Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
4501
Family Green Financial Education Based on Local Wisdom: Exploring the Values of Coastal Communities’ Local Wisdom in Promoting Green Financial Literacy
Published 2025-01-01“…The findings reveal that the coastal communities of the Batang Hari River integrate local wisdom into their financial and resource management, prioritizing long-term security and sustainability. They view saving and asset ownership as essential for future stability and employ eco-friendly practices such as using durable goods, organic fertilizers, and sustainable fishing methods. …”
Get full text
Article -
4502
Model-Based Design, HIL Testing, and Rapid Control Prototyping of a Low-Cost POC Quadcopter with Stability Analysis and Control
Published 2022-01-01“…Unmanned aerial vehicles (UAVs), particularly quadcopters, have several medical, agriculture, surveillance, and security applications. However, the use of this innovative technology for civilian applications is still very limited in low-income countries due to the high cost, whereas low-cost controllers available in the market are often tuned using the hit and trial approach and are limited for specific applications. …”
Get full text
Article -
4503
-
4504
واقع استخدام شبکة التواصل الاجتماعى الفیسبوک فى الأرشیفات الوطنیة العربیة والأجنبیة : دراسة تحلیلیة مقارنة...
Published 2018-04-01“…The study found that the existence of Arabarchives on internet is almost weak, and that some Arab archives do not use themeans of social communication in general due to lack of financial and humanresources and legal risks and security risks.The foreign archives update their face book pages almost daily ,whichmakes it logical to users to visit these pages on a regular basis ,and thecontinuity and updating of the update shows the importance given by the nationalarchives of its presence on face book unlike Arabic archives.The study also found that the Arab archives method is linked to web 1,and that the presence of Arab archives on the social networking site face book isan important presence of existence only on face book and does not reflect thehistorical value found in the Arab national archives.…”
Get full text
Article -
4505
An Analysis on Determinants of Cash and L/C Export: Findings from Türkiye’s Export
Published 2024-04-01“…The use of a letter of credit payment method by banks serves a protective role, enabling the parties to engage in trade more securely. While the expenses linked to this approach are sometimes viewed as challenging for the involved parties, it is considered a significant enabler, particularly in new trade alliances. …”
Get full text
Article -
4506
Access to Healthcare in Rural Communities: A Bibliometric Analysis
Published 2023-12-01“…However, in the subsequent years of 2020 to 2022, there was a slight decline of 3 percent in the volume of U.S. publications. Australia secured the second position in terms of publications within the aforementioned timeframe of 2015 to 2022. …”
Get full text
Article -
4507
La politique nationale de réconciliation et de relocalisation des populations déplacées dans le Liban d’après-guerre
Published 2022-01-01“…Such a policy on a nation-wide scale could only be elaborated and implemented by the state, since it required important financial resources, specific legislation and even security measures. A ministry and a fund for the displaced were created in 1992 to ensure the return of all displaced people in Lebanon. …”
Get full text
Article -
4508
Lentil plant disease and quality assessment: A detailed dataset of high-resolution images for deep learning researchMendeley Data
Published 2025-02-01“…By leveraging this dataset, researchers can explore innovative approaches to tackle challenges in lentil farming, contributing to sustainable agricultural practices and food security. Moreover, the dataset serves as a valuable resource for training and testing machine learning algorithms tailored to agricultural settings, facilitating advancements in automated agricultural technologies. …”
Get full text
Article -
4509
Spatio-temporal Distribution Characteristics and Future Trend Analysis of Extreme Climate Indices in Nenjiang River Basin over the Past 60 Years
Published 2025-01-01“…The study of extreme climate change in the Nenjiang River Basin is of great significance for ensuring ecological security and agricultural production. Based on the observation data such as daily temperature and precipitation from 12 meteorological stations in the Nenjiang River Basin between 1960 and 2020, this paper selects 26 extreme climate indices. …”
Get full text
Article -
4510
Drought and Wetness Variability and the Respective Contribution of Temperature and Precipitation in the Qinghai-Tibetan Plateau
Published 2021-01-01“…Quantifying drought and wetness fluctuations is of great significance to the regional ecological environment and water resource security, especially in the fragile Qinghai-Tibetan Plateau (QTP). …”
Get full text
Article -
4511
Hybrid Botnet Detection Based on Host and Network Analysis
Published 2020-01-01“…Botnet is one of the most dangerous cyber-security issues. The botnet infects unprotected machines and keeps track of the communication with the command and control server to send and receive malicious commands. …”
Get full text
Article -
4512
Gender and affiliation differences in topic selection in U.S. congressional speeches
Published 2018-12-01“…The analyses showed that there are overall gender and affiliation differences in topic selection by the male and female politicians in the 113th Congress, some confirming the trend of long-standing prevalence of home-related references in women’s speeches, and death and religion references in men’s speeches, others marking a social shift for some of the categories compared to previous studies on the topic, such as the increasing share of references to work, money achievement in women’s speeches, as well as women’s preference for security, and men’s preference for competitiveness, as signaled by their lexical choices. …”
Get full text
Article -
4513
Prevention or Promotion? Predicting Author's Regulatory Focus
Published 2023-09-01“…For instance, some people seek growth and show eagerness, whereas others prefer security and are vigilant. The concept of regulatory focus is employed in psychology, to explain and predict this goal-directed behavior of humans underpinned by two unique motivational systems – the promotion and the prevention system. …”
Get full text
Article -
4514
Effective Combination of Advancing Transplantation Date with High-Yielding Cultivars for Paddy Rice Could Increase the Yield Potential Under Climate Warming in China
Published 2025-01-01“…Rice is one of the main grains in the world, the stability of its production and supply is directly related to global food security. Based on field observation data from 2000 to 2012 and a biophysical process-oriented CERES-Rice crop model at three typical sites, we investigated the effects of cultivar improvement, different transplanting dates and their interactions on rice yield potential in the major paddy rice production areas of China. …”
Get full text
Article -
4515
Re-Analyzing of Consequences and Methods of Climatological Changes Managements (Case Study: Iran’s Central Basin)
Published 2020-12-01“…Human beings can only provide security and the community with knowledge and management against its negative consequences. …”
Get full text
Article -
4516
Adversarial detection based on feature invariant in license plate recognition systems
Published 2024-12-01“…The presence of adversarial samples poses a significant threat to the application of deep neural networks, especially in security-sensitive scenarios like license plate recognition systems. …”
Get full text
Article -
4517
“NEW PERIPHERY” AS A FACTOR FOR STRENGTHENING THE POSITIONS OF ISRAEL IN THE MIDDLE EAST
Published 2016-04-01“…The "periphery doctrine" was a grand strategy, meant to attain the major political-security goal of countering Arab hostility through relations with alternative regional powers and potential allies. …”
Get full text
Article -
4518
Europol’s Counter-Terrorism Role: over 25 Years of Partnership
Published 2024-10-01“…Value: The value of this article lies in its practical insights offering an internal perspective from a seasoned security practitioner focusing on operational and institutional realities as opposed to theoretical frameworks. …”
Get full text
Article -
4519
Interest Rate and Loan Portfolio Performance of Commercial Banks in Uganda: Case of Stanbic Bank.
Published 2023“…The findings show that the effect of prime lending on loan portfolio performance is that Central bank rate and collateral security have non-significant effects on loan portfolio performance. …”
Get full text
Thesis -
4520
Is Aquaculture a Success? Evidence from Africa
Published 2023“…Since its introduction in Africa, however, changes have been seen as it has contributed to food security and malnutrition and improved livelihoods by creating jobs and generating income. …”
Get full text
Article