-Operators, and Florida Perishables
Published 2005-04-01“…In this report, we examine the extent to which owner-operators have been able to maintain their share of Florida's produce/ornamentals haulage and their dependence upon larger carriers to secure loads. his is EDIS document, FE543, a publication of the Department of Food and Resource Economics, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida, Gainesville, FL. …”
Get full text
Article -
3167
Trucking, Owner-Operators, and Florida Perishables
Published 2005-04-01“…In this report, we examine the extent to which owner-operators have been able to maintain their share of Florida's produce/ornamentals haulage and their dependence upon larger carriers to secure loads. his is EDIS document, FE543, a publication of the Department of Food and Resource Economics, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida, Gainesville, FL. …”
Get full text
Article -
3168
Decolonising Bibles? Image, imagination, and imagin(in)g in the postcolonial academy
Published 2023-11-01“…Ensconced in the image of ideologically secure and contented intellectual space, epistemological and hermeneutical approaches which explicitly involve the social location of interpreters and academic discourses are still viewed with concern if not suspicion. …”
Get full text
Article -
3169
Estate Planning
Published 2012-03-01“…An estate plan is a pattern, a guide, or a master method for working toward financial security and the family’s future welfare. To be most effective, estate planning should involve all members of the family. …”
Get full text
Article -
3170
How to Protect Future Generations' Rights in European Governance
Published 2010-10-01“…Given that future generations are right-bearing citizens of tomorrow, legislative systems should secure these rights through appropriate institutions. …”
Get full text
Article -
3171
Remarks on the Reasoning: The Morals of a Hungarian Expulsion Decision in Times of Pandemic
Published 2021-05-01“… Several Iranian university students were expelled from Hungary to Iran due to their (allegedly) unlawful behaviour during their quarantine period at the outburst of the Covid-19 pandemic on grounds of being a threat to public policy and public security. The case reveals a worrisome practice in the reasoning of expulsion decisions, irrespective of the pandemic. …”
Get full text
Article -
3172
Service Provider Selection For Project Logistics Operations With Fuzzy Analytic Hierarchy Process
Published 2023-01-01“…The results are that for project logistics management, logistics service providers need to improve vehicle availability, cargo security, on-time delivery, etc. to become more competitive.…”
Get full text
Article -
3173
Status of GPU capabilities within the Shift Monte Carlo radiation transport code*
Published 2025-01-01“…Shift is a general-purpose Monte Carlo (MC) radiation transport code for fission, fusion, and national security applications. Shift has been adapted to efficiently run on GPUs in order to leverage leadership-class supercomputers. …”
Get full text
Article -
3174
Chaos Synchronization Based on Unknown Input Proportional Multiple-Integral Fuzzy Observer
Published 2013-01-01“…This paper presents an unknown input Proportional Multiple-Integral Observer (PIO) for synchronization of chaotic systems based on Takagi-Sugeno (TS) fuzzy chaotic models subject to unmeasurable decision variables and unknown input. In a secure communication configuration, this unknown input is regarded as a message encoded in the chaotic system and recovered by the proposed PIO. …”
Get full text
Article -
3175
Use of biological control agents for managing fungal pathogens in Solanaceae crops: progress and future perspectives—a review
Published 2025-01-01“…Abstract The growing global population has intensified concerns about food security, making it essential to produce crops sustainably to meet increasing demands without harming the environment. …”
Get full text
Article -
3176
Green IoT: how wireless sensor networks are paving the way for sustainable smart environments
Published 2023-06-01“…This article clarifies the concept of the IoT, including its features, security concerns, and technology adoption trends.…”
Get full text
Article -
3177
Direct radiocarbon dating and stable isotopes of the neandertal femur from Les Rochers-de-Villeneuve (Lussac-les-Châteaux, Vienne)
Published 2006-06-01“…The direct radiocarbon date makes it the oldest directly dated European Neandertal specimen, even though others have securely associated radiocarbon dates in the same time range. …”
Get full text
Article -
3178
Constructing Core Backbone Grid Based on the Index System of Power Grid Survivability and BBO Algorithm
Published 2014-01-01“…The survivability index of power grid is made up of four indices, namely, the resistibility, recoverability, security, and connectivity. Based on survivability, a method of constructing core backbone grid with the optimal criteria of the minimal total line length and the largest integrated survivability index is put forward. …”
Get full text
Article -
3179
Determinants of Market Liquidity of Shares Traded on the BM&FBOVESPA
Published 2014-01-01“…The greater the difference between the price offered and the demanded on a security (bid-ask spread), the greater its illiquidity. …”
Get full text
Article -
3180
Dandiacal Conversation in Oscar Wilde’s Comedies of Manners: Conventions, Conversions and Reconfigurations of Phallogocentrism
Published 2010-12-01“…Their strong reliance on rhetoric ensures their supremacy in polite conversation, even if their intellectual and cultural edge does a lot to secure their domination. What is more, their mastery of codes and norms enables them to destabilize the semantics of the age, a gesture which can be equated to a reconfiguration of Victorian patriarchy and even a dismissal of Victorian grand narratives.…”
Get full text
Article