Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3221
Thomas Dallery, Le divorce rentabilité/croissance dans le capitalisme financiarisé. Changements de régimes, équilibres, instabilités et conflits
Published 2011-06-01“…The macroeconomic realisation of profits being determined by capitalists’ spendings, the slowdown of accumulation cannot come (theoretically) with a profitability recovery, others things being equal.After having recalled, in a first chapter, that financialisation is only the last avatar of a long trend for capitalism to escape from real economy, we show, in a second chapter, that financialisation leads, for the individual firm, to a reorientation towards shareholders’ profitability claims at the expense of managers and capital accumulation, financial (indebtedness) and real (capacity utilisation) security, and also of workers (real wage).After having faced, in a third chapter, two methodological, embarrassing questions for kaleckian models of growth and distribution (not very plausible and unstable for the most plausible ones), we use, in a fourth chapter, a second macroeconomic approach (stock-flow consistent model) where conflict impacts distribution (conflict inflation) and accumulation (growth/profit trade-off). …”
Get full text
Article -
3222
-
3223
Japan’s Foreign Policy Shifting in 2022
Published 2024-07-01“…This article examines Japan's significant foreign policy changes in 2022, focusing on three crucial documents: the National Security Strategy (NSS), the National Defence Strategy (NDS), and the Medium-Term Defence Force Buildup Program (MTDP), issued on December 6, 2022. …”
Get full text
Article -
3224
Morphological and molecular characterization of Stenocranus pacificus (Hemiptera: Delphacidae) on maize plants
Published 2024-11-01“…Additionally, maize contributes to food diversification and security. One of the main threats to maize production is pest attacks, including Stenocranus pacificus and Peregrinus maidis. …”
Get full text
Article -
3225
Impact of pavement on increasing social interactions in urban spaces of Bojnourd (Case study: Taleghani Street, Shahid Square to Telecommunication Area)
Published 2019-09-01“…According to the results, the most important independent variables in these three categories (physical, cultural and environmental) (security priorities, accessibility, passages, economic functions, urban environment, quality of social environment, social interactions Cultural activities, urban amenities, and recreational and lighting functions have the least impact.…”
Get full text
Article -
3226
DEVELOPMENT OF SALARY CARDS IN THE SYSTEM OF CASHLESS PAYMENTS IN CONDITIONS OF FINANCIAL INSTABILITY ON THE EXAMPLE OF SBERBANK OF RUSSIA
Published 2020-09-01“…As a result, the main directions for the development of salary projects have been proposed, including the definition of incentive provisions for their application, ensuring security, confidence in salary projects and contactless payment, regulating the risk of occurrence of accounts payable and accounts receivable between business entities, the need to modernize individual banking service, formation of innovative salary cards.…”
Get full text
Article -
3227
Phytotoxicity of Natural Molecules Derived from Cereal Crops as a Means to Increase Yield Productivity
Published 2022-01-01“…Plants with allelopathy activities derived from secondary metabolites could be an alternative strategy and have an expected function in sustainable weed biocontrol and boost global agricultural production and food security. Thus, protecting biodiversity, ensuring food safety, improving food, and nutrient quality, as well as crop production, are urgently needed as population and consumption are increasing. …”
Get full text
Article -
3228
Société du risque, environnement et potentialisation des menaces : un défi pour les sciences sociales
Published 2019-12-01“…The lack of reflexivity, of innovation and explorative capacity, the emergency and emotion tyranny result in the amplification of threats and fears and the activation of security and identity discourses which, instead of mobilizing energies, paralyse them, amplifying the sideration. …”
Get full text
Article -
3229
Review on Cement Stabilization/Solidification of Municipal Solid Waste Incineration Fly Ash
Published 2018-01-01“…Municipal solid waste incineration (MSWI) fly ash must be treated properly prior to being disposed in the security landfill due to its serious pollution toxicity. …”
Get full text
Article -
3230
The Potential of Lignocellulosic Biomass Hydrolysates for Microbial Oil Production Using Yeasts and Microalgae
Published 2024-01-01“…The use of food-based biomass and arable land for bio-oil and biofuel production could compromise global food security. Therefore, renewable and environmentally friendly oils for biofuels from oleaginous microorganisms such as yeasts and microalgae (heterotrophic and mixotrophic) are gaining interest within the scientific community. …”
Get full text
Article -
3231
The Relationship Between Determinants of Shopping Sites and Customer E-Trust, Purchase Intention, Satisfaction, and Repurchase
Published 2021-11-01“…In this research, questionnaire method was applied on 321 participants and findings shows that image, interface, security, and privacy sub-dimensions of web determinants effect positively and meaningful purchase intention, customer satisfaction, and repurchase of customers. …”
Get full text
Article -
3232
Distributed Power Trading System Based on Blockchain Technology
Published 2021-01-01“…The traditional centralized power trading model has some problems, such as low data security and trust crisis of regulators. Blockchain technology provides prominent ideas for solving these problems. …”
Get full text
Article -
3233
Driver identification in advanced transportation systems using osprey and salp swarm optimized random forest model
Published 2025-01-01“…Abstract Enhancement of security, personalization, and safety in advanced transportation systems depends on driver identification. …”
Get full text
Article -
3234
Binary Image Data Hiding Using Matrix Encoding Technique in Sensors
Published 2013-11-01“…It is very important to protect the copyright of digital images in wireless transmission, because people often use a smart phone in their daily life. Traditional security schemes are computationally expensive, and they introduce overhead, which shortens the life of the image sensors. …”
Get full text
Article -
3235
Chemical Composition and Nutritional Value of Three Sonchus Species
Published 2022-01-01“…The availabilities of these vegetables together with their high nutritional value are important factors that contribute to ensuring food security for families that have these species in their diet.…”
Get full text
Article -
3236
The role of agriculture in Nepal's economic development: Challenges, opportunities, and pathways for modernization
Published 2025-01-01“…These problems prevent agriculture from realizing its full potential to advance economic development, reduce poverty, and provide food security. Modernization requires increasing productivity through mechanization, expanding infrastructure, and improving market accessibility. …”
Get full text
Article -
3237
Russia vs America cyber war: space technology mastery competition
Published 2024-10-01“…In the context of cyber warfare, Russia and the United States are trying to modernize their technology to secure their countries in the event of an attack from the opposing party. …”
Get full text
Article -
3238
Study on the evolving role of the People’s Republic of China in resolving the conflict in the Islamic Republic of Afghanistan
Published 2022-01-01“…The People’s Republic of China’s strategy in the region has been defined and attention has been paid to security issues.Beijing’s envisaged steps to promote its projects in the region have been presented.…”
Get full text
Article -
3239
Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks
Published 2014-01-01“…However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). …”
Get full text
Article -
3240
The Actual Problems of Modern Spain
Published 2014-12-01“…Spain increases its role in world politics and obtains a non-permanent UN's Security Council seat for the 2015-2016 term.…”
Get full text
Article