Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3481
Why Aceh-Indonesia Conflict Resolution can’t be Copy-Paste in Bangsamoro-Philippines Issue?
Published 2022-06-01“…The main objective is to identify similarities rational choice (survival, security, economy/welfare, prestige, and influence) especially how political elites would still feel enjoy to conduct those agreements in both regions. …”
Get full text
Article -
3482
Labor Issues that the H2A Temporary Agricultural Worker Policy Attempts to Resolve in Florida
Published 2024-03-01“…We rely on food, fiber, and natural resources, and effective agricultural labor is a critical social need, but the challenges inherent in the effort to secure agricultural labor are many and difficult to solve. …”
Get full text
Article -
3483
Perspectives of Turkish foreign policy based on analysis of Romanian documents
Published 2024-09-01“…The Treaty of Lausanne and then the Treaty of Montreux were vital – in the first – for the security of the new Turkish state, but also for the states bordering the Black Sea. …”
Get full text
Article -
3484
Application of Multiprotocol Medical Imaging Communications and an Extended DICOM WADO Service in a Teleradiology Architecture
Published 2012-01-01“…The new architecture ensures flexibility in access, user mobility, and enhanced data security.…”
Get full text
Article -
3485
Two decades of research capacity strengthening and reciprocal learning on sexual and reproductive health in East Africa – a point of (no) return
Published 2024-12-01“…As the world is facing challenges such as pandemics, climate change, conflicts, and changing political landscapes, the need to secure access to safe and high-quality abortion care is more urgent than ever. …”
Get full text
Article -
3486
How Does Nursing Staff Perceive the Use of Electronic Handover Reports? A Questionnaire-Based Study
Published 2011-01-01“…A web-based anonymous and secure questionnaire was distributed by e-mail to all nursing staff at a psychogeriatric ward at a university hospital. …”
Get full text
Article -
3487
Espaces de l’insécurité : réalités territoriales et réponses locales à la délinquance
Published 2014-07-01“…It thus questioned the relevance of the résidentialist paradigm (that is to say, the assumption of a crime would depend in form and intensity of urban, sociological , economic and demographic patterns and trends) and its impact on work organization and missions of law enforcement forces, but also all the local actors involved in security policy and crime prevention. At the level of Midi-Pyrénées, this contribution will give synthetically to know which transformations frameworks and patterns of public policies could emerge in the decade 2000-2010, in different situations, but all with a common element: the need to respond to situations perceived by local actors as risky or dangerous for the safety of citizens.…”
Get full text
Article -
3488
Environmental Taxation: New Evidence for Energy Taxes
Published 2015-12-01“…Various economic instruments, including taxation, may help policy makers in the EU meet environmental targets, among them a more secure and competitive green economy in Europe. The focus of this paper is on empirically investigating the direct effect of environmental taxes and the indirect effect of environmental expenditures sourced from environmental taxes on greenhouse gas (GHG) emissions in the energy sector. …”
Get full text
Article -
3489
An Overview of Global Wheat Market Fundamentals in an Era of Climate Concerns
Published 2017-01-01“…In addition to gradually and consistently increasing global wheat demand, these market drivers are posited to impact world prices and, ultimately, food security. To investigate how these factors differentially influence wheat markets, an extensive survey of literature regarding wheat market fundamentals was conducted, as well as a trend analysis using a uniquely compiled data set specific to significant wheat-producing areas. …”
Get full text
Article -
3490
Self-Adaptive Firefly-Algorithm-Based Unified Power Flow Controller Placement with Single Objectives
Published 2021-01-01“…The selection of positions for unified power flow controller (UPFC) placement in transmission network is an essential factor, which aids in operating the system in a more reliable and secured manner. This paper focuses on strengthening the power system performance through UPFC placement employing self-adaptive firefly algorithm (SAFA), which selects the best positions along with parameters for UPFC placement. …”
Get full text
Article -
3491
Multiscale Structural Health Monitoring of Cable-Anchorage System Using Piezoelectric PZT Sensors
Published 2013-11-01“…Structural health monitoring of the cable-anchorage system is very important to secure the integrity of the cable-stayed bridge. The cable-anchorage system carries most of the self-weight, so that any damage in the system may significantly reduce the load carrying capacity of the bridge. …”
Get full text
Article -
3492
Signal Processing Techniques for Through-Wall Object Imaging Using UWB Antipodal Vivaldi Antenna
Published 2024-12-01“…Through-wall imaging (TWI) is a critical application in various domains, including security, surveillance, search and rescue, and structural assessment. …”
Get full text
Article -
3493
Video Multiple Watermarking Technique Based on Image Interlacing Using DWT
Published 2014-01-01“…Digital watermarking is one of the important techniques to secure digital media files in the domains of data authentication and copyright protection. …”
Get full text
Article -
3494
Newly Licensed RNs Describe What They Like Best about Being a Nurse
Published 2011-01-01“…Five themes emerged: “providing holistic patient care,” “having an autonomous and collaborative practice,” “using diverse knowledge and skills to impact patient outcomes,” “receiving recognition,” and “having a job that is secure and stimulating.” Strategies are discussed that organizations might employ in helping NLRNs to realize what they best like about their work, which might lead to improved retention rates.…”
Get full text
Article -
3495
Research on the Heat Dissipation Characteristics of Lithium Battery Spatial Layout in an AUV
Published 2016-01-01“…The lithium battery heat dissipation properties not only affect the underwater vehicle performance but also bring some security risks. Based on the widespread application of lithium batteries, lithium batteries in an AUV are taken as an example to investigate the heat dissipation characteristics of the lithium battery spatial layout in an AUV. …”
Get full text
Article -
3496
Support Vector Machine for Behavior-Based Driver Identification System
Published 2010-01-01“…Since human driving behaviors belong to a dynamic biometrical feature which is complex and difficult to imitate compared with static features such as passwords and fingerprints, we find that this novel idea of utilizing human dynamic features for enhanced security application is more effective. In this paper, we first describe our experimental platform for collecting and modeling human driving behaviors. …”
Get full text
Article -
3497
Possibilities in Blockchain technology application
Published 2023-01-01“…The paper represents a comprehensive review of possibilities in Blockchain technology application in contemporary business environment, its benefits and shortcomings as well as security problems appearing in theory and practice. …”
Get full text
Article -
3498
Nano colonies: Rearing honey bee queens and their offspring in small laboratory arenas
Published 2025-01-01“…The process creates a bridge between field research and laboratory trials and provides a secure system for contagious or regulated elements while maintaining many of the intrinsic characteristics of a honey bee colony.…”
Get full text
Article -
3499
Jurisprudential Welfare Through the Transformation of the “Rendang-Mu” Qurban Meat Management System
Published 2024-12-01“…The findings indicate that the Rendang-Mu Program represents a transformation in the pattern of meat management and distribution, implementing a system of qurban meat management through canning and packaging with three essential benefits that facilitate and enhance its utility: (1) prolonged consumption and distribution over an extended period, (2) practical, delicious, and nutritious, (3) more evenly distributed reach, (4) high flexibility in achieving community food security, and (5) compliance with Islamic law.…”
Get full text
Article -
3500
Indigenous Identity in the Global Sustainable Project
Published 2025-02-01“…Developing countries can secure funding from developed countries to preserve their forests. …”
Get full text
Article