Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3221
Pratique des activités d’orientation-conseil et projet professionnel de l’élève au Cameroun
Published 2022-08-01“…This research poses the problem of guidance counsellors accompanying students in the co-construction of their professional projects preparing them for a secure professional integration, if we refer to the difficulties of choice of training and socio-professional integration experienced by graduates nowadays. …”
Get full text
Article -
3222
The National Agricultural Strike: The Paradoxes of Political Action for Social Change
Published 2016-01-01“…It was an event that cannot be reduced only to the actors implicated and causes but brought into focus the precarious condition of agricultural production in Colombia: the concentration of land and agricultural production, questions of local security and the model of economic development. This strike is analyzed drawing upon the thought of Gilles Deleuze and Felix Guattari, who develop a number of concepts that serve to analyze the ways in which resistance and social mobilization occupy an inherent space inside the exercise of state power. …”
Get full text
Article -
3223
Analysis of survival-skills among adolescents in Yogyakarta
Published 2022-07-01“…The conclusion of this study is an affirmation of the findings of the findings as well as answers to the research questions that adolescents in Yogyakarta are generally in the potential of Survival-Safety Skills in the Medium category, meaning that conditions are sufficient to survive safely and obtain a sense of security for adolescents in living a life more prosperous. …”
Get full text
Article -
3224
Driver identification in advanced transportation systems using osprey and salp swarm optimized random forest model
Published 2025-01-01“…Abstract Enhancement of security, personalization, and safety in advanced transportation systems depends on driver identification. …”
Get full text
Article -
3225
Implementing Youth Mental Health First Aid Training in Cooperative Extension Programs
Published 2024-12-01“…Experienced program leaders suggest partnering with a supportive organization, securing long-term funding, and establishing dedicated staff for program delivery.…”
Get full text
Article -
3226
Receivables from employment through judicial practice
Published 2020-01-01“…The paper deals with the issue of legal regulation of judicial protection of labor rights and the application of substantive law in proceedings of this kind before the courts in the Republic of Serbia. Given that legal security is one of the essential attributes of the rule of law in the legal order of a state, proper application of substantive law by acting courts of general and special jurisdiction is of crucial importance in this regard. …”
Get full text
Article -
3227
An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users
Published 2014-01-01“…To handle this property, we newly define the security notion called anonymity with respect to the revocation which guarantees the unlinkability of revoked users.…”
Get full text
Article -
3228
Stratégies de partage et diffusion de données publiques environnementales
Published 2013-09-01“…On the contrary, in French Guiana, there is a reduction of information distribution concerning gold mining impacts, linked to an increased involvement of national security state services in the monitoring process.…”
Get full text
Article -
3229
Slovenian Complementary Health Insurance as a Service of General Economic Interest
Published 2015-03-01“… Slovenian legislation defines complementary health insurance as an activity of the public interest, which represents an inseparable and essential element of healthcare system and as such pursues objectives identical to those of compulsory health insurance – financial security of population against high healthcare expenses and appropriate and fair access to efficient and quality healthcare. …”
Get full text
Article -
3230
Optimal cash holding model based on minimization of ruin probability
Published 2024-01-01“…It is assumed that the objective of optimal cash holding is to minimize the probability of bankruptcy and the security area of cash holding is the constraint condition. …”
Get full text
Article -
3231
« Qu’avez-vous fait de vos vingt ans ? » Militantismes marocains du 23-mars (1965) au 20 février (2011)
Published 2012-10-01“…The institutionalization of the Moroccan protest space from which the February 20 movement emerged, and the effects of learning for protesters and security forces alike were the reason for extremely cautions behaviors in an effort to avoid escalation. …”
Get full text
Article -
3232
Homomorphic Signature With Designated Evaluator
Published 2025-01-01“…Additionally, we achieve a post-quantum variant of this homomorphic signature scheme with a designated evaluator, provided that the underlying building blocks are post-quantum secure. This represents the first post-quantum realization of such a scheme.…”
Get full text
Article -
3233
ACCOUNTING TREATMENT AND LEGISLATION OF LEASING ARRANGEMENTS
Published 2011-11-01“… Companies are not always able to purchase fixed assets required to start, expand or modernize their own operations, and also do not have adequate resources that could offer as security for bank loans. Leasing is the answer to such problems, as it provides the possibility of leasing recipient to obtain the necessary equipment. …”
Get full text
Article -
3234
Analysis of the state of the gas market in the context of the aggravation of the Ukrainian crisis
Published 2023-05-01“…The main requirement for the model is its stability to the dynamics of macroeconomic indicators, exchange rates, as well as financial instruments that affect energy and environmental security in the world. Special attention is paid to the study of approaches to assessing the indicators of the gas market.…”
Get full text
Article -
3235
Mathematical Modelling and Optimal Control Strategies of a Multistrain COVID-19 Spread
Published 2022-01-01“…Secondly, three controls are considered in our model to minimize the multistrain spread of the disease, namely, vaccination, security campaigns, social distancing measures, and diagnosis. …”
Get full text
Article -
3236
The algorithm of interaction of the enterprises of fuel and energy complex in implementation with the use of alternative means of payment
Published 2019-04-01“…The possibilities of activation and development of resource trade as one of the main factors of increasing the security of the fuel and energy complex and the Russian economy as a whole have been discovered.…”
Get full text
Article -
3237
Cross-chain medical data sharing scheme based on elliptic curve signcryption
Published 2024-12-01“…To address the requester identity authentication and shared data security in cross-chain medical data sharing, a cross- chain medical data sharing scheme based on elliptic curve signcryption was devised in this article. …”
Get full text
Article -
3238
Mutual Authentication Scheme Based on Lattice for NFC-PCM Payment Service Environment
Published 2016-07-01“…In addition, related groups from the Republic of Korea have enhanced safety in communication by using standard techniques for activating NFC services. However, various security threats are still present in electronic payment methods that use NFC. …”
Get full text
Article -
3239
Managing the industrial enterprises development in ecosystem interaction
Published 2022-01-01“…The benefits and limitations of sustainable development management, and the specific of data analysis in the digital ecosystem of the industrial enterprise as a component of sustainability and security of actors, have been defined. The components of a sustainable development framework have been identified and the effects obtained at the ecosystem level of interaction have been highlighted. …”
Get full text
Article -
3240
SCondi: A Smart Context Distribution Framework Based on a Messaging Service for the Internet of Things
Published 2014-01-01“…The context channel provides a pluggable filter mechanism that supports effective extraction, tailoring, authentication, and security of information.…”
Get full text
Article