Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2441
Association between Cardiac Hypertrophy and Sex of Patients from a Hospital in Ecuador
Published 2024-01-01“…<br /><strong>Objective:</strong> determine the association between cardiac hypertrophy and sex of patients in a hospital of the Ecuadorian Institute of Social Security. <br /><strong>Methods:</strong> a descriptive and cross-sectional study was carried out in December 2022 in a hospital of the Ecuadorian Social Security Institute. 88 patients were analyzed distributed into two groups: male and female, each with 44 patients. …”
Get full text
Article -
2442
Short-Term Prediction of Electronic Transformer Error Based on Intelligent Algorithms
Published 2020-01-01Get full text
Article -
2443
Research on Indoor Positioning Systems and Autonomous Mechatronic Systems for Surveillance of Intrabuilding Zones
Published 2025-01-01“…Given increasingly complex threats, adapting surveillance approaches to meet the necessary security levels is essential. The aim of this paper is to develop a surveillance architecture based on autonomous mechatronic systems (mobile robots and drones) designed to secure areas of strategic interest, covering a predefined space while providing enhanced security at minimal costs. …”
Get full text
Article -
2444
Transformation in European Defence Supply Chains as Ukraine Conflict Fuels Demand
Published 2025-01-01“…This study contributes to a deeper understanding and theoretical advancement in managing military and security challenges, with particular emphasis on enhancing readiness, resilience, and the scaling of military capabilities across cross-border defence supply chains.…”
Get full text
Article -
2445
Evolutionary modeling and robustness analysis of multi-domain cooperative communication network under the environment of Internet of things
Published 2022-11-01“…Through real-time monitoring and updating of the performance and security indicators of the multi-domain cooperative communication networks, it provides a strong guarantee for the node deployment and security management of the Internet of things cooperative communication system.…”
Get full text
Article -
2446
On Stability of Multi-Valued Nonlinear Feedback Shift Registers
Published 2019-01-01Get full text
Article -
2447
Efficient data possession–checking protocol with deduplication in cloud
Published 2017-08-01“…Data integrity verification with deduplication can not only save space of the cloud server but also ensure security of the stored data. In the existing integrity verification scheme, deduplications are implemented by the cloud server. …”
Get full text
Article -
2448
Terrorist Group Behavior Prediction by Wavelet Transform-Based Pattern Recognition
Published 2018-01-01“…Predicting terrorist attacks by group networks is an important but difficult issue in intelligence and security informatics. Effective prediction of the behavior not only facilitates the understanding of the dynamics of organizational behaviors but also supports homeland security’s missions in prevention, preparedness, and response to terrorist acts. …”
Get full text
Article -
2449
Fuzzy logic based social trust computation scheme in Flying Ad-hoc network
Published 2025-03-01“…The Flying Ad Hoc Networks (FANETs) are becoming more popular in civic security, military, and multipurpose applications. …”
Get full text
Article -
2450
Design, Simulation, and Experimental Verification of a Destruction Mechanism of Transient Electronic Devices
Published 2020-01-01“…To quickly destroy electronic devices and ensure information security, a destruction mechanism of transient electronic devices was designed in this paper. …”
Get full text
Article -
2451
Digitization and Preservation of Academic Records: A case Study of Kabale University Registry.
Published 2024“…The study also identified several threats to these records, such as inadequate data security measures, insufficient storage space, cybersecurity threats, poor maintenance of digitization equipment, technological obsolescence, and potential disasters. …”
Get full text
Thesis -
2452
Walkshop ‘Nuclear risks and long-term peacekeeping’: 26.06.2025 – 01.07.2025
Published 2024-12-01“… Since 2021, the FRFG has organised Walkshops on the topics social security and intergenerational contracts, atomic waste, the coal phase-out, and climate change. …”
Get full text
Article -
2453
Blockchain and Artificial Intelligence for Decentralized Edge Environments
Published 2025-01-01“…Edge environments typically involve multiple stakeholders and the management of decentralized devices and resources, presenting significant challenges related to the assurance of data security, real-time processing, and efficient coordination [...]…”
Get full text
Article -
2454
Renal Vein Stenting and Gonadal Vein Embolization for Recurrent Varicoceles and Nutcracker Syndrome
Published 2025-01-01Get full text
Article -
2455
TRANSPORT SECTOR AND ITS ROLE IN THE IMPORT SUBSTITUTION OF AGRICULTURAL PRODUCTS: FORESIGHT
Published 2016-05-01“…It also proposes a project of factory-farm integration to ensure the economic security of our country.…”
Get full text
Article -
2456
REDUCING ELECTRICITY CONSUMPTION FOR IRON AND STEEL SMELTING
Published 2013-09-01“…It is shown that the introduction of high-temperature heating installation charge fusion provides increased security, stability of operation arc, reduced noise to 75–85 dB, the elimination of fugitive emissions in the work zone…”
Get full text
Article -
2457
THE METHODOLOGY OF THE FINANCIAL PROVIDING OF ACTIVITY OF THE FEDERAL GOVERNMENT BUDGETARY INSTITUTIONS
Published 2017-01-01“…In this article considered the key principles of financing federal state budgetary institutions, analyzed the main sources of financial support activities, and also the analysis of the structure of financial security of the federal government budgetary institutions.…”
Get full text
Article -
2458
-
2459
Cost accounting for environmental safety
Published 2016-04-01“…The article describes the main approaches to cost accounting for environmental security, the analysis of methods of cost accounting, proposals for the organization of accounting for the item "Environmental protection measures", systematizing the cost of measures for environmental protection aimed at co-storage and restoration of natural environment, rational use and vosproizvel of natural resources…”
Get full text
Article -
2460
Analysis of Natural Aging Behavior of Asphalt Binder in Cold and Arid Region
Published 2022-01-01Get full text
Article