Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4061
Psychiatric and Behavioral Complications of GPi DBS in an Adolescent with Myoclonus Dystonia
Published 2019-01-01“…The patient was transferred to a secure treatment centre where he was able to gain control over his behaviors with intense dialectical behavior therapy, but the aggressive behavior and safety concerns continue to persist today.…”
Get full text
Article -
4062
The current state of international economic relations between Russia and African countries
Published 2024-08-01“…There are also difficulties in securing financing for projects, especially for small and medium-sized enterprises.…”
Get full text
Article -
4063
Socialisation of student youth in social networks
Published 2024-06-01“…It was noted that the protection of privacy and the development of critical thinking are important for ensuring the security and information competence of social network users. …”
Get full text
Article -
4064
-
4065
Minasse Tcheraz’s Contacts of Europe and His Impressions of Berlin Congress
Published 2015-06-01“…Before Berlin Congress assembled, Armenian Patriarch Nerses Varjabedyan had sent a delegation to the Congress in order to present the countries participating in the Congress with a memorandum that contained the requests of Armenian people and to secure these countries’ support throughout the Congress. …”
Get full text
Article -
4066
Playing by the rules: Government regulation and consumer trust in the online poker industry
Published 2025-03-01“…Players are willing to pay an extra $1.83 per hour to play on government-regulated sites and players who view these sites as more secure are willing to pay even more. However, the size of the regulatory premium falls and, in some cases, becomes negative when players believe that government regulation increases the likelihood that their winnings will be taxed. …”
Get full text
Article -
4067
National Defense as fiscal policy during the Mauricio Macri administration (2015-2019)
Published 2020-09-01“…The article establishes that, although the security-oriented discourse was apparently predominant, in the end, a fiscal adjustment rationale prevailed over all the other proposals. …”
Get full text
Article -
4068
Weibo Rumor Recognition Based on Communication and Stacking Ensemble Learning
Published 2020-01-01Get full text
Article -
4069
Human-Terrestrial Wildlife Conflict in Ethiopia: A Systematic Review
Published 2022-01-01“…About 178 keywords’ analysis revealed a focus on “coexistence,” “mitigation,” and “food security.” The literature focused mainly on larger mammals, led by Ethiopian authors, and excluded the social dimensions of HWC. …”
Get full text
Article -
4070
Preparations of the Shipping Company “Żegluga Polska SA” for the Second World War
Published 2024-01-01“…Important preparations also included securing the port by state authorities.…”
Get full text
Article -
4071
Side Trip Multipath Routing Protocol for Spatial Node Failure in Data-Gathering WSNs
Published 2016-04-01“…We compare the ST scheme, STNC scheme, and two existing multipath protocols (i.e., H-SPREAD (Hybrid-Secure Protocol for REliable dAta Delivery) scheme and SMRP (Subbranch Multipath Routing Protocol) scheme) by means of a self-developed simulator. …”
Get full text
Article -
4072
Risk-based approach in external migration public management
Published 2024-03-01“…External migration state management should be aimed at solving the socio-economic development problems in Russia and ensuring national security and at the same time should minimize potential risks of social and cultural nature. …”
Get full text
Article -
4073
Implementation of Simplified Data Encryption Standard on FPGA using VHDL
Published 2022-03-01“…Due to enormous development in communication devices, globally internet-connected network largely used in all human activities. The security of information has been becoming a major concern for all users and clients, whom depend on network system. …”
Get full text
Article -
4074
TR-SDTN: Trust Based Efficient and Scalable Routing in Hostile Social DTNs
Published 2015-07-01“…In view of these defects, we propose a novel solution to address the selfish and security issues in social DTNs. Based on nodes’ social characteristics, a dynamic trust model is proposed to prevent bad-mouthing and ballot stuffing attacks and the Shannon entropy function is introduced to avoid blackhole and greyhole attacks. …”
Get full text
Article -
4075
The war inside your mind: unprotected brain battlefields and neuro-vulnerability
Published 2024-02-01“…Experts in neuromedicine, technology, societal security, and strategy must grasp that a variety of technologies that arguably enhance brain function, influence or augment intelligence, link brains with computers, and enablenon invasice access to the brain-are highly attractive. …”
Get full text
Article -
4076
Modeling the Grain Import Trade: A Cointegration Analysis of China’s Panel Data
Published 2021-01-01“…Therefore, China should pay close attention to the impact of international factors on the fluctuation of its own food prices and enhance its ability to rationally utilize the international food market and international agricultural resources to ensure domestic food security.…”
Get full text
Article -
4077
The Political Economy of the Gifts on Tiktok
Published 2025-02-01“…It is a multifaceted object of study, allowing research on various topics such as security and surveillance, algorithms and addiction, and communication and online interactions. …”
Get full text
Article -
4078
On Facial Expression Recognition Benchmarks
Published 2021-01-01“…There are several applications of facial expressions in diverse fields including medicine, security, gaming, and even business enterprises. Thus, currently, automatic facial expression recognition is a hotbed research area that attracts lots of grants and therefore the need to understand the trends very well. …”
Get full text
Article -
4079
CAUSES OF PROLIFERATION OF SMALL ARMS AND LIGHT WEAPON ON NATION BUILDING ON THE PEOPLE OF UROMI (1970-1991)
Published 2023-08-01“…Government’s monopoly of arms and the security forces would be overwhelmed and unorganized groups and armed militias will constitute threat to the development of citizens of not only Esanland in Edo State but Nigeria as a whole. …”
Get full text
Article -
4080
Research on Information Fusion of Computer Vision and Radar Signals in UAV Target Identification
Published 2022-01-01“…The small size, sluggish flying speed, low flight altitude, and low electromagnetic intensity of unmanned aerial vehicles (UAVs) have put enormous strain on air traffic management and airspace security. It is urgent to achieve effective UAV target detection. …”
Get full text
Article