Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3301
School Leadership and the Civic Nationalist Turn: towards a typology of leadership styles employed by Head Teachers in their enactment of the Prevent Duty and the promotion of fund...
Published 2021-06-01“…Drawing on literature from school leadership, this research engages with head teachers in schools in England to explore the leadership styles they employ when enacting the requirements of the Counter-Terrorism and Security Act 2015 (Home Office, 2015) and the Teachers’ Standards (DfE, 2012) and navigating the civic nationalist turn. …”
Get full text
Article -
3302
Independent Component Analysis Based on Information Bottleneck
Published 2015-01-01Get full text
Article -
3303
The Use of Machine Learning Methods in Road Safety Research in Poland
Published 2025-01-01Get full text
Article -
3304
A Comprehensive Investigation of Fraud Detection Behavior in Federated Learning
Published 2025-01-01“…By addressing these challenges, FL can offer scalable, secure solutions for real-time fraud detection, ensuring the protection of sensitive financial data while enhancing detection accuracy across diverse data sources.…”
Get full text
Article -
3305
THE IMPACT OF DEMOGRAPHIC CHANGES ON THE PENSION SYSTEM FINANCING SUSTAINABILITY IN THE FEDERATION OF BOSNIA AND HERZEGOVINA
Published 2014-05-01“…According to long-term projections of the reformed pension system of the FBiH, the greater stability of initial and average pensions, as well as stable social security of pensioners, will result in a relatively stable share of pension expenditures in GDP, of about 10%. …”
Get full text
Article -
3306
Encoding and Decoding of Secret Messages Using Matrices.
Published 2023“…Due to the great need of security for passing sensitive information from one person to another or from one organization to another through electronic technology, there is need for cryptography as a solution to this problem. …”
Get full text
Thesis -
3307
Financial Inclusion and Women Empowerment in Uganda A Case of Lango Sub Region, Northern Uganda
Published 2018“…The study therefore recommended that Government should establish buffers to serve as collateral security for women who intend to secure financial credit. …”
Get full text
Article -
3308
Climate Smart Agriculture (CSA) for Sustainable Agriculture Nexus: A Tool for Transforming Food Systems
Published 2023“…CSA and SA share a common principal goal of achieving food security. It was concluded that developing countries are the worst affected by the negative impacts of climate change and don’t have the adaptive capacity to respond to climate change effects.…”
Get full text
-
3309
Diversity at Landscape Level to Increase Resilience. A Review
Published 2023“…Hence, building on these insights, diversity at landscape level is paramount to promoting resilient livelihoods as a means of improving the health and functioning of socio-ecological systems, as well as a mechanism for achieving food security. The study concludes that there should be involving many actors in a landscape management aspect to stimulate knowledge exchange and training.…”
Get full text
-
3310
Investigation of Storage and Retrieval of Records At Kisoro District Local Government.
Published 2024“…This inadequacy contributes to numerous challenges, including poor professionalism, untimely retrieval of requested records, and insufficient data security. The study recommended allocating more funds to the records section for overall maintenance. …”
Get full text
Thesis -
3311
Design and Simulation of an Optimized Reliable Microgrid System for Kabale University Using Solar and Battery Storage.
