Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2781
Machine learning models and methods for solving optimization and forecasting problems of the work of seaports
Published 2022-12-01“…A special attention is paid to the port planning and development a wide range of topics in port operations, including port planning and development, their safety and security, water and land port operations.…”
Get full text
Article -
2782
La ira anticlerical de mayo de 1931. Religión, política y propaganda
Published 2017-07-01“…The involvement of uncontrolled groups in the incidents caused the first clash between members of the Administration regarding the use of public security forces. The de facto adversaries of the Republicans, including the powerful Catholic Church, were forced into taking a political stance. …”
Get full text
Article -
2783
On the optimal exercise boundary for an American put option
Published 2001-01-01“…An American put option is a derivative financial instrument that gives its holder the right but not the obligation to sell an underlying security at a pre-determined price. American options may be exercised at any time prior to expiry at the discretion of the holder, and the decision as to whether or not to exercise leads to a free boundary problem. …”
Get full text
Article -
2784
Cybercrimes: A Proposed Taxonomy and Challenges
Published 2018-01-01“…We conduct the survey of security of recent prominent researches and categorize the recent incidents in context to various fundamental principles of cybersecurity. …”
Get full text
Article -
2785
Determinants of Market Liquidity of Shares Traded on the BM&FBOVESPA
Published 2014-01-01“…The greater the difference between the price offered and the demanded on a security (bid-ask spread), the greater its illiquidity. …”
Get full text
Article -
2786
Estate Planning
Published 2012-03-01“…An estate plan is a pattern, a guide, or a master method for working toward financial security and the family’s future welfare. To be most effective, estate planning should involve all members of the family. …”
Get full text
Article -
2787
China’s Cooperation in Latin America: Implications for Development Assistance
Published 2013-09-01“…Over the past decade, Chinese cooperation in Latin America and the Caribbean has gained momentum, propelled not only by growing trade, but also by increasingly diverse political, security, technological, and cultural ties. While this cooperation has brought tangible benefits, it has also generated new dynamics of competition, including among the actors involved in development assistance. …”
Get full text
Article -
2788
“Colombia, the only risk is wanting to stay”
Published 2012-03-01“…The link between risk or danger and Colombia is well established in the transnational imaginary and it is difficult to separate the two in the current ideological climate of international security. This imaginary of risk is so persistent that state-organised promotion of tourism is forced to take it into account in order to refute it. …”
Get full text
Article -
2789
-
2790
Spatiotemporal analysis of rainfall and temperature variability and trends for a mixed crop-livestock production system: its implications for developing adaptation strategies
Published 2024-10-01“…This connection is crucial for developing targeted adaptation strategies and policies, thereby offering actionable insights for enhancing agricultural practices and food security in the region. The originality of this work lies in its comprehensive analysis and practical relevance, making it a valuable contribution to both climate science and regional agricultural planning.…”
Get full text
Article -
2791
Impact of nurturing care educational videos focusing on children with nutritional problems aged 6-23 months on mothers' knowledge and child growth
Published 2024-12-01“…Results: The intervention group showed significant improvements in nurturing care knowledge (p = 0.012), responsive caregiving (p = 0.018), and safety and security (p = 0.006). A significant difference in safety and security was observed between groups at posttest 1 (p = 0.020). …”
Get full text
Article -
2792
Attention-enhanced optimized deep ensemble network for effective facial emotion recognition
Published 2025-04-01“…Facial emotion recognition (FER) is rapidly advancing, with significant applications in healthcare, human-computer interactions, and biometric security, driven by recent advances in artificial intelligence (AI), computer vision, and deep learning. …”
Get full text
Article -
2793
Potential Impacts of Future Climate Changes on Crop Productivity of Cereals and Legumes in Tamil Nadu, India: A Mid-Century Time Slice Approach
Published 2023-01-01“…The adverse effects of climate change on cereal and legume crop productivity entail the potential adaptation options to ensure food security.…”
Get full text
Article -
2794
The COVID-19 pandemic and self-reported food insecurity among women in Burkina Faso: evidence from the performance monitoring for action (PMA) COVID-19 survey data
Published 2025-02-01“…Burkina Faso, a country with pre-existing vulnerabilities in food security, experienced considerable challenges during this period. …”
Get full text
Article -
2795
-
2796
Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks
Published 2025-01-01“…However, these benefits introduce security vulnerabilities, particularly from Distributed Denial-of-Service (DDoS) attacks, which represent some of the most disruptive threats to SDN environments. …”
Get full text
Article -
2797
-
2798
Evaluation of Nutritional and Antinutritional Properties of African Yam Bean (Sphenostylis stenocarpa (Hochst ex. A. Rich.) Harms.) Seeds
Published 2020-01-01“…It is suggested to have the potential to significantly boost food security in sub-Saharan Africa due to its considerable nutritional qualities but still yet underutilized. …”
Get full text
Article -
2799
The global energy challenge: second-generation feedstocks on marginal lands for a sustainable biofuel production
Published 2025-01-01“…Biofuels represent a renewable source of energy, but their production has raised concerns regarding their possible impacts on food security. Indeed, the current biofuel production primarily relies on food crops and arable lands. …”
Get full text
Article -
2800
AI augmented edge and fog computing for Internet of Health Things (IoHT)
Published 2025-01-01“…It has been noted how the use of modern technologies, such as narrow band-IoT (NB-IoT) for wider coverage and Blockchain technology for security, is transforming IoHT. The last part of the review focuses on the future challenges posed by advanced technologies and services. …”
Get full text
Article