Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2181
Research on Image Recognition and Classification Algorithms in Cloud Computing Environment Based on Deep Neural Networks
Published 2025-01-01“…Image recognition provides an essential role in many areas of modern life, such as security, video analysis, healthcare, and autonomous vehicles. …”
Get full text
Article -
2182
-
2183
Affective Evictions:
Published 2025-01-01“… The article suggests that government statements on anti-ghetto (2021) and security (2020) initiatives feature expressions of ‘white homesickness’ that manifest as longings for a national past and future with less or no migration to Denmark from outside Europe. …”
Get full text
Article -
2184
Study on Soil Spring Model for Pipe and Silty Clay Interaction Based on Physical Model Test
Published 2021-01-01Get full text
Article -
2185
Rusya Federasyonu’nun Kafkasya Politikası: Bütüncül Bakış
Published 2022-12-01“…However, considering especially security policies of the RF, it is possible to see that the region is actually handled holistically. …”
Get full text
Article -
2186
Retour sur la révolte du bassin minier. Les cinq leçons politiques d’un conflit social inédit
Published 2010-12-01“…In this sense, the social movement of the mining area is a source of “political instruction”, the review of which is useful to understand the degeneration of the security pact in place by the scheme during the previous decade.…”
Get full text
Article -
2187
Framework for a Cloud-Based Multimedia Surveillance System
Published 2014-05-01“…The paper finally reports that cloud-based multimedia surveillance system can effectively support the processing overload, storage requirements, ubiquitous access, security, and privacy in large-scale surveillance settings.…”
Get full text
Article -
2188
Inverse Projective Synchronization between Two Different Hyperchaotic Systems with Fractional Order
Published 2012-01-01Get full text
Article -
2189
Rapid Growth of the World Population and Its Socioeconomic Results
Published 2022-01-01“…The main problem we raise in the study is the mismatch between the rapid growth of the world’s population and the socioeconomic security of the people. That is, if the issue of socioeconomic security is not resolved, the growth of the world’s population would be a global social problem.…”
Get full text
Article -
2190
L’école maternelle au service des besoins fondamentaux de l’enfant : résultats d’une expérimentation sur les besoins de sécurisation et d’exploration
Published 2021-06-01“…Nursery school serving the fundamental needs of the child: an experiment on the needs for security and exploration. In this article are presented the first results obtained within the framework of an experiment of innovative class device for the nursery school (Experimental Project of Training of the Teachers of Kindergarten). …”
Get full text
Article -
2191
Current Experiences with Internet Telepathology and Possible Evolution in the Next Generation of Internet Services
Published 2000-01-01“…Different initiatives have been aimed at an amelioration of the Internet protocols, in order to have quality of service, multimedia support, security and other advanced services, together with greater bandwidth.…”
Get full text
Article -
2192
Hybrid Warfare Studies and Russia’s Example in Crimea
Published 2015-12-01“…Hybrid warfare became one of the main security issues for the West and especially for NATO after the Russia-Ukraine crisis. …”
Get full text
Article -
2193
A differential game model of intrusion detection system in cloud computing
Published 2017-01-01“…The multi-mesh distributed and open structure of cloud computing is more weak and vulnerable to security threats. Intrusion detection system should be incorporated in cloud infrastructure to monitor cloud resources against security attacks. …”
Get full text
Article -
2194
La durabilité de la chaîne d’approvisionnement en fruits et légumes à l’épreuve du Covid-19 : cas de la ville de Meknès au Maroc
Published 2022-12-01“…On the other hand, the study showed that some areas are still vulnerable, such as the lack of social security coverage for employees and the weak coordination of stakeholders in CAF & L.…”
Get full text
Article -
2195
Global Information Management Model and Identification Method Based on Deep Reinforcement Learning
Published 2021-01-01“…The survey results show that 270 people put the focus of global information on the ecological environment, and about 30% of them attach great importance to the security of global information.…”
Get full text
Article -
2196
Vulnerability Analysis of CSP Based on Stochastic Game Theory
Published 2016-01-01Get full text
Article -
2197
The Construction of the Evaluation Index for the Outgoing Auditing of the Natural Resource Assets of Local Leading Cadres Based on the Analytic Hierarchy Process
Published 2022-01-01“…As the foundation of human survival and development, natural resources affect every aspect of our lives, including life and health, financial security, and overall social security. This article describes building a system for valuing the assets of good NR in operation for local executives who employ analytic hierarchy process. …”
Get full text
Article -
2198
Mass Fragmentation Characteristics of t-Boc Substituted Drug Precursors
Published 2025-01-01Get full text
Article -
2199
-
2200
Réprimer par le droit : L’intervention de la Brigade nationale de police judicaire dans les procès du Hirak El-Rif
Published 2023-12-01“…Accused of "undermining state security", the arrested activists, considered to be the movement's leaders, were sentenced to between 5 and 20 years in prison. …”
Get full text
Article