Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5361
Magnitude and Predictors of Dietary Diversity among HIV-Infected Adults on Antiretroviral Therapy: The Case of North-Western, Ghana
Published 2024-01-01“…Starchy staple foods and flesh food were the most consumed foods, while organ meats, dairy products, and eggs were eaten less. Having a secured salary paid job, not taking cotrimoxazole prophylaxis, and being a young adult were strong predictors of a high dietary diversity score. …”
Get full text
Article -
5362
NEW «PARASITIC CLASS»: ON THE CONCEPT OF MIKHAIL VOSLENSKY
Published 2024-12-01“…Particular attention is paid to the subordination of the security forces to party control through mechanisms of the Central Committee, which minimized risks to the nomenklatura system. …”
Get full text
Article -
5363
Combined application of vermicompost and mineral K fertilizer improves root yield of sweet potato [Ipomoea batatas (L.) Lam] in Southern Ethiopia
Published 2025-02-01“…Eventually, this has led to a decline in food security. Although the rate depends on many factors, organic inputs such as vermicomposts are suggested as alternatives or combined with mineral fertilizers. …”
Get full text
Article -
5364
A Cloud-Based Optimized Ensemble Model for Risk Prediction of Diabetic Progression—An Azure Machine Learning Perspective
Published 2025-01-01“…The experiment is performed and implemented in Microsoft’s Azure cloud, using Azure Machine Learning service, that leverages the advantages of cloud computing with respect to scalability, security and its potential integration possibilities into IoT-based smart healthcare systems.This aspect highlights its versatility and impact with respect to remote monitoring of patients as well. …”
Get full text
Article -
5365
Venezuela: Political Confrontation and the World Community
Published 2020-11-01“…The inability or unwillingness of external forces to reach compromise and to bring the parties to the negotiating table can pose a threat to peace and international security.As a result, Venezuela has become one of the most turbulent countries in the region. …”
Get full text
Article -
5366
Information: on the question as for the meaningful evolution of the term
Published 2021-09-01“…The urgency and importance of studying the issue of information in our country is emphasized given that Ukraine is in a state of constant information war with the Russian Federation, which is quite active and aggressive in using information as a weapon of mass destruction against the territorial integrity and state security of Ukraine. The basic approaches to understanding of this term taking into account branch delimitation of scientific knowledge are defined. …”
Get full text
Article -
5367
-
5368
PROBLEMS OF DIPLOMACY IN THE PROCESS OF EURASIAN INTEGRATION
Published 2014-06-01“…The Union State of Russia and Belarus and Organization of the Collective Security Treaty associations played a particular role in structuring the EAU. …”
Get full text
Article -
5369
Electronic contracts on medical care of the population under medical guarantees program
Published 2024-06-01“…The author has identified the principles of electronic medical deeds: information exchange takes place exclusively in electronic form; the legislation establishes the security of exchange and preservation of medical information, in particular medical confidentiality; modern access to medical care and resources is provided due to their assistance; these electronic contracts are aimed at improving the quality of service and meeting patients needs, transparency of the health care system; they are signed considering technological neutrality and independence from decisions developers; while signing such contracts, the information is recorded in the e-health system without the possibility of deleting or correcting the entered data; electronic identification and authentication of participants in medical relations with a high level of trust is used while they are being signed. …”
Get full text
Article -
5370
Personalized Federated Learning for Heterogeneous Residential Load Forecasting
Published 2023-12-01Get full text
Article -
5371
Global Governance of Biogenic Threats
Published 2021-04-01“…The SARS-CoV-2 virus, which caused a pandemic in 2020, has posed not only a medical, economic and social threat, but also a challenge to international security and international cooperation. It is now becoming obvious that the problem of the current pandemic cannot be reduced to individual states and regions and has the potential to influence the entire political organization of the modern world. …”
Get full text
Article -
5372
CRISIS OF TRUST IN GOVERNMENT: THE ROLE OF PUBLIC RELATIONS IN ITS RESTORATION
Published 2024-12-01“…Overall, it emphasizes the need for systemic changes in communication management approaches to secure political stability and promote economic development. …”
Get full text
Article -
5373
Women’s empowerment as a determinant of neonatal mortality in Sub-Saharan Africa: a narrative review focused on Nigeria
Published 2024-12-01“…By integrating women’s empowerment within a broader strategy to improve maternal and newborn health, Nigeria can advance towards securing a healthier future for its youngest population.…”
Get full text
Article -
5374
The die is cast: Sweden and Finland’s long road to NATO
Published 2024-11-01“…The consequences of this decision have yet to be assessed by politicians and experts, but one its immediate effect is clear — the emergence of a new security dilemma for the countries of the region.…”
Get full text
Article -
5375
A literature review on transformative impacts of blockchain technology on manufacturing management and industrial engineering practices
Published 2025-07-01“…Key findings reveal its effectiveness in improving data security, risk management, and intellectual property protection, alongside optimizing inventory control and customer satisfaction. …”
Get full text
Article -
5376
Humanitarian activity as a ‘soft power’ instrument of transnational corporations
Published 2023-10-01“…The author shows that within the framework of corporate humanitarian expansion Nestle implemented a wide range of humanitarian projects, which allowed it not only to secure a foothold in the Colombian market, but also to penetrate its political system, as well as to gain opportunities to further expand its political presence in the region. …”
Get full text
Article -
5377
Civil defendant representation in criminal proceedings
Published 2024-12-01“…The main areas of activity of a civil defendant’s representative are summarised as follows: 1) identifying other co-defendants if the damage was caused by the actions of more than one person; 2) checking whether the representative of the civil plaintiff has sufficient grounds to represent the interests of the state, a minor, incapacitated or partially incapacitated victim; 3) filing an objection to the claim, provided that there are sufficient grounds and the defendant is not properly identified; 4) recognising the claim in whole or in part based on a thorough study and analysis of the text of the civil claim; 5) assessing the nature and amount of claims, including material claims, set out in the claim, determining their objectivity and relevance to the circumstances of the case, the reliability and sufficiency of evidence provided in support of them in order to formulate an appropriate legal position; 6) finding out whether any person has previously compensated for the damage caused; 7) verifying the validity of actions taken by the prosecution to secure the claim, etc. Given these areas of activity of the civil defendant's representative, the author concludes that in general, this participant in criminal proceedings performs the following functions: informational, supportive and protective. …”
Get full text
Article -
5378
Investigating the Impacts of Road Traffic Conditions and Driver’s Characteristics on Automated Vehicle Takeover Time and Quality Using a Driving Simulator
Published 2021-01-01“…With these findings, this study emphasizes the importance of having effective countermeasures and driver interface to monitor drivers in the automated vehicle system; therefore, an early and effective alarm system to alert drivers for the vehicle takeover can secure enough time for stable recovery to manual driving and ultimately to achieve safety during the takeover.…”
Get full text
Article -
5379
Self-Reported Violence Experienced by Swiss Prehospital Emergency Care Providers
Published 2021-01-01“…In order to increase their own security, they increased their protection. These results illustrate their feelings of insecurity, which may have deleterious effects on work satisfaction and motivation. …”
Get full text
Article -
5380
The Paradox of Indonesia Cyberspace Policy and Cooperation: Neoclassical Realism Perspective
Published 2022-09-01“…Cyberspace is a new threat to state security, especially in Indonesia. The increase of internet users in Indonesia is followed by several policies Jakarta takes to adapt to the fast pace of cyberspace challenges. …”
Get full text
Article