Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3401
Cugoano on Redressing Slavery: The Demands of Liberty
Published 2025-01-01“…Cugoano envisioned legal redress to necessitate that all Afro-diasporic laborers be enfranchised, securing the conditions for a free community. By examining his vision for liberation, the article reconstructs Cugoano’s idea of liberty as a social and common good. …”
Get full text
Article -
3402
From Travel to Text: Reverends Wolff and Lansdell’s Missions to Bokhara
Published 2024-03-01“…My paper will examine the strategies Wolff and Lansdell employed in writing their journeys to Central Asian sensitive border regions under the imperial security constraints of the moment. Their failure of self-censorship in fact erupts in concealed messages to certain sections of Victorian readership able to read between the lines, revealing the undisclosed and unsaid.…”
Get full text
Article -
3403
A Discourse Coherence Analysis Method Combining Sentence Embedding and Dimension Grid
Published 2021-01-01Get full text
Article -
3404
CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network
Published 2020-01-01“…Network intrusion detection system can effectively detect network attack behaviour, which is very important to network security. In this paper, a multiclassification network intrusion detection model based on convolutional neural network is proposed, and the algorithm is optimized. …”
Get full text
Article -
3405
Identity, imaginary and tourism in the tuareg region, in Niger
Published 2012-12-01“…Finally, the authors consider the decline of tourism, as a result of the 2007-2009 rebellion, and the presence in the neighboring Northern Mali of the Salafist brigade Al Qaeda in the Islamic Maghreb (AQIM), which prohibits access to the region to foreigners for security reasons.The brutal halt in the tourist activity came with the decline of the Tuareg subculture that had been forged through their entrepreneurial dedication to tourism.…”
Get full text
Article -
3406
Le nouveau Xinjiang : intégration et recompositions territoriales d’une périphérie chinoise
Published 2009-06-01“…That’s the reason why central government take active measures for an acceleration of the economic development in the region with the aim of promoting regional security, cultural and économic integration. Nowadays, an unprecedent change taken place in Xinjiang with the improvements in transportation infrastructure. …”
Get full text
Article -
3407
Colonial and Postcolonial Logistics
Published 2018-11-01“…The analysis of infrastructure development in postcolonial Zambia illustrates the competing strategies through which imperialist powers attempted to secure a new form of control on Africa and elucidates the role of logistics as a decisive tool to shape the African territory.…”
Get full text
Article -
3408
Big Data with Cloud Computing: Discussions and Challenges
Published 2022-03-01“…Various research challenges are defined in terms of distributed database storage, data security, heterogeneity, and data visualization.…”
Get full text
Article -
3409
Southern Madagascar, polycrisis and project failures: A scoping review.
Published 2024-01-01“…The southern region of Madagascar experiences a series of crises related to agro-climatic, nutritional, security, institutional, and political conditions despite the presence of numerous development aid projects over several decades. …”
Get full text
Article -
3410
Les Indiens d’Antananarivo, des citadins comme les autres ?
Published 2024-03-01“…However, precisely because of their dominant social position, Indians are characterised by mobility practices that are constrained by security concerns, and express a strong sense of spatial vulnerability. …”
Get full text
Article -
3411
Quels espaces scolaires pour le bien-être relationnel ? Enquête sur le ressenti des collégiens français
Published 2017-02-01“…In other words, what spatial modifications could be thought out in order to guarantee a feeling of security and pupils’ well-being. The results show that spaces which are not under surveillance are seen as risky by secondary school children (n =544). …”
Get full text
Article -
3412
Genome Editing: A Promising Approach for Achieving Abiotic Stress Tolerance in Plants
Published 2022-01-01“…The susceptibility of crop plants towards abiotic stresses is highly threatening to assure global food security as it results in almost 50% annual yield loss. …”
Get full text
Article -
3413
An Anonymous Routing Protocol with Authenticated Key Establishment in Wireless Ad Hoc Networks
Published 2014-01-01“…Different from previous anonymous secure routing protocols, this paper proposes an anonymous routing protocol, ARAKE, which not only makes the sender and the receiver anonymous but also hides the intermediate nodes from the network simultaneously. …”
Get full text
Article -
3414
Reducing Judicial Inconsistency through AI: A Review of Legal Judgement Prediction Models
Published 2025-01-01Get full text
Article -
3415
Three-Dimensional Human Modeling Applications in Sport Sciences
Published 2018-08-01“…Virtual objects, which are transferred to virtual environments by a designer or a design team using various software, has been used many important areas such as health, security, education and sports which are using computer technology. …”
Get full text
Article -
3416
Sensor Resource Sharing Approaches in Sensor-Cloud Infrastructure
Published 2014-04-01Get full text
Article -
3417
Digital Image Encryption Algorithm Design Based on Genetic Hyperchaos
Published 2016-01-01“…Finally, experimental simulation and theoretical analysis show that our proposed algorithm can not only effectively resist plaintext (ciphertext) attack, statistical attack, and information entropy attack but also effectively improve the efficiency of image encryption, which is a relatively secure and effective way of image communication.…”
Get full text
Article -
3418
Omilayers: a Python package for efficient data management to support multi-omic analysis
Published 2025-02-01“…Conducting an effective analysis of these datasets necessitates a data management system that meets a specific set of requirements, such as rapid storage and retrieval of data with varying numbers of features and mixed data-types, ensurance of reliable and secure database transactions, extension of stored data row and column-wise and facilitation of data distribution. …”
Get full text
Article -
3419
ACCESSIBILITY OF FINANCIAL INFORMATION IN RELATION TO CHANGES IN SIZE OF ENTITIES CAUSED BY THE COVID‐19 CRISIS
Published 2022-06-01“…The accessibility of information is connected with the level of security of engaging in business activities. Making changes in the criteria of an entity’s inclusion as an SME and in its obligation to audit can be one solution for the problem of insufficient information. …”
Get full text
Article -
3420
Pouvoir et opposition en Algérie : vers une transition prolongée ?
Published 2009-11-01“…Radical Islamism and the eruption of terrorist violence have offered the governing elite an opportunity to renege on the progress that had been made. In the name of security, the opposition’s room for maneuver has been largely reduced. …”
Get full text
Article