Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
1981
Legal bases of material support of militia workers of the Ukrainian SSR in the 20s of the XX century
Published 2021-12-01“…The legal acts of the Ukrainian SSR, which established the conditions and amounts of social security and remuneration of militia workers, were studied. …”
Get full text
Article -
1982
Locarno Treaties (1925) in the Context of the Versailles System Transformation as seen from London
Published 2021-04-01“…It allows the authors to trace the evolution of approaches by the main British political parties to security issues in Europe. A systematic comparison of views of the Conservative and the Labour party representatives on the Geneva Protocol and the Rhineland Pact shows that by mid-1920s the British political elites advocated for an in-depth transformation of the Versailles order, particularly, through the development of an effective mechanism for maintaining international security. …”
Get full text
Article -
1983
Machine Learning-Integrated Usability Evaluation and Monitoring of Human Activities for Individuals With Special Needs During Hajj and Umrah
Published 2025-01-01“…These acts of worship are still very challenging for the mobility, security, and accessibility of people with special needs. …”
Get full text
Article -
1984
-
1985
-
1986
Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB
Published 2022-02-01“…Without security, the message is often utilized by an irresponsible person. …”
Get full text
Article -
1987
Properties of solutions to a second order nonlinear differential equation
Published 1990-01-01Get full text
Article -
1988
On the boundedness and oscillation of solutions to (m(t)x′)′+a(t)b(x)=0
Published 1987-01-01Get full text
Article -
1989
-
1990
-
1991
Low Mismatch Key Agreement Based on Wavelet-Transform Trend and Fuzzy Vault in Body Area Network
Published 2013-06-01“…The services in BAN usually have a high requirement on security, especially for the medical diagnosis, which involves private information. …”
Get full text
Article -
1992
Multistage Encryption for Text Using Steganography and Cryptography
Published 2023-03-01“…As a result, information security has become even more critical than before. …”
Get full text
Article -
1993
The widening gender wage gap in the gig economy in China: the impact of digitalisation
Published 2024-12-01Get full text
Article -
1994
Multiple-Feature Extracting Modules Based Leak Mining System Design
Published 2013-01-01“…In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks. …”
Get full text
Article -
1995
Seismic Behavior of Short Concrete Columns with Prestressing Steel Wires
Published 2014-01-01Get full text
Article -
1996
Fuzzy-Based Trust Prediction Model for Routing in WSNs
Published 2014-01-01“…The sensitive application environments and resource constraints of WSNs mandate the requirement of lightweight security scheme. The earlier security solutions were based on historical behavior of neighbor but the security can be enhanced by predicting the future behavior of the nodes in the network. …”
Get full text
Article -
1997
Hybrid Cryptography Based on Planets: Phobos & Deimos
Published 2025-01-01“…Remote access has become essential for business continuity but also introduces significant security risks. To address these issues, it is crucial to innovate in cryptography, the backbone of data security. …”
Get full text
Article -
1998
Multiple-Model Cardinality Balanced Multitarget Multi-Bernoulli Filter for Tracking Maneuvering Targets
Published 2013-01-01Get full text
Article -
1999
Improved 2D Discrete Hyperchaos Mapping with Complex Behaviour and Algebraic Structure for Strong S-Boxes Generation
Published 2020-01-01“…The standard set of performance parameters such as nonlinearity, strict avalanche criterion, bits independent criterion, differential uniformity, and linear approximation probability is quantified to assess the security and robustness of proposed S-box. The simulation and comparison results demonstrate the effectiveness of proposed method for the construction of cryptographically sound S-boxes.…”
Get full text
Article -
2000
CONSTRUCTION OF THE FUTURE: THE EXPERIENCE OF PHASED IMPROVEMENT OF ENGINEERING EDUCATION
Published 2017-06-01Get full text
Article