Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4041
Determinants of digital bank transformation: a systematic literature review with prisma and bibliometrics
Published 2024-11-01“…The determinants in the digital bank transformation process include the level of digitalization, application user growth, IT investment, IT committee, cyber security, and ecosystem stocks. The results of this literature review will be a reference for further research related to digital banks, in line with the rapid digital transformation process in banking.…”
Get full text
Article -
4042
Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment
Published 2014-01-01Get full text
Article -
4043
Analysis of Climate Change from the Aliguodarz Region Farmers’ Viewpoint with an Emphasis on the Central District
Published 2013-11-01“…Therefore, it is necessary to predict or simulate this effect using various available tools in the field of management, to ensure consumer food security and the maximum welfare of producers, with the necessary planning and policy making. …”
Get full text
Article -
4044
COLLATERAL DETERMINATS IN BANK RISK MANANAGEMENT: THE REGIONAL CASE
Published 2018-05-01“…This study is based on linear regression models evaluated by the least square method. Private data of secured small and medium business loans is used. …”
Get full text
Article -
4045
Amerika Birleşik Devletleri’nin NSC-68 Çerçevesinde Uyguladığı Soğuk Savaş Stratejisi ve Türkiye’ye Yansımaları
Published 2021-12-01“…In order to fight with this threat, the report number 68 (NSC-68) was prepared and implemented by the American National Security Council in 1950. In this study, in addition to the analysis of the NSC-68 which was one of the most significiant documents of the Cold War, its Cold War strategy implemented against the USSR and its relations with Turkey are examined accordingly. …”
Get full text
Article -
4046
Estimating energy consumption and GHG emissions in the U.S. food supply chain for net-zero
Published 2025-02-01Get full text
Article -
4047
-
4048
Analysis of the Mechanism of Political Cost in the Complex Environmental Governance System
Published 2022-01-01“…The emergence of conflicts between environmental safety incidents and protection rights generates sizeable political costs, which endangers the legitimacy of the government as well as political security and stability. This article further examines the role of political costs in environmental issues. …”
Get full text
Article -
4049
-
4050
Armenia: an Uneasy Choice Between Russia's New Initiatives and the EU Eastern Partnership
Published 2014-02-01“…Deepened strategic cooperation with Moscow, first of all, provides military and energy security of Armenia, although the economic factor shouldn't be underestimated. …”
Get full text
Article -
4051
Advancing GAN Deepfake Detection: Mixed Datasets and Comprehensive Artifact Analysis
Published 2025-01-01Get full text
Article -
4052
VALUE CHAIN IN AGRICULTURE: THE CASE OF THE EUROPEAN UNION
Published 2021-05-01“…Through a deduction method, certain conclusions were made about the state of the EU food system as well as demand and supply trends in order to provide a broader understanding of the food security and the significance of agricultural sector in general. …”
Get full text
Article -
4053
Russian Language in the Central Asia Region
Published 2014-04-01“…Its positions as an active communication channel is secured not only by the social tradition, but also by the competitiveness of the Russian language education, advantages of the bilingual business, requirements of the labor migrants, HR interests and by some other pragmatic thoughts, which role within the context of Eurasian economic integration will increase. …”
Get full text
Article -
4054
G/M/N Queuing Model-Based Research on the Parking Spaces for Primary and Secondary School
Published 2020-01-01Get full text
Article -
4055
SECHA: A Smart Energy-Efficient and Cost-Effective Home Automation System for Developing Countries
Published 2023-01-01“…They simplify our lives, reduce workloads, improve home safety and security, and pave the way for newer developments. …”
Get full text
Article -
4056
-
4057
Sizing and Simulation of PV-Wind Hybrid Power System
Published 2013-01-01“…The output of the program will display the performance of the system during the year, the total cost of the system, and the best size for the PV-generator, wind generator, and battery capacity. Security lightning application is selected, whereas system performance data and environmental operating conditions are measured and stored. …”
Get full text
Article -
4058
Detection of Data Integrity Attack Using Model and Data-Driven-Based Approach in CPPS
Published 2023-01-01“…Protecting sensitive data from data integrity attacks (DIA) is essential for ensuring system security and reliability. A tragic event will occur if the attack goes unreported. …”
Get full text
Article -
4059
THE IMPOVERISHED AND THEIR ENTITLEMENT TO ADEQUATE HOUSING: A SYNTHETIC ANALYSIS
Published 2023-12-01“…This paper aims to explore the relationship between poverty and the challenge the poor face to secure adequate shelter in Nigeria. Shelter is a crucial key among the basic necessities of life, and it is one of the fundamental rights recognized by many constitutions worldwide. …”
Get full text
Article -
4060
Deep Learning Based DDoS Attack Detection
Published 2025-01-01“…Nowadays, one of the biggest risks to network security is Distributed Denial of Service (DDoS) assaults, which cause disruptions to services by flooding systems with malicious traffic. …”
Get full text
Article