Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3201
Cooperation in border areas among some Southeast Asian mainland countries: a case study of the Cambodia-Laos-Vietnam Development Triangle
Published 2025-12-01“…Border cooperation in mainland Southeast Asia has received attention from the countries of Myanmar, Thailand, Cambodia, Laos and Vietnam to both strengthen cooperation to promote the economy and improve people’s lives in the region border, ensuring national security and preventing crime. Typical of the border cooperation mechanism of mainland Southeast Asia is the Cambodia-Laos-Vietnam Development Triangle (CLVDT) which established in 1999.…”
Get full text
Article -
3202
Floridians’ Perceptions of GMOs: GMOs and Florida Citrus
Published 2014-10-01“… Worldwide and in Florida, food-related issues such as food safety, food security, and use of new food technologies continue to be top concerns. …”
Get full text
Article -
3203
Peri-Implant Soft Tissue in Contact with Zirconium/Titanium Abutments from Histological and Biological Perspectives: A Concise Review
Published 2025-01-01“…The attachment between the implant surface and peri-implant mucosa should establish a secure seal to prevent bacterial infiltration and subsequent tissue inflammation. …”
Get full text
Article -
3204
Chaotic Puma Optimizer Algorithm for controlling wheeled mobile robots
Published 2025-03-01“…The control of wheeled mobile robots plays a crucial role in many fields, including automation, logistics, security, and even space exploration. This paper presents a significant improvement in the control of wheeled mobile robots based on an enhanced version of the Puma optimization algorithm by integrating chaotic maps in both optimization phases, exploration and exploitation. …”
Get full text
Article -
3205
A Survey of Artificial Immune System Based Intrusion Detection
Published 2014-01-01“…In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. …”
Get full text
Article -
3206
Československá vojenská mise v Kanadě: Činnost a výsledky
Published 2012-01-01“… The Czechoslovak military mission in Canada (1941–1943) aimed to secure the enlistment of local Czechs to Czechoslovak units in Great Britain. …”
Get full text
Article -
3207
Legal Trust and Social Development: Chosen Aspects of the Relationship
Published 2024-10-01“…Taken together, the fulfilment of these requirements determines the stability of the state of law, the predictability of its application, legality, durability, and, consequently, the ontological security of individuals and social development.…”
Get full text
Article -
3208
Cuban economically active population: a new battle?
Published 2009-03-01“…This category includes persons with appropriate working capacity between 17 years and the retirement age, which is stated in the act No. 24 of Cuban Social Security. Since we support the idea of increasing production and productivity of goods worldwide, and we hold up any initiative to enhance human satisfaction or happiness, it is unprofitable for us not to be able to have millions of persons on condition that they spend their physical and mental capacity in the creation of our wealth. …”
Get full text
Article -
3209
SOLUTIONS FOR AUTO-TESTING AND AUTO-WARNING WEBSITE ERRORS BASED ON THE RESULTS OF THE WEBSITE ERROR SCANNING TOOLS
Published 2016-06-01“…Nowadays, there are commercial and free tools to automatically test websites’ security which is considered to be the positive point for pen-tester. …”
Get full text
Article -
3210
A Monitoring Approach Based on Fuzzy Stochastic P-Timed Petri Nets of a Railway Transport Network
Published 2021-01-01“…The main goal of the proposed supervision approach is to allow an early detection of traffic disturbance to avoid catastrophic scenarios and preserve stability and security of the studied railway networks. Finally, to demonstrate the effectiveness and accuracy of the approach, an application to the case study of the Tunisian railway network is outlined.…”
Get full text
Article -
3211
The Milk Income Loss Contract Program for Dairy Producers
Published 2005-02-01“…The program is authorized by the 2002 Farm Security and Rural Investment Act and has no set funding level. …”
Get full text
Article -
3212
MORAL-ETHICAL ASPECTS OF THE DIGITAL ECONOMY
Published 2020-03-01“…It is obvious, that the creation of the Russian information system will be able to increase the efficiency of our national economy (including the objectives of its state regulation) and at the same time raise the level of the country’s security. However, the effective use of the digital economy does not only depend on the level of development of the technical base of the information system. …”
Get full text
Article -
3213
Evaluation of the fulfillment grade and clinical management of the treatment with immunotherapy in allergic patients.
Published 2006-08-01“…Authorized personnel checked out the level of fulfilment of the security rules, clinical betterment was evaluated with a daily control of symptoms correlated with clinical history of allergy, and satisfaction was evaluated through a questionaire.…”
Get full text
Article -
3214
Market Structure and Competition During Economic Transformation
Published 2022-11-01“…The re-nationalization of production processes contributes to greater security of supply, but sometimes at the price of higher production costs. …”
Get full text
Article -
3215
IMPROVEMENT OF CUCKOO ALGORITHM FOR ASSOCIATION RULE HIDING PROBLEM
Published 2018-07-01“…Nowadays, the problem of data security in the process of data mining receives more attention. …”
Get full text
Article -
3216
Pupils’ approach to teachers’ role as motivating factor in foreign language classes
Published 2017-02-01“…Moreover, it turned out that the schoolchildren feel less secure talking of interaction with teachers: they usually turn to the teachers only for subject matters; they do not always feel free in the classroom. …”
Get full text
Article -
3217
Az európai kormányzás új lehetősége - az Európai Területi Együttműködés jogi keretei az új európai kohéziós politikában (New Opportunity of the European Governance – The Legal Fram...
Published 2014-09-01“…The study summarizes the advantages of EGTC, how to response a new alternative to increase the efficiency, legitimacy and transparency of the activities of territorial cooperation, and at the same time secures legal certainty. The revised EGTC Regulation (1302/2013/EU) contains the most important pieces of legislation related to the cohesion policy and most of the programmes funded by the EU in the period 2014-2020.…”
Get full text
Article -
3218
Mental health in the hadith spotlight: enlightenment for a healthy soul
Published 2024-09-01“…The research results show that mental health in the hadith includes principles such as feelings of security, independence, responsibility, and physical and spiritual balance. …”
Get full text
Article -
3219
The Milk Income Loss Contract Program for Dairy Producers
Published 2005-02-01“…The program is authorized by the 2002 Farm Security and Rural Investment Act and has no set funding level. …”
Get full text
Article -
3220
Extended Perturbed Mixed Variational-Like Inequalities for Fuzzy Mappings
Published 2021-01-01“…In the end, some new and previously known existence results and algorithms are also studied. Results secured in this paper can be regarded as purification and development of previously familiar results.…”
Get full text
Article