Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2401
Detention of a person under suspicion of committing a criminal offence and the possibility to appeal in criminal proceedings
Published 2023-12-01“…It is emphasized that in addition to the inquirer, investigator, prosecutor, bodies authorized to carry out a pre-trial investigation, subjects who also have the right to detain a person under suspicion of having committed a criminal offense include all policemen, all military personnel serving in the National Guard of Ukraine, all employees of the special law enforcement military formation of the law enforcement service, employees of the State Security Department, military personnel performing duties for the protection of the state border, employees of the special law enforcement body of the Security Service of Ukraine, employees of the state law enforcement agency (NABU), employees of the customs service, officials involved in the anti-terrorist operation, officials and officials of enforcement agencies prisons and detention centers, captains of sea or river vessels of Ukraine located outside its borders, employees of the Department of Economic Security. …”
Get full text
Article -
2402
Evolutionary Algorithms and Quantum Computing: Recent Advances, Opportunities, and Challenges
Published 2025-01-01Get full text
Article -
2403
On Internet Traffic Classification: A Two-Phased Machine Learning Approach
Published 2016-01-01Get full text
Article -
2404
The system of entities providing territorial defence of Ukraine and the role of local self-government bodies within it
Published 2023-09-01“…It has been found that the system of entities providing territorial defence of Ukraine consists of: 1) The Verkhovna Rada of Ukraine is responsible for establishing the legislative framework for the territorial defence of Ukraine and for exercising parliamentary control over the compliance with the requirements of the legislation in this area by the committees established by it; 2) The President of Ukraine and the National Security and Defence Council of Ukraine are responsible for the global management and control over the functioning of the entire defence and security sector of Ukraine, including territorial defence, and ensure the deployment of territorial defence if necessary; 3) The Cabinet of Ministers of Ukraine, ministries and other central executive authorities whose activities are aimed at building the organisational and administrative architecture of territorial defence, determining the vector of development and implementation of the state policy in the field of defence and territorial defence of Ukraine; 4) target subjects of territorial defence implementation including regional state administrations, military authorities and law enforcement agencies. …”
Get full text
Article -
2405
Anomaly Detection in Network Traffic Using Advanced Machine Learning Techniques
Published 2025-01-01“…Anomaly detection in network traffic is a critical aspect of network security, particularly in defending against the increasing sophistication of cyber threats. …”
Get full text
Article -
2406
A New Method of Image Steganography Using 7th Bit of a Pixel as Indicator by Introducing the Successive Temporary Pixel in the Gray Scale Image
Published 2018-01-01“…As the internet has become the medium for transferring the sensitive information, the security of the transferred message has become the utmost priority. …”
Get full text
Article -
2407
Value Added Tax and Economic Development: Focus on Human Capital Development
Published 2025-03-01“…The recommendations outlined in the study emphasize the importance of training, oversight, exchange rate stabilization, investment in education, and financial security in promoting Economic Development and Human Capital Development in Nigeria. …”
Get full text
Article -
2408
Optimizing Data Interoperability for System Efficiency: One Data Standard in the Government Environment
Published 2024-10-01“…Technical challenges relate to differences in communication protocols, data formats, and security. The results of the implementation show that with a careful and collaborative approach, these technical challenges can be overcome, as seen from the network revitalization and increased data security at the Ministry of Manpower with the help of BSSN. …”
Get full text
Article -
2409
The Rise and Fall of the Iraqi Sunni Awakening Movement
Published 2023-03-01“…The disintegration of the Awakening was strongly influenced by two US decisions that were of strategic importance to Iraq: (a) support for al-Maliki following his defeat in the 2010 parliamentary elections, won by the secular Sunni-Shiite coalition; (b) poor timing of the withdrawal of American troops from Iraq, as by the end of 2011, the Iraqi security forces were still not ready to ensure the country's security. …”
Get full text
Article -
2410
Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks
Published 2018-08-01“…Since Internet of Things involve wireless channel for communication that is open for all types of malicious adversaries, therefore many security protocols have been proposed to ensure encryption over wireless channel. …”
Get full text
Article -
2411
Exploring Diet Quality, Food Insecurity, and Health Status among Utah Residents
Published 2024-12-01“…The findings revealed an association between very low food security and poor diet quality, particularly for individuals with reduced fruit and vegetable intake. …”
Get full text
Article -
2412
Optimization of African indigenous vegetables production in sub Saharan Africa: a review
Published 2023-10-01Get full text
Article -
2413
Dataset of digital literacy of university students in Indonesia
Published 2025-02-01“…Data were measured using a digital literacy scale consisting of six subscales: technological skill, personal security skill, critical skill, device security skill, informational skill, and communication skill. …”
Get full text
Article -
2414
-
2415
THE WASSENAAR ARRANGEMENT AND RUSSIAN HIGH-TECH EXPORT
Published 2016-02-01“…The dilemma between the need to support exporters by reducing administrative barriers and the ensuring security interests of the country gain momentum in current stage of scientific-and-technological advance development.…”
Get full text
Article -
2416
CONFLICT BETWEEN PASTORALISTS AND FARMERS IN NIGERIA AND ITS POTENTIALS FOR REGIONAL INSECURITY IN AFRICA
Published 2023-09-01“…To manage the conflict, the author recommends that African governments should muster the political will to address the security challenges posed to the African continent by the conflict by reviewing the ECOWAS Transhumance Protocol among others. …”
Get full text
Article -
2417
The status and challenges of irrigation infrastructure performance in supporting the agricultural sector: A case study of Kediri Regency, Indonesia
Published 2025-01-01“…The increase in population in rural and urban areas has an impact on food availability and security. Agriculture, as a major contributor to food security, faces increasing challenges, such as the decline in the area planted for agricultural commodities, the availability of labor, and the water provision for crops. …”
Get full text
Article -
2418
Analysis of global experience in creating digital platforms and related risks
Published 2020-10-01“…The following types of digital risks have been considered: information security risks, organized cybercrime risks, reputational risks, legal risks, operational risks and risks of instability of participants’ income. …”
Get full text
Article -
2419
An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method
Published 2021-01-01“…Moreover, the test experiment and security analyses are given; the results show that our proposed cryptosystem has both security and speed performance.…”
Get full text
Article -
2420
HUMAN RIGHTS, FUNDAMENTAL FREEDOMS AND UNIVERSAL VALUES IN INTERNATIONAL RELATIONS
Published 2016-08-01“…The author emphasizes the import role of the Conference on Security and Cooperation in Europe (CSCE) in transforming the issues of human rights and fundamental freedoms into the essential element of public diplomacy of contemporary states. …”
Get full text
Article