Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3781
Online Auction System for Guma Stocks
Published 2025“…The system's objectives include streamlining the online trading process, fostering a sense of community engagement, and providing a user-friendly platform for secure transactions. It incorporates features such as user authentication, product listings, real-time bidding. …”
Get full text
Thesis -
3782
Spatiotemporal Assessment and Modelling of Roof-Harvested Rainwater Quality in Kigezi Highlands, Uganda
Published 2023“…The challenge of achieving water security in Africa is contingent upon the hydrological variability and its extremes (UN-Water, 2010). …”
Get full text
Other -
3783
-
3784
-
3785
La relation économique et commerciale sino-marocaine : De la coopération au partenariat stratégique
Published 2013-10-01“…Since the 1990s, Morocco has made the opening of its economy a strategic focus of its trade policy. Securely fastened to the European Union, by far its largest trading partner, the Kingdom of Morocco has stepped up trade agreements, especially with emerging powers. …”
Get full text
Article -
3786
The long-term and short-term effects of interest rate volatility on corporate bankruptcy risk: An industry and supply chain perspective.
Published 2025-01-01“…This mismatch of short-term debt and long-term investments undermines the sustainability of the supply chain, ultimately reducing financial security-sacrificing safety for profitability. In the long term, higher interest rates exacerbate the overcapacity problem in industries, increasing the unsustainability of the production and sales balance. …”
Get full text
Article -
3787
Influential Nodes in the OBOR Fossil Energy Trade Network Based on D-S Theory: Detection and Evolution Analysis
Published 2022-01-01“…Therefore, the above aspects should be considered when ensuring national trade security. At last, the rationality and comprehensiveness of EVC are verified by comparing with some benchmark centralities.…”
Get full text
Article -
3788
Enhance the Probability of Detection of Cooperative Spectrum Sensing in Cognitive Radio Networks Using Blockchain Technology
Published 2023-01-01“…The sharp rise in mobile data traffic causes congestion in the licensed band for the transmission of signals. Handling this security issue in real time, on top of spectrum sharing, is a challenge in such networks. …”
Get full text
Article -
3789
Application of machine learning tools and immersive technologies in management
Published 2022-04-01“…It has been concluded that most of the technologies described in the study are able to significantly improve the organisation’s efficiency, identify hidden relationships, more productively manage employees in the field of hiring, selection, personnel training, motivation and development of talents, improving corporate culture, to ensure the organisation’s security, etc. It has been also noted that the application of individual technologies can be used for pressure on employees, invasion of privacy, administrative pressure due to a political position, personal medical information, etc. and requires a balanced policy with the involvement of all interested parties.…”
Get full text
Article -
3790
Al di qua e al di là del muro: movimenti sociali in Israele e Palestina
Published 2016-05-01“… In 2007, I conducted research in the area of Bethlehem(OPT) to understand the changes caused by the construction of the security barrier on the daily life of this community. …”
Get full text
Article -
3791
Demand and consumption patterns of banana in Tanzania
Published 2025-02-01“…It offers policy recommendations to strengthen the banana value chain and improve food security in Tanzania.…”
Get full text
Article -
3792
Agriculture Supply Chain Management Based on Blockchain Architecture and Smart Contracts
Published 2022-01-01“…This strategy would be more efficient and secure.…”
Get full text
Article -
3793
Rock-Breaking Laws of Disc Cutters with Different Height Differences in Hard Rock Strata
Published 2022-01-01Get full text
Article -
3794
The Important Step for European Integration: “Council of Europe” and the Matter of Turkey’s Membership to Council
Published 2013-12-01“…This organization which stipulates cooperation in such areas human rights, social affairs, education, culture, sports, youth, public health, environmental, architectural heritage, urban planning, local and regional authorities, and law as well as defence and security was founded on 5 May 1949 by ten European states. …”
Get full text
Article -
3795
Opportunity to change the future or “institutional trap”
Published 2022-09-01“…Such a rapid integration of digital technologies may indicate, on the one hand, the desire to develop the economy and society, and on the other hand, the need to control each person, while speaking about the security of the state and its values.…”
Get full text
Article -
3796
Assisting Laboratory Management Based on Network Big Data Mining Technology
Published 2022-01-01“…In today’s big data context, the composition of virtual networks is becoming increasingly complex, so it is neither easy nor difficult to strengthen the control of network security issues. This paper studies the important content of network big data mining-assisted laboratory management. …”
Get full text
Article -
3797
-
3798
ECONOMIC AND INSTITUTIONAL DETERMINANTS OF INTERNATIONAL TOURISM DEMAND IN THE ECOWAS REGION
Published 2023-11-01“…The study recommends government, authorities in charge of crime prevention (security agencies) and other key players (both private and public) to team up and map out plans to tackle terrorism and insecurity in the West African region; the region should consider adopting single currency to stabilize prices; and ensure effective communication is maintained so that tourists are adequately informed about dangerous zones. …”
Get full text
Article -
3799
Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
Published 2012-12-01“…Recent research efforts have shown that NC can be combined with classical error control codes and cryptography for secure communications or misbehavior detections. Nevertheless, when it comes to Byzantine attacks, these results have limited effects. …”
Get full text
Article -
3800
Collaborative Governance of Rural Relative Poverty under Blockchain and Back Propagation Neural Network
Published 2022-01-01“…Therefore, the constructed poverty data visualization governance model can achieve good data transmission security performance while ensuring high classification accuracy. …”
Get full text
Article