Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2921
Modernization of tax control in the context of digitalization of the economy
Published 2020-10-01“…It has been concluded about the need to develop legislation in the field of digitalization of the economy, state regulation of the use of big data technology, ensuring reliable database security and protection ofprivacy, as well as the creation of software for identifying transactions.…”
Get full text
Article -
2922
THE HISTORICAL DEVELOPMENT AND CURRENT TRENDS OF POLITICAL SCIENCE AS A FIELD OF STUDY IN NIGERIA
Published 2023-08-01“…It investigates the current challenges and opportunities for political science in Nigeria in the 21st century, such as democratization, development, security, corruption, ethnicity, and globalization. …”
Get full text
Article -
2923
The Israeli–Palestinian Separation Wall and the Assemblage Theory: The Case of the Weekly Rosary at the Icon of Our Lady of the Wall
Published 2017-06-01“…Although the Wall has been widely described as a technology of occupation on one side and as a device to ensure security on the other, through Latour’s concept of assemblages I unearth its agency in developing a Christian shrine. …”
Get full text
Article -
2924
Some Characteristics of Employees as Risk Factors for Presenteeism
Published 2013-06-01“…The characteristics considered included ambition, financial worries, job security, sick leave and the physical and mental health of employees.…”
Get full text
Article -
2925
Power Consumption Based Android Malware Detection
Published 2016-01-01“…In order to solve the problem that Android platform’s sand-box mechanism prevents security protection software from accessing effective information to detect malware, this paper proposes a malicious software detection method based on power consumption. …”
Get full text
Article -
2926
A Discourse Coherence Analysis Method Combining Sentence Embedding and Dimension Grid
Published 2021-01-01Get full text
Article -
2927
Evaluating the Efficiency and Reliability of Fertilizer Subsidy Systems: The Role of Blockchain in Driving Enhancements in Tanzania
Published 2025-02-01“…The proposed hybrid architecture integrates well-structured algorithms to improve operational efficiency and ensure a more secure and fair distribution system. These findings underscore the urgent need for novel approaches to improve agricultural productivity and food security, advocating for the widespread adoption of blockchain technology within the agricultural sector. …”
Get full text
Article -
2928
CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network
Published 2020-01-01“…Network intrusion detection system can effectively detect network attack behaviour, which is very important to network security. In this paper, a multiclassification network intrusion detection model based on convolutional neural network is proposed, and the algorithm is optimized. …”
Get full text
Article -
2929
A Monitoring Approach Based on Fuzzy Stochastic P-Timed Petri Nets of a Railway Transport Network
Published 2021-01-01“…The main goal of the proposed supervision approach is to allow an early detection of traffic disturbance to avoid catastrophic scenarios and preserve stability and security of the studied railway networks. Finally, to demonstrate the effectiveness and accuracy of the approach, an application to the case study of the Tunisian railway network is outlined.…”
Get full text
Article -
2930
MORAL-ETHICAL ASPECTS OF THE DIGITAL ECONOMY
Published 2020-03-01“…It is obvious, that the creation of the Russian information system will be able to increase the efficiency of our national economy (including the objectives of its state regulation) and at the same time raise the level of the country’s security. However, the effective use of the digital economy does not only depend on the level of development of the technical base of the information system. …”
Get full text
Article -
2931
A Latent Implementation Error Detection Method for Software Validation
Published 2013-01-01“…The method complements the incompleteness of security properties for software model checking. More accurate models are characterized to leverage the effectiveness of the model-based software verification and testing combined method.…”
Get full text
Article -
2932
Evaluation of the fulfillment grade and clinical management of the treatment with immunotherapy in allergic patients.
Published 2006-08-01“…Authorized personnel checked out the level of fulfilment of the security rules, clinical betterment was evaluated with a daily control of symptoms correlated with clinical history of allergy, and satisfaction was evaluated through a questionaire.…”
Get full text
Article -
2933
Identity, imaginary and tourism in the tuareg region, in Niger
Published 2012-12-01“…Finally, the authors consider the decline of tourism, as a result of the 2007-2009 rebellion, and the presence in the neighboring Northern Mali of the Salafist brigade Al Qaeda in the Islamic Maghreb (AQIM), which prohibits access to the region to foreigners for security reasons.The brutal halt in the tourist activity came with the decline of the Tuareg subculture that had been forged through their entrepreneurial dedication to tourism.…”
Get full text
Article -
2934
Neural Linguistic Steganalysis via Multi-Head Self-Attention
Published 2021-01-01“…Precise linguistic steganalysis on suspicious carrier is critical for multimedia security. In this paper, we introduced a neural linguistic steganalysis approach based on multi-head self-attention. …”
Get full text
Article -
2935
Le nouveau Xinjiang : intégration et recompositions territoriales d’une périphérie chinoise
Published 2009-06-01“…That’s the reason why central government take active measures for an acceleration of the economic development in the region with the aim of promoting regional security, cultural and économic integration. Nowadays, an unprecedent change taken place in Xinjiang with the improvements in transportation infrastructure. …”
Get full text
Article -
2936
Le mythe de l’émergence. Réalités des dynamiques externes et internes des processus d’accumulation brésilien et chinois
Published 2020-06-01“…Finally, the solutions proposed to face the current crisis of emergence, such as the reshaping of social security systems, the reorientation of these economies towards their internal market and a better international integration enabled by the development of renewable energies, are more widely criticized in my latest work.…”
Get full text
Article -
2937
Big Data with Cloud Computing: Discussions and Challenges
Published 2022-03-01“…Various research challenges are defined in terms of distributed database storage, data security, heterogeneity, and data visualization.…”
Get full text
Article -
2938
Southern Madagascar, polycrisis and project failures: A scoping review.
Published 2024-01-01“…The southern region of Madagascar experiences a series of crises related to agro-climatic, nutritional, security, institutional, and political conditions despite the presence of numerous development aid projects over several decades. …”
Get full text
Article -
2939
Population Ageing in Ghana: Research Gaps and the Way Forward
Published 2010-01-01“…With increasing urbanization and modernization, it is important to know something about intergenerational transfers from adult children to their elderly parents, and characterize the elderly persons' food security strategies. Training of researchers will be important in terms of strengthening Ghana's capacity to monitor trends, as well as to conduct research and explore new directions in population ageing research.…”
Get full text
Article -
2940
Methodological foundations of political-geographical studies of borders using the example of Hungary
Published 2024-01-01“…Border management involves control of movement, security, and cross-border cooperation, which is critical for regional stability and development. …”
Get full text
Article