Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3061
Design of knowledge transaction protection mechanism in the open innovation community based on blockchain technology
Published 2025-03-01“…This paper proposes an approach that combines blockchain technology and an OIC, as blockchain technology provides a direction for solving trust and security problems in community platform transactions. …”
Get full text
Article -
3062
THE ETHICAL AND LEGAL ASPECTS OF HEALTH POLICY ON ELECTRONIC MEDICAL RECORDS IN INDONESIA
Published 2024-10-01“…The use of electronic medical records raises concerns about potential data leaks, necessitating the establishment of security measures and identification of responsible parties in case of breaches. …”
Get full text
Article -
3063
Participation of Citizens in Pre-Trial Hearings. Review of an Experiment in the Netherlands
Published 2014-10-01“…In 2011 the Dutch Central Appeals Tribunal, the highest Dutch court of appeal in legal areas pertaining to social security and the civil service, started consulting the parties of a dispute at an early stage in the procedure, in order to include them in the decisions about the procedural steps to be taken in the settlement of the appeal. …”
Get full text
Article -
3064
The Application and Analysis of Emotion Recognition Based on Modern Technology
Published 2025-01-01“…Despite the growing application of emotion recognition technology across various fields, including healthcare, traffic safety, and security, there remain significant challenges related to accuracy, robustness, and privacy. …”
Get full text
Article -
3065
A Method of Intrusion Detection Based on WOA-XGBoost Algorithm
Published 2022-01-01“…However, computer viruses and malicious network attacks make network security face huge challenges, and more accurate detection of attacks has become the focus of attention to current computer fields. …”
Get full text
Article -
3066
Armenia Towards a "New Economy": Defense Industry
Published 2021-04-01“…As a small country, Armenia needs an economy-army coalesced “intelligent” system that will respond adequately to any, even the slightest threat to the country's security. This approach requires the development of indigenous defense industry. …”
Get full text
Article -
3067
MILITARY INTERVENTIONSAND THE NIGERIA FOURTH REPUBLIC: A REFLECTION DISCOURSE
Published 2023-08-01“…The study recommends that there should be a conscious effort on the part of leaders of the nation to improve the socio-economic development of the country and more funding and training of the agencies/forces responsible for internal security. …”
Get full text
Article -
3068
Design of Mobile Gateway for Implementation of Smart Work System
Published 2015-01-01“…For this reason, I have developed a mobile gateway that is based on the communication server construction OPEN API development, management of mobile ID, protocol design, and design of SSL/TLS security tunnel. Also, we developed a smart work platform that you apply this, you are trying to provide information systems environment of mobile company.…”
Get full text
Article -
3069
Knowledge about Diabetes and Glycemic Control among Diabetic Patients in Saudi Arabia
Published 2020-01-01Get full text
Article -
3070
The Food Safety Modernization Act of 2011 – Proposed Rule for Preventive Controls for Human Food
Published 2014-09-01“…FSMA aims to ensure the safety and security of the US food supply by focusing on preventing food safety problems rather than responding after they occur. …”
Get full text
Article -
3071
EMPIRICAL ANALYSIS OF THE PROFITABILITY AND INDEBTEDNESS IN LISTED COMPANIES – EVIDENCE FROM THE FEDERATION OF BIH
Published 2015-11-01“… Research on relationship between profitability and indebtedness is an interesting scientific and professional question because it is the basic criterion of performance and security in business. The aim of this paper is to examine the and determine the level of correlation between profitability and indebtedness, and to research the differences in the level of regarding company's profitability. …”
Get full text
Article -
3072
Low Power Systolic Array Based Digital Filter for DSP Applications
Published 2015-01-01Get full text
Article -
3073
Marketing strategies of economic entities (on the example of persons carrying out activities in the field of customs business)
Published 2022-11-01“…In addition, the results can be useful in the educational process, when teaching such disciplines as Marketing and Economic security of an enterprise participating in foreign economic activity. …”
Get full text
Article -
3074
RADIO FREQUENCY DATA IDENTIFICATION TECHNOLOGY: POTENTIAL FOR USE IN FASHION INDUSTRY SUPPLY CHAINS
Published 2020-09-01“…The technology can be used to increase the transparency and security of supply chains, marketing research and in other areas. …”
Get full text
Article -
3075
Automata-Based Analysis of Stage Suspended Boom Systems
Published 2013-01-01“…A stage suspended boom system is an automatic steeve system orchestrated by the PLC (programmable logic controller). Security and fault-recovering are two important properties. …”
Get full text
Article -
3076
Enhanced Invisibility and Robustness of Digital Image Watermarking Based on DWT-SVD
Published 2022-01-01“…In research, a system is being developed to handle veracious types of watermarked attacks, for obtaining extreme security and an adequate level of visibility and robustness. …”
Get full text
Article -
3077
Topological Indices of the Pent-Heptagonal Nanosheets VC5C7 and HC5C7
Published 2019-01-01Get full text
Article -
3078
Éclairages foucaldiens sur l’incrimination du déisme et de la libre pensée dans la jeune République américaine
Published 2022-12-01“…Undermining deism thus hinged on security and sanitary discourses that associated religious infidelity with anarchy, criminality, and even insanity. …”
Get full text
Article -
3079
Analysis of the Time Series Generated by a New High-Dimensional Discrete Chaotic System
Published 2018-01-01“…In this study, a digital sequence generator based on a high-dimensional chaotic system is proposed to ensure performance and security. The proposed generator has low resource consumption, and the digital pseudo-random output sequence has a large period. …”
Get full text
Article -
3080
« Faire un tri dans le monde des applis »
Published 2018-12-01“…Results obtained on 50 applications deployed in France show that most of them do no achieve the objectives of the alert, in the sense defined by civil security, due to a single-hazard approach, a unique sense of communication, and a low participation of the smartphone users. …”
Get full text
Article