Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3421
Analysis of Digital Image Watermarking Techniques through Hybrid Methods
Published 2020-01-01“…For designing an efficient and robust digital image watermarking system, the trade-off among imperceptibility, robustness, capacity, and security must be maintained. Various studies regarding this concern have been performed to ensure these requirements by hybridizing different domains, such as spatial and transform domains. …”
Get full text
Article -
3422
EMPIRICAL ANALYSIS OF THE PROFITABILITY AND INDEBTEDNESS IN LISTED COMPANIES – EVIDENCE FROM THE FEDERATION OF BIH
Published 2015-11-01“… Research on relationship between profitability and indebtedness is an interesting scientific and professional question because it is the basic criterion of performance and security in business. The aim of this paper is to examine the and determine the level of correlation between profitability and indebtedness, and to research the differences in the level of regarding company's profitability. …”
Get full text
Article -
3423
Design of Updating Encryption Algorithm for Privacy Big Data Based on Consortium Blockchain Technology
Published 2022-01-01“…The source coding sequence of privacy big data is obtained, the security of network route query and identity is verified, and the update and extraction of user data access authority are realized. …”
Get full text
Article -
3424
Guide of maxillofacial trauma intervention for diagnosis and treatment of facial burns
Published 2010-07-01Get full text
Article -
3425
Le droit du travail et les migrants ruraux : instituer un nouveau salariat en Chine
Published 2014-06-01“…Labour law appears as a solution whose goal is to ensure the viability of this new working class with socially inclusive policies and then institutionalises its economic security. Furthermore, in a context characterised by the socialist legacy and the lack of democracy, we have to question the relations with the law and the State. …”
Get full text
Article -
3426
Disaster Tips for People with Disabilities
Published 2005-08-01“…Departments of Homeland Security and the Federal Emergency Management Agency for people with disabilities. …”
Get full text
Article -
3427
Multiplicatively weighted Voronoi-based sensor collaborative redeployment in software-defined wireless sensor networks
Published 2022-03-01“…Large-scale deployment of mobile wireless sensor networks has been widely used in some dangerous and hostile urban security surveillance scenarios. As a new network architecture, software-defined networks was introduced into wireless sensor networks to form a new software-defined wireless sensor networks to solve the problem of balanced large-scale deployment of sensor networks and simplify the complexity of network management. …”
Get full text
Article -
3428
Political Elites as an Object of Coercive Influence in Contemporary World Politics
Published 2015-10-01“…The assumption then is that the main object of the security and the securitization in world politics is to be political elite. …”
Get full text
Article -
3429
Research and Implementation of SVDU Simulator Based on Emulation Technology
Published 2021-01-01“…With the development of multiple engineering application requirements, such as configuration verification and operator training, this stimulator has been applied in several virtual security level DCS projects.…”
Get full text
Article -
3430
Advances in auxin synthesis, transport, and signaling in rice: implications for stress resilience and crop improvement
Published 2025-01-01“…By synthesizing these findings, we provide a comprehensive overview of how auxin research informs strategies for developing rice varieties with enhanced adaptability and optimized growth, contributing to food security and sustainable agriculture.…”
Get full text
Article -
3431
ACCESSIBILITY OF FINANCIAL INFORMATION IN RELATION TO CHANGES IN SIZE OF ENTITIES CAUSED BY THE COVID‐19 CRISIS
Published 2020-06-01“…The accessibility ofinformation is connected with the level of security of engaging in business activities. Makingchanges in the criteria of an entity’s inclusion as an SME and in its obligation to audit can be onesolution for the problem of insufficient information. …”
Get full text
Article -
3432
The Beneficial Role of Polysaccharide Hydrocolloids in Meat Products: A Review
Published 2025-01-01“…Then, the beneficial roles of polysaccharide hydrocolloids in meat products are comprehensively summarized and highlighted, including retarding lipid and protein oxidation, enhancing nutritional properties, improving texture and color quality, providing antibacterial activity, monitoring freshness, acting as a cryoprotectant, improving printability, and ensuring security. Finally, the challenges and opportunities of polysaccharide hydrocolloids in meat products are also introduced.…”
Get full text
Article -
3433
Comparison Between Domestic and Hostile Applications of Wireless Sensor Networks
Published 2022-03-01“…This idea has boosted the success rate of different experiments in the fields of health, Finance, Security, etc. where simple factors like temperature, motion, smoke, pressure etc. are used to muster the required data. …”
Get full text
Article -
3434
On Key Evolution over Wireless Channels
Published 2015-07-01“…In this paper, we focus on the problem of developing key agreement schemes for secure communication across wireless channels and propose a key evolution scheme to alleviate the assumption. …”
Get full text
Article -
3435
Stability of password authentication in infocommunication networks
Published 2020-09-01“…It is shown that for social networks with a large number of users, widely used assessment of the security of password systems based on the calculation of the determination probability is not sufficient. …”
Get full text
Article -
3436
Facial Recognition Databases: Recent Developments and Review of Methods
Published 2023-12-01“… Facial recognition is one of the most important biometrics that many researchers are increasingly studying, as it is used in various applications such as surveillance, security, law enforcement, information, person identification, smart cards, access control, etc. …”
Get full text
Article -
3437
Human-induced water loss potentially threatens sustainable development of sandy regions in China
Published 2025-01-01“…This depletion potentially threatens both regional sustainability and national ecological security. This study calls for urgent scientific regulations on water resources, including strict control of local consumption and enhancement of supply capacity.…”
Get full text
Article -
3438
Living the liquid life: Gender, precarity, and journalism in the post-#metoo era
Published 2024-09-01“…Increasing demands for flexibility have institutionalised temporary contracts, eroded job security, and expanded job precarity, with women and young journalists disproportionately affected. …”
Get full text
Article -
3439
Green actions for innovative cities. The new agri-food landscape
Published 2022-06-01“…Specifically, urban agriculture and community gardens play an important role, helping to secure various socio-ecological benefits on a local basis and to promote access to healthy, Zero Km sources. …”
Get full text
Article -
3440
Spanish refugees in Portugal and the Portuguese solidarity (1936-1945)
Published 2024-12-01“…Due to its authoritarian nature, Salazar´s regime proved reluctant to receive them and developed a repression directed at these refugees, considered “undesirable,” visible in the increase of the number of border posts and their reinforcement and in the collaboration between different authorities, namely PVDE (State Surveillance and Defense Police), GNR (Republican National Guard), PSP (Public Security Police) and GF (Fiscal Guard), leading to their concentration in large national prisons. …”
Get full text
Article