Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3381
DIGITAL TOOLS FOR MATCHING QUALIFICATIONS TO THE LEVELS OF THE NATIONAL QUALIFICATIONS FRAMEWORK
Published 2024-04-01“…For the most general case of four NQF descriptors, Microsoft Excel macro is developed to secure achieving any level of accuracy. Corresponding API is developed by PHP programming language. …”
Get full text
Article -
3382
Availibilty Pada Aplikasi mobile Banking: Case Study Bank XYZ
Published 2024-02-01“…Unavailability selama periode penelitian terjadi karena aktivitas product development, aktivitas terkait security, production issue, hardware issue dan 3rd party maintenance. …”
Get full text
Article -
3383
Theoretical Aspects of Professional Competence of Police Officers from the Tactical and Operative Response Unit
Published 2021-07-01“…That’s why on purpose of providing civil security and law-and-order guard of the public events in 2017 the new unit of patrol police of tactical-operational respond TOR was organized. …”
Get full text
Article -
3384
Evaluation of vegetable pigeonpea [Cajanus cajan (L.) Millsp] genotypes for yield stability
Published 2021-10-01“…Abstract Background Vegetable pigeonpea is an important food security crop in the marginal dry areas of the Eastern region of Kenya. …”
Get full text
Article -
3385
Pengamanan Citra Digital Menggunakan Kriptografi DnaDan Modified LSB
Published 2024-12-01“…The results indicate that the combination of DNA Cryptography, ACM, LM, and MLSB provides high security and is difficult to breach. …”
Get full text
Article -
3386
Records Keeping and Financial Performance in Local Government: A Case Study of Rubanda District Local Government.
Published 2024“…Other challenges stated were lack of records retention and disposition schedule/ policy. improper security for records, lack of filing manual/finding aids and inadequate storage equipment and solutions to the challenges faced in record keeping at RDLG were, provision of retention and disposition schedule, Lack of Records management policy, Improving security for records, Employing professionally trained record Managers, provision of Filing Manual/Finding Aids and Involvement of manual operations, Training record users on modern record management practices and Installing back up facilities for ICT. …”
Get full text
Thesis -
3387
Records Keeping and Financial Performance in Local Government: A Case Study of Rubanda District Local Government.
Published 2024“…Other challenges stated were lack of records retention and disposition schedule/ policy. improper security for records. lack of filing manual/finding aids and inadequate storage equipment and solutions to the challenges faced in record-keeping at RDLG were the provision of retention and disposition schedule, Lack of Records management policy, Improving security for records, Employing professionally trained record Managers, provision of Filing Manual/Finding Aids and Involvement of manual operations, Training record users on modern record management practices and Installing back up facilities for ICT. …”
Get full text
Thesis -
3388
Factors Associated with Stunting in Children Under Five Years of Age: A Case of Buhara Sub County, Kabale District.
Published 2023“…The household financial security was seen to have influenced household food security, diversification, and supplementation. …”
Get full text
Thesis -
3389
An Adaptive Time-Stepping Algorithm for the Allen–Cahn Equation
Published 2022-01-01Get full text
Article -
3390
La “familizzazione” dell’impresa: alcune riflessioni sul familismo imprenditoriale in Brianza nella crisi economica attuale
Published 2017-03-01“…The leader of a small family firm may decide to include or to exclude some kin members from the process of intergenerational succession in order to secure corporate earnings and good performance in the upcoming future. …”
Get full text
Article -
3391
Evacuation Model of Emotional Contagion Crowd Based on Cellular Automata
Published 2021-01-01“…Crowd evacuation under emergency is an important task of world public security research and practice. In order to describe the microemotional contagion of evacuation individuals, a cellular automata-based evacuation model of emotional contagion crowd based on the classical SIS model of infectious diseases is proposed in this paper. …”
Get full text
Article -
3392
Concept development assessment game – suitable collecting framework in scientific military research
Published 2025-01-01“… Scientific research is crucial for progress across all areas of society, including the military sphere. However, as the security environment becomes increasingly dynamic, unpredictable, and complex, research methods in military sciences must address contemporary challenges by providing flexible frameworks for evaluating and testing new concepts necessary for the adaptation of force structures. …”
Get full text
Article -
3393
No Easy Way In
Published 2025-01-01“…This, in turn, further erodes solidarity amongst squatters, prompting Keith to turn to new methods of securing accommodation. Keywords: squatting, community, neoliberalism, solidarity, criminalisation, housing …”
Get full text
Article -
3394
LEADERSHIP, GOOD GOVERNANCE AND DEVELOPMENT IN NIGERIA
Published 2023-12-01“…The paper recommended the use of electronic voting systems and the demonstration of material and human security as solutions to problems. Others include removing the immunity provision for those holding political office and reorienting the country. …”
Get full text
Article -
3395
A Privacy-Preserving Biometric Recognition System with Visual Cryptography
Published 2022-01-01“…Experimental results show that our proposed method keeps the high accuracy of the feature recognition system when providing security.…”
Get full text
Article -
3396
The Role of Civil Defense in the Republic of Serbia’s Crisis Management System
Published 2024-12-01Get full text
Article -
3397
The Role of Civil Defense in the Republic of Serbia’s Crisis Management System
Published 2024-12-01Get full text
Article -
3398
Hmotné (ne)zajištění evangelických kazatelů v první a druhé generaci
Published 2020-12-01“…The situation of the second-generation preachers is not known so well, however, usually a stable and secure position is attributed to them. Looking closer at both the generations, it is evident that in neither of them the financial state of preachers was definite and their material provision did not depend so much on the amount of service but on the broader economic and social aspects. …”
Get full text
Article -
3399
Making AI an ally for sustainable agriculture in the face of climate change
Published 2025-01-01“…These disruptions threaten food production, global food security, economic stability and community livelihoods. …”
Get full text
Article -
3400
EPPDC: An Efficient Privacy-Preserving Scheme for Data Collection in Smart Grid
Published 2015-05-01“…In EPPDC scheme, the users' data information is transmitted to the local aggregator by building gateway with privacy preserving. In addition, the security analysis indicates that EPPDC scheme not only can resist replay attack, but also has source authentication and data integrity, confidentiality, unforgeability, nonrepudiation, and evolution of shared keys. …”
Get full text
Article