Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3621
Pomodori e pesticidi. (In)giustizia alimentare, sanitaria e ambientale nelle Regioni ultraperiferiche: il caso di Mayotte
Published 2024-06-01“…Through this paper we intend to offer a contribution to the debate on food and environmental security and sustainability in the European Outermost regions, so as to illustrate the not-so-apparent linkages between departmentalisation, socio-economic inequalities and food and environmental insecurity. …”
Get full text
Article -
3622
Covert Channel Construction Method Based on HTTP Composite Protocols
Published 2022-01-01Get full text
Article -
3623
A Particle Swarm Optimization Algorithm for Deployment of Sensor Nodes in WSN Network
Published 2022-01-01“…In order to solve the problems of security hidden dangers in the process of node location due to the characteristics of limited resources, open deployment, and being unattended in wireless sensor networks, this paper proposes a mainstream location algorithm combined with the current WSN node. …”
Get full text
Article -
3624
Class Precarity and Solidarity in Education
Published 2018-12-01“…These infrastructures provide important underpinnings of a universal basic security to be delivered through a social and solidarity economy. …”
Get full text
Article -
3625
The Floor is not the Ground
Published 2018-11-01“…Despite the categorical difference between transportation and logistics, narratives of quality, security and standards accompanied by specific spatial patterns, have infiltrated our everyday mobility infrastructures. …”
Get full text
Article -
3626
Intentional Islanding of Active Distribution Networks by GenSets: An Analysis of Technical Constraints and Opportunities
Published 2023-01-01“…The willingness to improve the security and reliability of power supply to end-users, often pushed by prescriptions of national regulatory authorities, is bringing considerable challenges for distribution system operators. …”
Get full text
Article -
3627
Analysis of Laboratory Videos of Science Teacher Candidates with Many-Facet Rasch Measurement Model
Published 2019-07-01“…The simplest articles which science teacher candidates were subjected are “introducing yourself”, “using proper costume”, “appropriate time” and the articles for which the science teacher candidates are constrained mostly “sound-supporting effect”, “writing effect”, “warning for security precautions”.Jury numbered 3 or coded as J3 is “the most lenient” and scorer numbered 2 is “the severest” when juries are sequenced from the most lenient. …”
Get full text
Article -
3628
Analisis faktor produksi terhadap kepuasan petani dalam mendorong ketahanan pangan di Sulawesi Selatan
Published 2024-07-01“…The aim of this study is to determine whether farmers' satisfaction with the use of production factors contributes to the success of the Food Security System (SKP) and to identify which production factors most significantly influence farmers' satisfaction in supporting SKP. …”
Get full text
Article -
3629
Financial Data Anomaly Detection Method Based on Decision Tree and Random Forest Algorithm
Published 2022-01-01“…The fast-developing computer network not only brings convenience to people but also brings security problems to people due to the appearance of various abnormal flows. …”
Get full text
Article -
3630
Povoar e enquadrar
Published 2022-07-01“…The Christian conquest of Lisbon, in 1147, initiated a new era in the city which immediately saw diocesan life restored and parish life quickly revived. Efforts to secure the settlement and ecclesiastical accommodation of the urban population went hand-in-hand with the gradual establishment in the city of various religious orders, some drawing upon previous eremitic experiences, others with a marked pastoral bias combining liturgy, preaching, and charitable acts. …”
Get full text
Article -
3631
Digital Technology Adoption in the Agriculture Sector: Challenges and Complexities in Africa
Published 2023-01-01“…These include resource scarcity, limited expertise and training, a lack of digital infrastructure, data privacy and security concerns, and resistance by farmers. In spite of this, the agricultural sector in Africa has the potential to adopt technology and not only boost farm productivity but also engender sustainable and environmentally friendly farming. …”
Get full text
Article -
3632
BIBLICAL PERSPECTIVE OF THE RUSSIAN INVASION OF UKRAINE IN 2022
Published 2022-12-01“…As a result of these findings, the paper recommended that there must be an immediate demilitarization of Ukraine, NATO's equipment installations on the borders of Russia should be relocated; there must be a restoration of the natural status of Ukraine for the sake of peace, the continuous eastward expansion of NATO must be stopped; and Russian legitimate security interest must be unconditionally taken into consideration by the Western countries to avoid third world war …”
Get full text
Article -
3633
Cloud-Based Service for Fingerprint Image Matching
Published 2024-09-01“… Fingerprint matching is one of the most important services that related to the issue of identifying individuals, as it can be used to verify the validity of contracts, documents or in other security fields such as criminal investigations. Fingerprints are also one of the most common and accurate forms, as they are easy to obtain, it also has a unique features and cannot be identical to any individuals. …”
Get full text
Article -
3634
-
3635
CMAIS-WOA: An Improved WOA with Chaotic Mapping and Adaptive Iterative Strategy
Published 2023-01-01Get full text
Article -
3636
The Design Blueprint for a Large-Scale Telehealth Platform
Published 2022-01-01“…This design blueprint covers the digital healthcare ecosystem, new patient journey design for digital health services, telehealth functionality design, and an outline of the platform infrastructure and security design. Ultimately, telehealth platforms establish a completed digital healthcare service and new ecosystem that provides better care for every patient worldwide.…”
Get full text
Article -
3637
Postfazione. La fragilità della sovranità tra colonialismi ed epistemologie dei sud del mondo
Published 2024-06-01“…The contribution aims to highlight dynamics and processes that are common to the articles in the monographic dossier, dedicated to food sovereignty, security and sustainability in different island contexts. …”
Get full text
Article -
3638
Representation of the solution of a nonlinear molecular beam epitaxy equation
Published 2024-12-01Get full text
Article -
3639
The Politics of Objects: Eliza Cook’s Biographies of Things
Published 2016-05-01“…Finally, Cook’s biographies of things challenge the economic models that value profit, property and individualism as she presents new forms of exchange and enhances the possibility of a counter-model of consumption that secures fairer social and economic patterns.…”
Get full text
Article -
3640
Research on Sarcastic Emotion Recognition Based on Multiple Feature Fusion
Published 2025-01-01Get full text
Article