Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4421
Evaluating network test scenarios for network simulators systems
Published 2017-10-01Get full text
Article -
4422
Platform Tolerant RFID Tag Antenna Design for Safety and Real-Time Tracking of On-site Workers at Riskier Workplaces
Published 2023-01-01“…Furthermore, WTMiddleware (Worker Tracking Middleware) using Javascript, CSS, and HTML has been implemented to demonstrate a real-time secured web-based remote access of workers to provide their actual on-site monitoring and tracking of construction equipment carried/operated by the workers for tracking solutions. …”
Get full text
Article -
4423
Time-periodic dynamics in COVID-19 transmission considering the impact of population disbelief and fear
Published 2025-03-01Get full text
Article -
4424
Research Progress on the Extraction and Identification of Key Components of Grain Odorants and Their Applications in Grain Storage
Published 2025-01-01“…Finally, we outline the application of odorants in the field of food security and storage, and we suggest that in-depth analysis and mining of data on grain odorants and development of new predictive models for rapid and accurate detection of grain quality will be an important direction for future research on grain odorants. …”
Get full text
Article -
4425
The Contemporary Chinese Policy in Southeast Asia
Published 2015-06-01“…Bilateral relations in political and security as well as defense spheres have been also steadily expanding. …”
Get full text
Article -
4426
Hispanic-serving HBCUs: towards an anti-colonial meso-relevant theory of organizational identity in sacred spaces of Black education
Published 2025-01-01“…Findings also emphasize the need for dual federal designation for HB-eHSIs to secure funding and legitimacy.…”
Get full text
Article -
4427
High-Dimensional Quantum Key Distribution by a Spin-Orbit Microlaser
Published 2025-02-01“…Quantum key distribution offers a promising avenue for establishing secure communication networks. However, its performance is significantly hampered by the conventional two-level information carriers (i.e., qubits) due to their limited information capacity and noise resilience. …”
Get full text
Article -
4428
Forecast of brine blowout zones in the Amu Darya basin and analysis of brine blowout in oil and gas fields
Published 2024-01-01“…The obtained findings have practical value for the oil and gas industry, contributing to improving the efficiency of hydro-carbon extraction and processing processes, which are essential for the sustainable development of the industry and ensuring regional energy security.…”
Get full text
Article -
4429
Automatic system for blood donors control with seropositive results in epidemiological tests.
Published 2008-04-01“…It also permits to elaborate reports of these patients from any PC of the blood bank acceding with the security password of the program. <strong><br />Conclusions:</strong> It constitutes a beneficial tool which permits to improve the notification system established in the program of the web about sexually transmitted diseases from the Minister of Public Health in Cuba.…”
Get full text
Article -
4430
Integration of investment strategies in the system of strategic planning of territorial development
Published 2019-06-01“…An empirical study of the implementation of investment processes in Russian regions has showed, that legal regulation is heterogeneous, but in general, well presented and allows improving the investment climate and encouraging investment, as well as to some extent influencing the economic security of the regions. The experience of the functioning of specialized organizations to attract investment and work with investors, the organization of public-private partnership at the regional level has been studied. …”
Get full text
Article -
4431
How do health workers build resilience after family loss, covid-19 infection, and social stigma during the pandemic?
Published 2024-11-01“…Affective responses, such as a sense of security from social support and optimism, cognitive responses like positive thinking and acceptance, and behavioral capacities, including increased worship and professionalism, were prominent. …”
Get full text
Article -
4432
An Examination of International Humanitarian Law of Armed Conflict: Perspective from the Legal Issues on War Crimes in Africa
Published 2022-12-01“…This study concludes that there should be adequate unilateral and collective security and sanctionable measures by the United Nationssufficient enough to protect innocent civilians, basic survival infrastructures, surrendered combatants, prisoners of war during armed conflict and that any warlord(s) who must have acted in contrary to the law of war as was codified at the Hague Conference of 1889 and 1907 as well as in fundamental breach of international law should be prosecuted accordingly by the International Criminal Court. …”
Get full text
Article -
4433
ACTUAL DISCOURE ABOUT TIPES FND DEVELOPMENT TENDENCIES NATIONAL STATE
Published 2013-08-01“…However, despite the uncertainty and ambiguity of the ways of the development of the modern world, it can be argued that in the foreseeable future it is the states that will maintain the role of the main actors in world politics and bear the responsibility for global security and development. All this naturally makes urgent the issues related to the search for optimal models of nation state development. …”
Get full text
Article -
4434
Reflections on Korea in 2010: Trials and prospects for recovery of common sense in 2011
Published 2011-01-01“…To make matters worse, the incompetence and sloppiness of the South Korean government in its initial response caused uneasiness among the citizens, and its belated displays of toughness and escalation of tension, proclaiming "readiness for a full-scale war," has added to South Korean people's sense of insecurity and even stirred their anger.Taking advantage of the security crisis, members of the ruling Grand National Party (GNP) on December 8 unilaterally and employing physical force rammed through the National Assembly the annual budget and other disputed bills. …”
Get full text
Article -
4435
Study on the Path of Cultivating and Enhancing National Maritime Awareness Under the Threshold of the Great Power Game
Published 2024-09-01“…In the current context, the game in the maritime domain extends beyond military and security aspects to encompass various fields such as maritime economy, maritime politics, maritime culture, and maritime ecology. …”
Get full text
Article -
4436
The Impact of Oil and Gas Resources In the Arctic on the Development of the Transport System in the Region
Published 2015-08-01“…Given the key role of the energy sector in the economic balance of the country, as well as the problem of exhaustion of hydrocarbon resources, the Arctic is of particular interest from an economic and geopolitical point of view, ensuring the energy security of Russia. Active development of the region leads to the development of transport infrastructure, which is one of the priorities of Russia's energy policy. …”
Get full text
Article -
4437
Analisis Kestabilan Mobil Hemat Energi Adyatma Pada Kondisi Jalan Berbelok
Published 2022-04-01“…This can happen because the level of security of a vehicle is not good, such as the stability of the vehicle when turning. …”
Get full text
Article -
4438
An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud
Published 2020-02-01“…To increase the scalability of the proposed algorithm, we discussed the issues of multi-authorization, user revocation, and 1 − n multiple access tree. Security analysis shows that enhanced media ciphertext-policy attribute-based encryption can successfully resist chosen-plaintext attacks under the decisional bilinear Diffie–Hellman assumption. …”
Get full text
Article -
4439
-
4440
Oil palm-cattle integration: Farmer perception of Ganoderma infection
Published 2025-01-01“…The findings indicated that although farmers perceive several potential benefits from integrating cattle into oil palm plantations, they also confront challenges concerning security, finance, knowledge, feed availability, and disease in the cattle. …”
Get full text
Article