Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3561
Armenia Towards a "New Economy": Defense Industry
Published 2021-04-01“…As a small country, Armenia needs an economy-army coalesced “intelligent” system that will respond adequately to any, even the slightest threat to the country's security. This approach requires the development of indigenous defense industry. …”
Get full text
Article -
3562
EMPIRICAL ANALYSIS OF THE PROFITABILITY AND INDEBTEDNESS IN LISTED COMPANIES – EVIDENCE FROM THE FEDERATION OF BIH
Published 2015-11-01“… Research on relationship between profitability and indebtedness is an interesting scientific and professional question because it is the basic criterion of performance and security in business. The aim of this paper is to examine the and determine the level of correlation between profitability and indebtedness, and to research the differences in the level of regarding company's profitability. …”
Get full text
Article -
3563
Marketing strategies of economic entities (on the example of persons carrying out activities in the field of customs business)
Published 2022-11-01“…In addition, the results can be useful in the educational process, when teaching such disciplines as Marketing and Economic security of an enterprise participating in foreign economic activity. …”
Get full text
Article -
3564
Condition Recognition of High-Speed Train Bogie Based on Multi-View Kernel FCM
Published 2019-03-01“…Monitoring the operating status of a High-Speed Train (HST) at any moment is necessary to ensure its security. Multi-channel vibration signals are collected by sensors installed on bogies and beneficial information are extracted to determine the running condition. …”
Get full text
Article -
3565
Exploring the possibilities of using cryptocurrencies in production in creative industries
Published 2024-06-01“…One of the advantages of applying this type of currency is the ability to conduct fast and secure financial transactions without the involvement of intermediaries. …”
Get full text
Article -
3566
DEVELOPMENT OF SALARY CARDS IN THE SYSTEM OF CASHLESS PAYMENTS IN CONDITIONS OF FINANCIAL INSTABILITY ON THE EXAMPLE OF SBERBANK OF RUSSIA
Published 2020-09-01“…As a result, the main directions for the development of salary projects have been proposed, including the definition of incentive provisions for their application, ensuring security, confidence in salary projects and contactless payment, regulating the risk of occurrence of accounts payable and accounts receivable between business entities, the need to modernize individual banking service, formation of innovative salary cards.…”
Get full text
Article -
3567
An Enhanced Sine Cosine Algorithm for Feature Selection in Network Intrusion Detection
Published 2024-12-01“…For computer networks to remain secure, intrusion detection is essential. Analyzing network traffic data is part of this activity to spot possible cyber threats. …”
Get full text
Article -
3568
Binary Image Data Hiding Using Matrix Encoding Technique in Sensors
Published 2013-11-01“…It is very important to protect the copyright of digital images in wireless transmission, because people often use a smart phone in their daily life. Traditional security schemes are computationally expensive, and they introduce overhead, which shortens the life of the image sensors. …”
Get full text
Article -
3569
The role of agriculture in Nepal's economic development: Challenges, opportunities, and pathways for modernization
Published 2025-01-01“…These problems prevent agriculture from realizing its full potential to advance economic development, reduce poverty, and provide food security. Modernization requires increasing productivity through mechanization, expanding infrastructure, and improving market accessibility. …”
Get full text
Article -
3570
A Simple Chaotic Wien Bridge Oscillator with a Fractional-Order Memristor and Its Combination Synchronization for Efficient Antiattack Capability
Published 2021-01-01“…Such techniques improve the antiattack capability of the systems when used for secure communication.…”
Get full text
Article -
3571
Optimizing Credit Card Fraud Detection: A Genetic Algorithm Approach with Multiple Feature Selection Methods
Published 2024-12-01“…To protect our financial security, it is crucial to develop robust and accurate fraud detection systems that stay one step ahead of the fraudsters. …”
Get full text
Article -
3572
Challenges and opportunities of artificial intelligence in African health space
Published 2025-01-01“…Ethical guidelines are needed to ensure AI decisions align with medical standards and patient autonomy. Strict privacy and security controls are crucial to protecting sensitive health data. …”
Get full text
Article -
3573
Identifying barriers in the field of electronic payments based on blockchain technology: A multi-criteria decision-making approach
Published 2024-08-01“…Some of these obstacles include technical, technological, organizational, financial and security problems. To identify and prioritize these obstacles and solve them, multi-criteria decision-making methods can be useful.In this research, in order to identify and rank the factors of obstacles related to electronic payments based on blockchain technology, the Delphi method has been used. …”
Get full text
Article -
3574
The effect of using Naive Bayes to detect spam email
Published 2025-01-01“…This high level of accuracy underscores the effectiveness of the Bayesian approach in identifying and filtering out spam, thereby enhancing the overall efficiency and security of email communication.…”
Get full text
Article -
3575
İnönü Muharebelerinin İç Kamuoyuna Yansımaları
Published 2021-12-01“…In this battle, as a result of the stubborn struggle put forward by the regular army units, the Greek Army had to withdraw, the Circassian Ethem rebellion, which ached Ankara's head with this morale and motivation, was suppressed, the TBMM government strengthened its power and secured its future. The Greeks, who could not get the result they hoped for in the First Battle of İnönü, attempted a major attack for the second time in order to impose the Treaty of Sevres, which they could not have accepted at the London Conference on March 23, 1921, by force of arms, but II. …”
Get full text
Article -
3576
Digital Sociability: Implications of the COVID-19 Pandemic among Young Adults
Published 2025-01-01“…The results suggest that young people live ambiguously with the sense of security provided by social networks while feeling anxious about the judgment of others regarding their posts.…”
Get full text
Article -
3577
Constitution is not identity: On equivalence relations in translation of performance and translation for performance
Published 2025-01-01“… In the race to secure the sub-rights to Amanda Gorman’s ground-breaking performance at the 2021 United States presidential inauguration, a high-profile case emerged in which the translator appointed by Dutch publisher Meulenhoff returned the commission, following criticism of the appointment. …”
Get full text
Article -
3578
The potential of the municipality of Trstenik for the development of the wine tourism
Published 2024-01-01“…The results of the research are significant as they can assist tourism organization as well as municipal officials to make up a strategy for the development of wine tourism which would secure a significant position on the Serbian wine tourism map for the Trstenik wine district.…”
Get full text
Article -
3579
A Review of Ethnomedicinal Plants as Potential Anthelmintic Agents to Alternatively Control Gastrointestinal Nematodes of Ruminants in South Africa
Published 2024-01-01“…Small ruminant production is one of the most important animal productions for food security in the world, especially in the developing world. …”
Get full text
Article -
3580
The usability and technology acceptance of immersive virtual reality simulation for critical infrastructure workers
Published 2024-09-01“…Training is crucial for ensuring the safety, security, and efficiency of critical infrastructure systems and their employees. …”
Get full text
Article