Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3501
New Artificial Urinary Sphincter Devices in the Treatment of Male Iatrogenic Incontinence
Published 2012-01-01“…Recently three more sphincter devices, the Flow-Secure, the Periurethral Constrictor, and the ZSI 375, have been developed and presented in the market. …”
Get full text
Article -
3502
Increasing the level of self-esteem in adolescent children through art therapy
Published 2020-10-01“…An additional effect and guarantee of securing performance will be if a teenager after art therapy turns artistic activity into a hobby. …”
Get full text
Article -
3503
Obesity and overweight among the poor and marginalized in rural Mexico: impact analysis of the effect of school breakfasts on children aged five to eleven
Published 2023-05-01“…These findings highlight the need for a more comprehensive school breakfast program, that is connected to the food and nutritional security approach and is designed and implemented according to each Mexican region’s specific alimentary requirements and socioeconomic needs.…”
Get full text
Article -
3504
Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing
Published 2014-01-01“…However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features. …”
Get full text
Article -
3505
Diversity at Landscape Level to Increase Resilience. A Review
Published 2023“…Hence, building on these insights, diversity at landscape level is paramount to promoting resilient livelihoods as a means of improving the health and functioning of socio-ecological systems, as well as a mechanism for achieving food security. The study concludes that there should be involving many actors in a landscape management aspect to stimulate knowledge exchange and training.…”
Get full text
-
3506
Development and Implementation of a Healthcare Resource Allocation System: A Case Studay of Rugarama Hospital.
Published 2024“…Key features include real-time resource allocation, secure user authentication, and an intuitive interface. …”
Get full text
Thesis -
3507
Design and Simulation of an Optimized Reliable Microgrid System for Kabale University Using Solar and Battery Storage.
Published 2024“…The project highlights the potential of microgrids to enhance energy security, reduce costs, and promote environmental sustainability in educational institutions and similar settings facing energy challenges.…”
Get full text
Thesis -
3508
Diversity at Landscape Level to Increase Resilience. A Review
Published 2022“…Hence, building on these insights, diversity at landscape level is paramount to promoting resilient livelihoods as a means of improving the health and functioning of socio-ecological systems, as well as a mechanism for achieving food security. The study concludes that there should be involving many actors in a landscape management aspect to stimulate knowledge exchange and training.…”
Get full text
Article -
3509
Nanotechnology-based herbal medicine: Preparation, synthesis, and applications in food and medicine
Published 2025-03-01“…Such advancements would modify treatment and nutritional strategies, allowing a more secure, effective, and long life.…”
Get full text
Article -
3510
Characteristics of Professional Formation’s Indicators of Managers of the System of the Ministry of Internal Affairs of Ukraine
Published 2021-07-01“…The problem of professional and personal formation of managers of the security and defense sector of Ukraine has been studied. …”
Get full text
Article -
3511
Optimal power flow using recent red-tailed hawk optimization algorithm
Published 2025-03-01“…The optimal power flow (OPF) solution determines the most efficient and secure operating point by considering certain objective functions and ensuring the system's operational restrictions are met. …”
Get full text
Article -
3512
Fibroblast Growth Factor 21 Deficiency Attenuates Experimental Colitis-Induced Adipose Tissue Lipolysis
Published 2017-01-01Get full text
Article -
3513
Characteristics of Land Use Change and Evaluation of Ecological Sensitivity in Chongqing
Published 2024-12-01“…[Objective] Chongqing, as the economic center of the upper reaches of the Yangtze River in China and a barrier to ensure ecological security in the middle and lower reaches of the Yangtze River, is a typical ecological functional and fragile area in China. …”
Get full text
Article -
3514
Blockchain dan Kecerdasan Buatan dalam Pertanian : Studi Literatur
Published 2021-02-01“…Besides, this combination can also increase security on the blockchain system through the application of artificial intelligence. …”
Get full text
Article -
3515
Cross-Platform Ecological Momentary Assessment App (JTrack-EMA+): Development and Usability Study
Published 2025-01-01“…It strongly commits to security and privacy and complies with the General Data Protection Regulations to safeguard user data and ensure confidentiality. …”
Get full text
Article -
3516
Strategic alternatives for increasing the enterprise's financial potential
Published 2023-03-01“…The basic financial strategies in the aspect of increasing the enterprise's financial potential are considered: the strategy of forming financial resources, the structural financial strategy and the strategy of ensuring financial security. The formation and implementation of the enterprise's basic financial strategies must be consistent with the situation and development trends of the market in which the enterprise operates. …”
Get full text
Article -
3517
Providing a General Model for the Successful Implementation of Digital Transformation in Organizations
Published 2024-06-01“…These results highlighted that leadership and vision, change management, collaboration and partnership, user-centered design, and privacy and data security are the principal factors in the implementation of digital transformation. …”
Get full text
Article -
3518
Factors Influencing Telemedicine Adoption Among Health Care Professionals: Qualitative Interview Study
Published 2025-01-01“…Practically, the findings guide stakeholders: policy makers should prioritize transparent regulations and data security, health care organizations should provide training and support for HCPs, and technology developers must design telemedicine solutions aligning with trust and usability needs. …”
Get full text
Article -
3519
Radicalization and Counter-Radicalization on the Internet (Roles and Responsibilities of Stakeholders in Countering Cyber Terrorism)
Published 2025-01-01“…The sophistication of terrorists/terrorist organizations in utilizing the internet requires an equally sophisticated response in combating and countering cyberterrorism, combating them requires simultaneous integration of stakeholders in this field, namely law enforcement, academia, businesses (private security industry), society/community, media and internet users.…”
Get full text
Article -
3520
A Review of Multi-Source Data Fusion and Analysis Algorithms in Smart City Construction: Facilitating Real Estate Management and Urban Optimization
Published 2025-01-01“…We found that multi-source data, including sensors, social media, citizen feedback, and GIS data, face challenges such as data quality and privacy security when being fused. Data fusion algorithms are diverse and have their own advantages and disadvantages. …”
Get full text
Article