Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3501
Digital Technology Empowers Grain Supply Chain Optimization Simulation
Published 2021-01-01“…The issue of the balance of food supply and demand has always been the main issue of national and even world food security. There are many factors that affect food supply and demand, and the factors are interrelated. …”
Get full text
Article -
3502
Christianity, ‘supernatural’ beliefs and COVID-19
Published 2023-06-01“…The paper concludes that the pervasive influence of church leaders and their emphasis on spiritual remedies such as prayer and miracles may have given Pentecostal followers a false sense of security, which might have affected their awareness of COVID-19. …”
Get full text
Article -
3503
DETECTING WEB-BASED BOTNETS USING A WEB PROXY AND A CONVOLUTIONAL NEURAL NETWORK
Published 2020-09-01“…Botnets are increasingly becoming the most dangerous threats in the field of network security, and many different approaches to detecting attacks from botnets have been studied. …”
Get full text
Article -
3504
Artificial Intelligence Bias and the Amplification of Inequalities in the Labor Market
Published 2024-06-01“…We assess these threats by studying data from various labor fields, including justice, security, healthcare, human resource management, and education.…”
Get full text
Article -
3505
Distributed Generation Integration in the Electric Grid: Energy Storage System for Frequency Control
Published 2014-01-01“…Transmission system operators are greatly concerned about the impact of RESs on the operational security and efficiency of their networks and more in general of the ENTSO-E interconnected system. …”
Get full text
Article -
3506
Becoming an Employer of Choice for Generation Z in the Construction Industry
Published 2025-01-01“…The findings reveal that Gen Z prioritizes respect, work–life balance, and job security, and values flexibility in work schedules and hybrid work environments. …”
Get full text
Article -
3507
REGIONAL COOPERATION ON THE BLACK SEA: ACHIEVEMENTS, PROBLEMS, PROSPECTS
Published 2013-12-01“…To summarize, the author concludes that , despite the development of cooperation in the region , there are problems in the formation of a comprehensive system of regional security and cooperation, so as major obstacles to the successful implementation of the plan of cooperation in the Black Sea region still remain .…”
Get full text
Article -
3508
Optimizing safety performance through risk-based modeling in Nigeria’s oil and gas sector
Published 2023-11-01“…The analysis highlighted key risks like inadequate infrastructure, valve and seal failures, security concerns, and oil spill risks, underscoring the need for targeted interventions to promote a safer working environment and reduce accident risks. …”
Get full text
Article -
3509
DIFFERING APPROACHES OF THE JAPANESE GOVERNMENT TOWARDS THE “HISTORY ISSUES”
Published 2016-02-01“…Given the fact that it was nevertheless received positively by Tokyo's main ally Washington and did not become an obstacle to political dialogue with Seoul and Beijing, the author suggests that S.Abe will continue step-by-step efforts to remove "historical issues" from the bilateral political and economic agenda with China and South Korea, as well as to erase the link between the necessity to issue apologies, characteristic of the Japanese diplomacy of the 1990s, and a strategy to a larger Japan's role in international politics and security.…”
Get full text
Article -
3510
LAMENT PSALMS, THE CHRISTIAN COMMUNITY AND GOVERNANCE IN CONTEMPORARY NIGERIA
Published 2023-08-01“…Thus, the need to further explore justification for the Christian community in mobilizing lament to ease distresses ushered in by contemporary security challenges, create awareness for justice and foster national cohesion. …”
Get full text
Article -
3511
Zero-Shot Traffic Identification with Attribute and Graph-Based Representations for Edge Computing
Published 2025-01-01“…Experimental results on IoT datasets demonstrate that AG-ZSL achieves exceptional performance in classifying both known and unknown traffic, highlighting its potential for enhancing secure and efficient traffic management at the network edge.…”
Get full text
Article -
3512
Particle Flow Analysis of Mechanical Properties and Failure Behaviour in Composite Rock Strata with Holes
Published 2021-01-01Get full text
Article -
3513
A novel RNN architecture to improve the precision of ship trajectory predictions
Published 2025-12-01“…Monitoring maritime transport activities is crucial for ensuring the security and safety of people and goods. This type of monitoring often relies on the use of navigation systems such as the Automatic Identification System (AIS). …”
Get full text
Article -
3514
The impact of a new coronavirus infection spread on the environment and on the public policy for environmental development
Published 2022-01-01“…The impact of COVID-19 pandemic on the current state of the environment and the environmental effects of this impact have been shown, the main challenges and threats to environmental security have been described, opportunities have been formulated in the current situation and can be used in the development of state environmental policy. …”
Get full text
Article -
3515
An Approach to Modeling the Impact of Traffic Incident on Urban Expressway
Published 2015-01-01Get full text
Article -
3516
The role of civil-military cooperation in contemporary United Nations peacekeeping operations: a case study of UNIFIL
Published 2025-01-01“…Through these activities, the CIMIC personnel influence the security of the unit and contribute to the success of the mission. …”
Get full text
Article -
3517
Production Constraints and Improvement Strategies of Cowpea (Vigna unguiculata L. Walp.) Genotypes for Drought Tolerance
Published 2021-01-01“…L) is an important leguminous crop largely grown by smallholder farmers in sub-Saharan Africa for food security and animal feed. The objective of this study was to review the production constraints and improvement strategies of cowpea genotypes for drought tolerance. …”
Get full text
Article -
3518
Presenting a Geomorphological Conceptual Model of Construction of bridges in urban floodway- river valleys
Published 2024-06-01“…The results indicate the capability and application of geomorphology in modeling and optimal location and construction of bridges, in order to create more security and welfare of citizens, reduce costs and prevent financial and human losses due to the destruction and improper location of such structures in an urban floodway- river valleys and other natural environments. …”
Get full text
Article -
3519
Quantitative evaluation of China’s public health emergencies response policies: a PMC index model approach
Published 2025-01-01“…Abstract Background In recent years, public health emergencies, such as the COVID-19 pandemic and Ebola outbreaks, have occurred with increasing frequency worldwide, posing significant threats to global public health security. Policies serve as the foundation and institutional framework for effective emergency responses. …”
Get full text
Article -
3520
Reflections about the sameness of human rights online and offline
Published 2024-01-01Get full text
Article