Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3281
Quantum Particle Swarm Optimization Extraction Algorithm Based on Quantum Chaos Encryption
Published 2021-01-01“…The bit error rate and similarity coefficient of the voice signal are extracted by testing the source voice signal SA1, SA2, and SI943 under different SNR, and the similarity coefficient, uncertainty, and disorder of the observed signal and the source voice signal SA1, SA2, and SI943 verify the effectiveness of the proposed speech signal extraction method and the security of quantum chaos used in speech signal encryption.…”
Get full text
Article -
3282
Energy policy of the Republic of Turkey: expansion in the Eastern Mediterranean
Published 2023-05-01Get full text
Article -
3283
Russia’s inventive activity in new technological trends
Published 2024-06-01“…Consideration of the relationship among the indicators can be used to make decisions in the field of intellectual property, which can contribute to the intellectual security of Russia and serve as a basis for technological independence.…”
Get full text
Article -
3284
Gazetecilik Yıllarında Bülent Ecevit ve Anti-Komünizm (1950-1961)
Published 2021-12-01“…Ecevit, who sees communism as a means for the Soviets' ambitions in Turkey and the world, and thinks that this will create a security threat, argued that the Soviets have ambitions on Turkey and that they use communism as an instrumental in this way. …”
Get full text
Article -
3285
A Survey of Farmers’ Perceptions on Maize and Sorghum Storage Duration and Level of Pest Infestations in the Case of Two Selected Districts of Jimma Zone, Ethiopia
Published 2021-01-01“…While in Ethiopia, like in other east African countries, Maize and sorghum were an important postharvest chain for food security and income sources for small-scale rural farmers. …”
Get full text
Article -
3286
The Conflict in Mali: Causes, Actors, and Challenges
Published 2025-01-01“…This essay examines the interconnected roles of local, regional, and international stakeholders in perpetuating the conflict, highlighting the need for a multifaceted approach to address root causes, rebuild governance, and foster sustainable peace through coordinated humanitarian, security, and developmental efforts. …”
Get full text
Article -
3287
Design and Performance of Solar PV Integrated Domestic Vapor Absorption Refrigeration System
Published 2021-01-01“…This technology might sound like a luxury on the surface, but they are in high demand to achieve food security. They can also help lifesaving vaccines to reach even the isolated parts of the world. …”
Get full text
Article -
3288
Fast Antinoise RFID-Aided Medical Care System
Published 2015-10-01“…We prove that our generated proof is reliable because it can resist most security threats and guarantee the integrity of the proof. …”
Get full text
Article -
3289
Business ecosystem sustainability management
Published 2022-06-01“…The development of research in the field of sustainable development of business ecosystems is related to the consideration of information security issues for agents of the digital economy.…”
Get full text
Article -
3290
East and West: global technological confrontation
Published 2023-10-01“…As China’s economy grows and its technological capabilities expand, the USA is increasingly concerned about the consequences of China’s rapid technological growth for national security, economic competitiveness and for global dominance of the USA. …”
Get full text
Article -
3291
İngiliz Konsolos James Henry Monahan’ın Raporlarında Bitlis Vilayeti (1896-1898)
Published 2020-06-01“…In our study, the famine in Bitlis province of 1896-1898 and the subsequent migration events, the tax issue, various debt systems applied within the province, the livelihoods of the people, security problems, the issue of Kurdish guards (bekdji) and the socio-economic structure of the province were examined in detail.…”
Get full text
Article -
3292
Analysis of renewable energy potential in the Asia-Europe geographical axis
Published 2023-12-01“…It also investigated the opportunities associated with renewable energy sources, such as energy security. …”
Get full text
Article -
3293
The Main Directions of Construction of Red Army in Days of the Great Patriotic War
Published 2015-02-01“…The current situation in the world draws public attention to the problems of building the armed forces and keeping their readiness to provide defense and security of the country. Rigid centralization of military construction in such collective bodies as the State Defense Committee, the General Headquarters of the Supreme Commander, determination and meticulous work of folk commissioners and the General Staff to identify areas of building and resource mobilization for the implementation of decisions taken can serve as a guide for solving similar problems in our days. …”
Get full text
Article -
3294
Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application
Published 2022-01-01“…A rise in working and studying from home, activities which depend on the Internet, and the exchange of data coupled with a lack of understanding about security for interacting in cyberspace have made cybersecurity one of the most pressing concerns today. …”
Get full text
Article -
3295
Understanding the Internet of Nano Things: overview, trends, and challenges
Published 2018-11-01“…It is concluded that technologies prevail current IoNT literature, applications are focused on health care, and there is no international standardization regarding privacy, security or architecture of nano-networks. …”
Get full text
Article -
3296
Spillover: From climate change to pandemics
Published 2025-01-01“…Animals and plants are themselves susceptible to die-offs and even extinction from infections, jeopardizing food security and health.Another unknown is whether the vast permafrost, now melting, could become a source of novel microbes that are pathogenic for humans.Travel, trade, and migration contribute to the global movement of human and animal pathogens and vectors. …”
Get full text
Article -
3297
O PROERD funciona? Notas a partir de estudo quase-experimental
Published 2020-01-01“…Empirical studies measuring results in the area of public security are still rare in Brazil, a circumstance that adds value to this work. …”
Get full text
Article -
3298
Protective Immunity against SARS Subunit Vaccine Candidates Based on Spike Protein: Lessons for Coronavirus Vaccine Development
Published 2020-01-01“…The recent outbreak of the novel coronavirus disease, COVID-19, has highlighted the threat that highly pathogenic coronaviruses have on global health security and the imminent need to design an effective vaccine for prevention purposes. …”
Get full text
Article -
3299
Comparative analysis of state support for agricultural producers in Russia and in the world
Published 2023-07-01“…In the conditions of the WTO member countries open markets, the world countries food security, including Russia, largely depends not only on the competitiveness of their own agriculture, but also on the support of their own agricultural sector commensurate with other states. …”
Get full text
Article -
3300
Research on Spam Filters Based on NB Algorithm
Published 2025-01-01“…Spam filtering is a crucial part of network security. As spam becomes more complex, traditional rule-based methods struggle to meet the needs of modern email systems. …”
Get full text
Article