Published 2024“…The project highlights the potential of microgrids to enhance energy security, reduce costs, and promote environmental sustainability in educational institutions and similar settings facing energy challenges.…”
Get full text
Thesis -
3312
Genome-wide association studies with prolapsed gland of the third eyelid in dogs
Published 2025-01-01Get full text
Article -
3313
Analyzing Iran's Legislative Criminal Policy in Dealing with Environmental Terrorism, Emphasizing the Need for Criminalization and Preventive Measures
Published 2024-10-01“…Introduction: environmental security, is a necessary condition for the health and continuity of human life on earth and due to the vital, widespread and inevitable dependence of humans on the environment, if the environmental security is taken away and it is removed from the possibility of healthy living, as a result of the goal or the means of placing the environment, following environmental terrorism, with various methods such as polluting the natural and man-made environment with dangerous substances, extensive and irreparable damage is caused to human life and health And often, the most obvious effects of damage to the safety and health of the environment appear in the form of epidemics, and on the other hand, the cross-border effects of such actions and the possibility of transferring the said effects from through the flow of air or water or the carriers of disease agents to countries and regions beyond the place of the accident, and the possibility of spreading some of these effects on the life and health of future generations, reveals the seriousness of the danger of environmental terrorism, hence, The purpose of this thesis is to explain the vital necessity of legal, technical and specialized contrast, against environmental terrorism in the form of an efficient criminal policy with international interaction, with emphasizing the extent and irreparability of the effects caused by environmental terrorism, and the necessity and importance of preventive measures.Materials and Methods: In terms of the goal, the current research will cause expansion the legal theories and doctrine and complete the previous theories with the fundamental method of the research results, and also with the practical approach, effective practical solutions to deal with environmental terrorism will be presented, and on the other hand, the materials and information used in the research, They are collected with the library method and after collecting and categorizing the materials and information, with the descriptive-analytical method, the findings and the collected materials are analyzed logically and legally and they are used as the basis of citation to strengthen the approach of the researcher in the relevant subject.Results: In a comprehensive and efficient criminal policy to contrast against environmental terrorism, in addition to criminalizing this criminal phenomenon along with the real conceptology and in addition to recognizing its specific elements, it is expected that with the necessary criminal measures, specialized measures will be taken to identify and criminalize behaviors that it has a preliminary aspect to dangerous crimes, and it is possible that environmental terrorism is also committed through them, and therefore, in order to prevent this criminal phenomenon, criminalize such behaviors in the form of obstruction crimes seems necessary.Discussion: In Iran's criminal system, environmental terrorism has not been considered as an independent criminal behavior, with specific elements and specific conditions, However, due to the inherent of the behaviors related to environmental terrorism, this type of terrorism is inherently reprehensible, and as a rule, it can be included in various legal elements in the criminal laws, and on the other hand, due to the analogy of some elements of this criminal phenomenon with the destruction of the earth, According to jurisprudence, significant examples of environmental terrorism behaviors can be considered as examples of corruption in the land subject to Article 286 of the Islamic Penal Code (approved in 2012). …”
Get full text
Article -
3314
Stakeholder engagement for inclusive climate impact attribution studies
Published 2025-01-01Get full text
Article -
3315
Desain Layanan E-Surat untuk Desa Waru Barat, Pamekasan, Madura menggunakan QR-Code
Published 2021-11-01“…The functionality testing showed the application successfully generated e-certificate along with the unique QR Code to secure and maintain the validity of the document. …”
Get full text
Article -
3316
Les nouveaux modes de gestion de la proximité euromaghrébine
Published 2013-10-01“…As regards multilateral relationships, the failure of Europe-Mediterranean partnership fosters “5+5” dialogue, through which West-Mediterranean rimming countries try to strengthen bilateral and transnational relationships and to extend sub-regional cooperation imbued with security concerns. So doing, the “5+5” system indirectly helps restart the Union of Arab Maghreb. …”
Get full text
Article -
3317
Human-Vehicle Intersection Traffic Lights Timing Optimization Research
Published 2022-01-01“…The VISSIM software was used for traffic simulation, aimed at improving traffic volume and right-turning vehicle average speed for less vehicle queuing delays, less human-vehicle conflicts, and better security for pedestrians without excessive interruption on their street crossing efficiency. …”
Get full text
Article -
3318
ENVIRONMENT AND CONFLICTS IN NIGERIA: CAUSES AND TRENDS OF FARMERS – HERDERS CONFLICTS
Published 2023-12-01“… The nomadic pastoralists and sedentary farmers’ conflict is one of the reoccurring security challenges Nigeria. The constant insecurity and overbearing uncertainty which had come to characterise Nigeria’s existence compelled scholars to focus their attention on formulating an all- encompassing explanation of the phenomenon. …”
Get full text
Article -
3319
An Efficient and Lightweight Source Privacy Protecting Scheme for Sensor Networks Using Group Knowledge
Published 2013-04-01“…Providing source privacy is a critical security service for sensor networks. However, privacy preserving in sensor networks is a challenging task, particularly due to the limited resources of sensor nodes and the threat of node capture attack. …”
Get full text
Article -
3320
Islandora and TEI: Current and Emerging Applications/Approaches
Published 2013-06-01“…The Islandora framework is designed to ease the management of security and workflow for digital assets, and to help implementers create custom interfaces for display, search, and discovery. …”
Get full text
Article