Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
2981
Design of Updating Encryption Algorithm for Privacy Big Data Based on Consortium Blockchain Technology
Published 2022-01-01“…The source coding sequence of privacy big data is obtained, the security of network route query and identity is verified, and the update and extraction of user data access authority are realized. …”
Get full text
Article -
2982
Genetic resources in Russia: from collections to bioresource centers
Published 2022-04-01“…Collections of bioresources and a set of technologies for their conservation, study and practical use are now the basis of bioeconomy, biosafety, and food security. It is the foundation underpinning production chains, leading from basic research to various technological areas and industries.An analysis of the current state and an assessment of the prospects for the development of bioresource collections in the Russian Federation are presented. …”
Get full text
Article -
2983
Audio and Video Matching Zero-Watermarking Algorithm Based on NSCT
Published 2022-01-01“…In the Internet age, information security is threatened anytime and anywhere and the copyright protection of audio and video as well as the need for matching detection is increasingly strong. …”
Get full text
Article -
2984
IMPACT OF THE WHISTLEBLOWING POLICY IN THE FIGHT AGAINST CORRUPTION IN NIGERIA
Published 2023-12-01“…This work, therefore, recommends, among other things, that the whistle blowers should be given adequate legal and security protection and adequate public awareness be embarked upon to educate the people of the need to expose corrupt individuals. …”
Get full text
Article -
2985
Les échos de la presse dans le silence du cabinet. La posture médiatique flaubertienne à la lumière de la correspondance
Published 2021-06-01“…While Flaubert’s financial security exempted him from the daily publications that contemporary writers-journalists had to produce, it did not necessarily means disinterest. …”
Get full text
Article -
2986
Guide of maxillofacial trauma intervention for diagnosis and treatment of facial burns
Published 2010-07-01Get full text
Article -
2987
ACCOUNTING TREATMENT AND LEGISLATION OF LEASING ARRANGEMENTS
Published 2011-11-01“… Companies are not always able to purchase fixed assets required to start, expand or modernize their own operations, and also do not have adequate resources that could offer as security for bank loans. Leasing is the answer to such problems, as it provides the possibility of leasing recipient to obtain the necessary equipment. …”
Get full text
Article -
2988
Permanent pacemaker implantation. Access to the apex of the right ventricle using fluoroscopy only at the last moment
Published 2021-12-01“…Although it is not currently practiced, during the stage that it was applied in the hospital, it provided security to patients and health personnel, so its use should be resumed.…”
Get full text
Article -
2989
Le droit du travail et les migrants ruraux : instituer un nouveau salariat en Chine
Published 2014-06-01“…Labour law appears as a solution whose goal is to ensure the viability of this new working class with socially inclusive policies and then institutionalises its economic security. Furthermore, in a context characterised by the socialist legacy and the lack of democracy, we have to question the relations with the law and the State. …”
Get full text
Article -
2990
The Correlation Between External and Internal Factors of the Libyan Crisis
Published 2015-10-01“…The importance of this region is determined by its geopolitical position, concentration of large natural resources, as well as the fact that it represents the greatest threat to the international security - the bases of terrorist organizations, the strengthening role of the group "Islamic State", drug trafficking and the proliferation of weapons of mass destruction (WMD). …”
Get full text
Article -
2991
Disaster Tips for People with Disabilities
Published 2005-08-01“…Departments of Homeland Security and the Federal Emergency Management Agency for people with disabilities. …”
Get full text
Article -
2992
Who calls the shots in Naomi's life? Reading the Naomi-Ruth story within the African religio-cultural context
Published 2016-12-01“…Such a worldview, in which the Sacred Other, the living and the (living) dead formed an integral whole, can also be observed at critical points in Naomi’s life: when Naomi bid farewell to her daughters-in-law (Rt 1:8-9); Naomi’s confession about Yahweh’s faithfulness to both the living and the dead (Rt 2:20); Naomi’s plan to seek security for Ruth through “levirate” marriage (Rt 3:1), and when she acted as a nurse to Mahlon’s son (Rt 4:5, 16). …”
Get full text
Article -
2993
Method for the hystopathological analysis of the cervix specimen, obtained through radio surgery
Published 2006-08-01“…It has been evaluated and vouched as satisfactory for its usefulness, easy application, low expense, security, and diagnostic and forecasting confidence.…”
Get full text
Article -
2994
Machine Learning Applications based on SVM Classification A Review
Published 2021-04-01“…Classification based on SVM has been used in many fields like face recognition, diseases diagnostics, text recognition, sentiment analysis, plant disease identification and intrusion detection system for network security application. Based on this study, it can be concluded that SVM classifier has obtained high accuracy results in most of the applications, specifically, for face recognition and diseases identification applications. …”
Get full text
Article -
2995
EXAMINING THE CAUSAL NEXUS BETWEEN TOURIST ARRIVALS AND TERRORISM IN EMERGING COUNTRIES
Published 2018-12-01“…Results suggest that emergingcountry authorities should increase security precautions to ensure thattourists feel safe and in order to attract more tourists, ceteris paribus.…”
Get full text
Article -
2996
Main street retail districts or shopping centers? comparing the preferences of low-income consumers
Published 2012-01-01“…While shopping malls received better evaluation on environment, infrastructure, variety of stores and security, the street districts were judged to be better regarding access and value. …”
Get full text
Article -
2997
Asymptotic analysis of American call options
Published 2001-01-01“…American call options are financial derivatives that give the holder the right but not the obligation to buy an underlying security at a pre-determined price. They differ from European options in that they may be exercised at any time prior to their expiration, rather than only at expiration. …”
Get full text
Article -
2998
Multiplicatively weighted Voronoi-based sensor collaborative redeployment in software-defined wireless sensor networks
Published 2022-03-01“…Large-scale deployment of mobile wireless sensor networks has been widely used in some dangerous and hostile urban security surveillance scenarios. As a new network architecture, software-defined networks was introduced into wireless sensor networks to form a new software-defined wireless sensor networks to solve the problem of balanced large-scale deployment of sensor networks and simplify the complexity of network management. …”
Get full text
Article -
2999
Legal Protection for Female workers in Indonesia (Study on the Rights of Female Workers in Tolitoli)
Published 2025-01-01“…The lack of guarantees for female workers' rights remains a significant issue in Tolitoli Regency, encompassing concerns such as equal pay, decent work, maternity leave, childbirth and breastfeeding rights, social security, and protection against discrimination. This study, using a socio-legal approach with both qualitative and quantitative methods, finds that labor laws protecting female workers have not been fully implemented. …”
Get full text
Article -
3000
Characteristics of Professional Formation’s Indicators of Managers of the System of the Ministry of Internal Affairs of Ukraine
Published 2021-07-01“…The problem of professional and personal formation of managers of the security and defense sector of Ukraine has been studied. …”
Get full text
Article