Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3021
ACCESSIBILITY OF FINANCIAL INFORMATION IN RELATION TO CHANGES IN SIZE OF ENTITIES CAUSED BY THE COVID‐19 CRISIS
Published 2020-06-01“…The accessibility ofinformation is connected with the level of security of engaging in business activities. Makingchanges in the criteria of an entity’s inclusion as an SME and in its obligation to audit can be onesolution for the problem of insufficient information. …”
Get full text
Article -
3022
Class Precarity and Solidarity in Education
Published 2018-12-01“…These infrastructures provide important underpinnings of a universal basic security to be delivered through a social and solidarity economy. …”
Get full text
Article -
3023
Corneal crossed links: a new alternative in the treatment of ectasia
Published 2009-09-01“…Many reviewed articles prove the security and efficacy of this treatment. The confocal microscopy techniques have shown significant swelling and resistance of corneal stroma after this procedure. …”
Get full text
Article -
3024
The Floor is not the Ground
Published 2018-11-01“…Despite the categorical difference between transportation and logistics, narratives of quality, security and standards accompanied by specific spatial patterns, have infiltrated our everyday mobility infrastructures. …”
Get full text
Article -
3025
Developments in Border and Migration Management in the South East European Region
Published 2024-12-01“…This extra pressure led to difficulties in terms of effectively manage the borders and address arising border security issues. The study aims to realize an inventory of the measures, proposals and activities which had an impact on transnational institution building which focuses on migration and border management. …”
Get full text
Article -
3026
Public Value of Using Light Rail Transit Transportation at Palembang
Published 2024-11-01“…Additionally, the LRT meets public expectations by offering a suitable route network, planning fleet capacity effectively, establishing consistent departure times, and ensuring high security across its operations. In conclusion, the Palembang LRT system enhances travel comfort with regular scheduling and adequate facilities, highlighting its potential as a key component of Palembang's sustainable urban transportation infrastructure with continued development.…”
Get full text
Article -
3027
Face Recognition using Deep Learning and TensorFlow framework
Published 2023-12-01“… Detecting human faces and recognizing faces and facial expressions have always been an area of interest for different applications such as games, utilities and even security. With the advancement of machine learning, the techniques of detection and recognition have become more accurate and precise than ever before. …”
Get full text
Article -
3028
Intentional Islanding of Active Distribution Networks by GenSets: An Analysis of Technical Constraints and Opportunities
Published 2023-01-01“…The willingness to improve the security and reliability of power supply to end-users, often pushed by prescriptions of national regulatory authorities, is bringing considerable challenges for distribution system operators. …”
Get full text
Article -
3029
Analysis of Laboratory Videos of Science Teacher Candidates with Many-Facet Rasch Measurement Model
Published 2019-07-01“…The simplest articles which science teacher candidates were subjected are “introducing yourself”, “using proper costume”, “appropriate time” and the articles for which the science teacher candidates are constrained mostly “sound-supporting effect”, “writing effect”, “warning for security precautions”.Jury numbered 3 or coded as J3 is “the most lenient” and scorer numbered 2 is “the severest” when juries are sequenced from the most lenient. …”
Get full text
Article -
3030
On Max-Plus Algebra and Its Application on Image Steganography
Published 2018-01-01“…The proposed method has been tested on many secret images, and the results are satisfactory which have a high level of strength and a high level of security and can be used in various operating systems.…”
Get full text
Article -
3031
Analisis faktor produksi terhadap kepuasan petani dalam mendorong ketahanan pangan di Sulawesi Selatan
Published 2024-07-01“…The aim of this study is to determine whether farmers' satisfaction with the use of production factors contributes to the success of the Food Security System (SKP) and to identify which production factors most significantly influence farmers' satisfaction in supporting SKP. …”
Get full text
Article -
3032
Financial Data Anomaly Detection Method Based on Decision Tree and Random Forest Algorithm
Published 2022-01-01“…The fast-developing computer network not only brings convenience to people but also brings security problems to people due to the appearance of various abnormal flows. …”
Get full text
Article -
3033
PREVENTING VIOLENCE CRIMES (KIDNAPPING, ARMED ROBBERY, BRIGANDAGE OR COMMUNITY MASSACRE) WITH DRONES: AN EFFECTIVE ALTERNATIVE TO VEHICULAR PATROLS IN NIGERIA
Published 2024-06-01“…Recommendations proffered include the need for strategic deployment of drones in all security formation in the country, adequate budgetary provision .training of manpower, comprehensive monitoring and adequate assessment and action on information and intelligence received from drones. …”
Get full text
Article -
3034
Digital Technology Adoption in the Agriculture Sector: Challenges and Complexities in Africa
Published 2023-01-01“…These include resource scarcity, limited expertise and training, a lack of digital infrastructure, data privacy and security concerns, and resistance by farmers. In spite of this, the agricultural sector in Africa has the potential to adopt technology and not only boost farm productivity but also engender sustainable and environmentally friendly farming. …”
Get full text
Article -
3035
Comparison Between Domestic and Hostile Applications of Wireless Sensor Networks
Published 2022-03-01“…This idea has boosted the success rate of different experiments in the fields of health, Finance, Security, etc. where simple factors like temperature, motion, smoke, pressure etc. are used to muster the required data. …”
Get full text
Article -
3036
Stability of password authentication in infocommunication networks
Published 2020-09-01“…It is shown that for social networks with a large number of users, widely used assessment of the security of password systems based on the calculation of the determination probability is not sufficient. …”
Get full text
Article -
3037
Artificial intelligence-based video monitoring of movement disorders in the elderly: a review on current and future landscapes
Published 2024-03-01“…This progression must incorporate data security, ethical considerations and adherence to regulatory standards.…”
Get full text
Article -
3038
Role of electric transport in urban transportation system
Published 2022-07-01“…Urban transport should solve the following tasks: equal access to the population to vehicles, the possibility of planning the time of traveling inside the city, ensuring environmental safety from the use of vehicles, creating the conditions for the availability of transport services at their cost, security and comfort, as well as ensure transport services for the business subjects at minimal economic costs. …”
Get full text
Article -
3039
BIBLICAL PERSPECTIVE OF THE RUSSIAN INVASION OF UKRAINE IN 2022
Published 2022-12-01“…As a result of these findings, the paper recommended that there must be an immediate demilitarization of Ukraine, NATO's equipment installations on the borders of Russia should be relocated; there must be a restoration of the natural status of Ukraine for the sake of peace, the continuous eastward expansion of NATO must be stopped; and Russian legitimate security interest must be unconditionally taken into consideration by the Western countries to avoid third world war …”
Get full text
Article -
3040
Cloud-Based Service for Fingerprint Image Matching
Published 2024-09-01“… Fingerprint matching is one of the most important services that related to the issue of identifying individuals, as it can be used to verify the validity of contracts, documents or in other security fields such as criminal investigations. Fingerprints are also one of the most common and accurate forms, as they are easy to obtain, it also has a unique features and cannot be identical to any individuals. …”
Get full text
Article