Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4281
Advancements in genome editing tools for genetic studies and crop improvement
Published 2025-02-01“…The rapid increase in global population poses a significant challenge to food security, compounded by the adverse effects of climate change, which limit crop productivity through both biotic and abiotic stressors. …”
Get full text
Article -
4282
Management of abdominal pain: clinical guidelines of the Russian gastroenterological association
Published 2015-09-01Get full text
Article -
4283
A DDoS Attack Detection Method Based on Hybrid Heterogeneous Multiclassifier Ensemble Learning
Published 2017-01-01Get full text
Article -
4284
A collaborative management model as an effort for the conservation of native plants of Java’s mountains in Mount Merbabu National Park
Published 2025-01-01“…Communities participate in various activities such as protected area security, plant monitoring, nursery development, planting, and environmental education. …”
Get full text
Article -
4285
-
4286
Complexities in Financial Network Topological Dynamics: Modeling of Emerging and Developed Stock Markets
Published 2018-01-01Get full text
Article -
4287
Internet marketing organization with the use of intellegent and block chain technologies
Published 2020-05-01“…Blockchain technology is used to control and guarantee the authorship of startups and signed contracts.As IM development trend, the development of models for joint activity of intelligent agents in the cloud environment to support decision-making using blockchain technology to legally secure the authorship of innovations is proposed. …”
Get full text
Article -
4288
New Generation of Smart Highway: Framework and Insights
Published 2021-01-01“…Several urgent problems in the current stage are pointed out in terms of system compatibility, standard specification, and information security. This paper provides new insights for sustainable and reproducible highway reformation, drawing some implications for NGSH design.…”
Get full text
Article -
4289
IF-MABAC Method for Evaluating the Intelligent Transportation System with Intuitionistic Fuzzy Information
Published 2021-01-01“…ITS can effectively employ the existing traffic facilities and ensure the safety of traffic, urban traffic, and public security management for effective control in order to satisfy people’s travel demand. …”
Get full text
Article -
4290
Political ecology survey of human-chimpanzee coexistence within postwar Mabi-Yaya Nature Reserve, Côte d’Ivoire
Published 2024-11-01“…Given the Ivorian political context, this local support and the persistence of high canopy forest appear to be more related to a local understanding of the protected area as a land-securing device against “outsiders” in a context of strong political and identity crises than to any agreement with conservation policies. …”
Get full text
Article -
4291
Infiltration of Small Arms and Light Weapons into Benue Valley and Its Impact on the Conflict Between Pastoralists and Farmers
Published 2023-07-01“…This problem is more pronounce in developing countries where there are porous borders and weak institutions responsible for border security like Nigeria. The proliferation and misuse of small arms and light weapons in the country is progressively complex and multifaceted phenomenon that affects people and insecurity. …”
Get full text
Article -
4292
Experimental Research on the Influence of Temperature on the Static Properties of Skarn
Published 2021-01-01Get full text
Article -
4293
The European Union's Mediterranean Policy in the Context of the "Arab Spring"
Published 2014-04-01“…While the EU Foreign Policy in the Mediterranean region was historically conditioned by the security interests of the European Union, it suffered from securitization/democratization dilemma. …”
Get full text
Article -
4294
The influence of communication on an effective relationship marketing strategy for sport unions in the new millennium
Published 2022-10-01“…A long-term relationship is recognised as a very important and basic ingredient of marketing, securing and keeping customers and can be regarded as a tool for the new millennium. …”
Get full text
Article -
4295
The Mechanism of Safety Culture Construction in Chinese Universities Based on POI Data and Gravity Model
Published 2022-01-01“…With the development of social economy, the importance of safety culture has been recognized by the whole society. Campus security is not only related to the common interests of the campus teachers and students but also related to the fundamental interests of each individual in the campus. …”
Get full text
Article -
4296
Cloud Trust-Driven Hierarchical Sharing Method of Internet of Things Information Resources
Published 2021-01-01“…This paper sorts according to the value of the Internet information security model, obtains the optimal model to avoid human tampering, and designs the information resource acquisition process to ensure the reliability of the source data. …”
Get full text
Article -
4297
HUMAN RESOURCE MANAGEMENT PRACTICES AND POLICIES AND EMPLOYEE ORGANIZATIONAL COMMITMENT IN BOSNIA AND HERZEGOVINA COMPANIES
Published 2022-05-01“…The paper aimed at examining the impact of characteristics, organizational characteristics, and HRM practices focused on performance appraisal, job security, employee participation, and career planning on employee organizational commitment in BiH companies with more than 50 employees in four sectors. …”
Get full text
Article -
4298
Russia and the Issues of the Korean Peninsula
Published 2014-08-01“…It can be solved only by multilateral efforts for comprehensive solution combining security guarantees for North Korea and its abandonment of nuclear option.…”
Get full text
Article -
4299
Development of a Family of Chaotic Systems with Infinite Equilibria and Its Application for Image Encryption
Published 2022-01-01“…Therefore, this study not only enriched the research on infinite equilibria chaotic systems but also further expanded secure communication technology by combining chaotic synchronization control and DNA coding in image encryption.…”
Get full text
Article -
4300
Research on design intervention in spatial planning of traditional rural tourism: based on the perspective of tourists’ willingness to visit again
Published 2025-01-01“…Through scientific management and marketing strategies, traditional villages can not only enhance their competitiveness but also secure a place in the global tourism market, achieving both economic and cultural prosperity.…”
Get full text
Article