Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2901
Records Keeping and Financial Performance in Local Government: A Case Study of Rubanda District Local Government.
Published 2024“…Other challenges stated were lack of records retention and disposition schedule/ policy. improper security for records. lack of filing manual/finding aids and inadequate storage equipment and solutions to the challenges faced in record-keeping at RDLG were the provision of retention and disposition schedule, Lack of Records management policy, Improving security for records, Employing professionally trained record Managers, provision of Filing Manual/Finding Aids and Involvement of manual operations, Training record users on modern record management practices and Installing back up facilities for ICT. …”
Get full text
Thesis -
2902
Factors Associated with Stunting in Children Under Five Years of Age: A Case of Buhara Sub County, Kabale District.
Published 2023“…The household financial security was seen to have influenced household food security, diversification, and supplementation. …”
Get full text
Thesis -
2903
Les salafistes marocains et la reconfiguration politico-religieuse post-2011 : fluctuation entre (dé)politisation, radicalisation et intégration
Published 2020-07-01“…In each moment of this evolution, the regime opts for a pragmatic approach which consists in using this religious trend to meet pressing demands and priorities of a political and security nature. Ten years after breaking up with salafist groups, both quietists and jihadists, suspected to be responsible for the 2003 Casablanca attacks, the regime seeks henceforth to reconcile with salafis with the purpose to integrate them, or at least neutralise them, in the ongoing politico-religious reconfiguration process. …”
Get full text
Article -
2904
An Adaptive Time-Stepping Algorithm for the Allen–Cahn Equation
Published 2022-01-01Get full text
Article -
2905
Marketing analysis of the technological equipment market for the Russian logging industry
Published 2021-08-01“…The directions of further development of forest engineering and the entire forest complex of Russia based on import substitution and ensuring the economic and technological security of Russia are substantiated.…”
Get full text
Article -
2906
HYGIENIC EVALUATION OF ENVIRONMENTAL INFLUENCE ON THE HEALTH OF CHILDREN FROM RURAL REGIONS OF SOUTHERN UKRAINE
Published 2017-03-01“…The program of preventive measures in areas with low environmental security should include correction of food, providing drinking water quality and regulatory measures on hygienic education of the children’s population.…”
Get full text
Article -
2907
Evacuation Model of Emotional Contagion Crowd Based on Cellular Automata
Published 2021-01-01“…Crowd evacuation under emergency is an important task of world public security research and practice. In order to describe the microemotional contagion of evacuation individuals, a cellular automata-based evacuation model of emotional contagion crowd based on the classical SIS model of infectious diseases is proposed in this paper. …”
Get full text
Article -
2908
A Novel Image Encryption Algorithm Based on DNA Subsequence Operation
Published 2012-01-01“…The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.…”
Get full text
Article -
2909
Concept development assessment game – suitable collecting framework in scientific military research
Published 2025-01-01“… Scientific research is crucial for progress across all areas of society, including the military sphere. However, as the security environment becomes increasingly dynamic, unpredictable, and complex, research methods in military sciences must address contemporary challenges by providing flexible frameworks for evaluating and testing new concepts necessary for the adaptation of force structures. …”
Get full text
Article -
2910
Qualification problems of war-related criminal offences documented on the de-occupied territories of Ukraine
Published 2022-09-01“…Based on the analysis and synthesis of the experience of investigators from the National Police, the Security Service of Ukraine, as well as prosecutors on the de-occupied territories of Ukraine, four basic problematic subject areas with the corresponding typical situations of the law on criminal liability application have been identified: criminal legal qualification of artillery shelling, mining, causing death to a person, and other actions of physically detained representatives of the aggressor state. …”
Get full text
Article -
2911
LEADERSHIP, GOOD GOVERNANCE AND DEVELOPMENT IN NIGERIA
Published 2023-12-01“…The paper recommended the use of electronic voting systems and the demonstration of material and human security as solutions to problems. Others include removing the immunity provision for those holding political office and reorienting the country. …”
Get full text
Article -
2912
Random Emission and Control of Whispering Gallery Mode Using Flexible Optical Fiber
Published 2025-01-01“…Additionally, the application of this laser in information security encryption is demonstrated and explored.…”
Get full text
Article -
2913
A Privacy-Preserving Biometric Recognition System with Visual Cryptography
Published 2022-01-01“…Experimental results show that our proposed method keeps the high accuracy of the feature recognition system when providing security.…”
Get full text
Article -
2914
The Role of Civil Defense in the Republic of Serbia’s Crisis Management System
Published 2024-12-01Get full text
Article -
2915
The Role of Civil Defense in the Republic of Serbia’s Crisis Management System
Published 2024-12-01Get full text
Article -
2916
Automatic exchange of financial information from the perspective of tax fairness and transparency
Published 2024-11-01“…Challenges such as data security and compliance costs can be addressed with the development of better technology and regulatory frameworks. …”
Get full text
Article -
2917
Making AI an ally for sustainable agriculture in the face of climate change
Published 2025-01-01“…These disruptions threaten food production, global food security, economic stability and community livelihoods. …”
Get full text
Article -
2918
EPPDC: An Efficient Privacy-Preserving Scheme for Data Collection in Smart Grid
Published 2015-05-01“…In EPPDC scheme, the users' data information is transmitted to the local aggregator by building gateway with privacy preserving. In addition, the security analysis indicates that EPPDC scheme not only can resist replay attack, but also has source authentication and data integrity, confidentiality, unforgeability, nonrepudiation, and evolution of shared keys. …”
Get full text
Article -
2919
Combating Cybercrime and Cyberterrorism in Indonesia
Published 2023-02-01“…Cybercrime poses a serious risk to national security in Indonesia. The pervasive nature of cybercrime calls into question the efficacy of current regulatory measures. …”
Get full text
Article -
2920
From Travel to Text: Reverends Wolff and Lansdell’s Missions to Bokhara
Published 2024-03-01“…My paper will examine the strategies Wolff and Lansdell employed in writing their journeys to Central Asian sensitive border regions under the imperial security constraints of the moment. Their failure of self-censorship in fact erupts in concealed messages to certain sections of Victorian readership able to read between the lines, revealing the undisclosed and unsaid.…”
Get full text
Article