Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3421
Alert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks
Published 2011-01-01“…This is particularly important for security-related applications like intrusion detection and fire alarm systems. …”
Get full text
Article -
3422
Determinants of digital bank transformation: a systematic literature review with prisma and bibliometrics
Published 2024-11-01“…The determinants in the digital bank transformation process include the level of digitalization, application user growth, IT investment, IT committee, cyber security, and ecosystem stocks. The results of this literature review will be a reference for further research related to digital banks, in line with the rapid digital transformation process in banking.…”
Get full text
Article -
3423
Functions and Authorities of the Armed Forces of Ukraine on the Crime Scene
Published 2019-12-01“…It is emphasized that in order to ensure the implementation of the said functions of the Armed Forces of Ukraine, they have the right to take measures to restore the territorial integrity of Ukraine, as well as to provide comprehensive development of secure, economic, information, telecommunication, social and humanitarian infrastructure on the territories adjacent to the temporarily occupied territories in Donetsk and Luhansk to implement, in accordance with strategic defense planning documents, measures to strengthen defense and security capabilities of the country. …”
Get full text
Article -
3424
Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment
Published 2014-01-01Get full text
Article -
3425
Analysis of Climate Change from the Aliguodarz Region Farmers’ Viewpoint with an Emphasis on the Central District
Published 2013-11-01“…Therefore, it is necessary to predict or simulate this effect using various available tools in the field of management, to ensure consumer food security and the maximum welfare of producers, with the necessary planning and policy making. …”
Get full text
Article -
3426
Energy Efficient Partial Permutation Encryption on Network Coded MANETs
Published 2017-01-01“…Mobile Ad Hoc Networks (MANETs) are composed of a large number of devices that act as dynamic nodes with limited processing capabilities that can share data among each other. Energy efficient security is the major issue in MANETs where data encryption and decryption operations should be optimized to consume less energy. …”
Get full text
Article -
3427
The use of Telenomus remus (Nixon, 1937) (Hymenoptera: Scelionidae) in the management of Spodoptera spp.: potential, challenges and major benefits
Published 2022-01-01“…Abstract Spodoptera frugiperda (Smith, 1797) (Lepidoptera: Noctuidae), also known as fall armyworm (FAW) is a polyphagous pest which can cause significant losses and is considered a global threat to different crops and a risk to food security. Currently, in maize, the pest is predominantly controlled by pesticides or transgenic events. …”
Get full text
Article -
3428
Unveiling Islamophobia: navigating its presence in Sweden
Published 2025-12-01“…Political and media narratives often manufacture immigration as a social problem, framing the construction of meaning through the discourses of cultural differences as social, political and security problems. Of specific concern is how Muslims and immigrants from predominantly Muslim countries are perceived as the undesirable ‘Other’. …”
Get full text
Article -
3429
Amerika Birleşik Devletleri’nin NSC-68 Çerçevesinde Uyguladığı Soğuk Savaş Stratejisi ve Türkiye’ye Yansımaları
Published 2021-12-01“…In order to fight with this threat, the report number 68 (NSC-68) was prepared and implemented by the American National Security Council in 1950. In this study, in addition to the analysis of the NSC-68 which was one of the most significiant documents of the Cold War, its Cold War strategy implemented against the USSR and its relations with Turkey are examined accordingly. …”
Get full text
Article -
3430
Trust evaluation model of cloud user based on behavior data
Published 2018-05-01“…The user authentication can provide a certain degree of security, but when the user information was leaked, this method will not be effective. …”
Get full text
Article -
3431
-
3432
Operational Risk Assessment for International Transport Corridor: A Case Study of China-Pakistan Economic Corridor
Published 2019-01-01“…The risk management and control should focus on these three types of risks and strengthen the security management along the route. Strengthen policy docking and communication, maintain political stability, and strengthen antiterrorism cooperation.…”
Get full text
Article -
3433
Optimization tool for small hydropower plant resource planning and development: A case study
Published 2022-09-01“…In order to decrease carbon dioxide emissions, fight climate change, not being attached to fuel resources, and increase energy security while decreasing dependence on foreign countries, governments of many countries are increasing the share of renewable energy in electricity production and have taken actions to exploit their domestic resources, which is why renewable energy is an essential and important issue in today‘s world and also in the future it may continue to play a globally essential role. …”
Get full text
Article -
3434
Analysis of the Mechanism of Political Cost in the Complex Environmental Governance System
Published 2022-01-01“…The emergence of conflicts between environmental safety incidents and protection rights generates sizeable political costs, which endangers the legitimacy of the government as well as political security and stability. This article further examines the role of political costs in environmental issues. …”
Get full text
Article -
3435
Study on the Influence of Tectonic Stress on Stability of Horseshoe-Shaped Tunnels
Published 2021-01-01“…The numerical model of the tunnel is built by FLAC3D, and the influence of the magnitude and direction of structural stress on the horseshoe-shaped tunnel is studied in detail. Finally, the security support of the tunnel is discussed. Results show that the stress concentration phenomenon is easily focused on the left, right, and bottom sides of the tunnel; these places should therefore be the focus of attention of tunnel stability analysis. …”
Get full text
Article -
3436
-
3437
Armenia: an Uneasy Choice Between Russia's New Initiatives and the EU Eastern Partnership
Published 2014-02-01“…Deepened strategic cooperation with Moscow, first of all, provides military and energy security of Armenia, although the economic factor shouldn't be underestimated. …”
Get full text
Article -
3438
Advancing GAN Deepfake Detection: Mixed Datasets and Comprehensive Artifact Analysis
Published 2025-01-01Get full text
Article -
3439
ASSESSMENT AND ANALYSIS OF DIGITAL TRANSFORMATION OF REGIONAL ECONOMIC SYSTEMS OF THE RUSSIAN FEDERATION: METHODOLOGICAL APPROACHES AND THEIR APPROBATION
Published 2020-02-01“…A distinctive aspect of the proposed algorithm is the orientation of the developed tools to study the five main directions of digitalization, defined by the Order of the Government of the Russian Federation of July 28, 2017 (No. 1632-r): regulatory regulation, personnel for the digital economy, formation of research competencies and technological foundations, information infrastructure, information security. Based on the results of the study, the main qualitative and quantitative characteristics have been identified, that assess the development of the digital economy in the constituent entities of the Russian Federation at the present stage of development; a toolkit has been offered, that allows you to determine key areas of regional policy aimed at intensifying the processes of digitalization of business processes.…”
Get full text
Article -
3440
VALUE CHAIN IN AGRICULTURE: THE CASE OF THE EUROPEAN UNION
Published 2021-05-01“…Through a deduction method, certain conclusions were made about the state of the EU food system as well as demand and supply trends in order to provide a broader understanding of the food security and the significance of agricultural sector in general. …”
Get full text
Article