Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3561
Assessment of the living standard of elderly people and their well-being in a changing social environment
Published 2024-03-01“…Their poverty is determined by a decline in living standards and material security, rising inflation, and the high cost of medical care along with utilities. …”
Get full text
Article -
3562
Anattempt to rebuild the world "in the American way"
Published 2021-11-01“…The UN’s reform and the Security Council, where the three great powers primarily make decisions, are still questioned. …”
Get full text
Article -
3563
HUMAN RESOURCE MANAGEMENT PRACTICES AND POLICIES AND EMPLOYEE ORGANIZATIONAL COMMITMENT IN BOSNIA AND HERZEGOVINA COMPANIES
Published 2022-05-01“…The paper aimed at examining the impact of characteristics, organizational characteristics, and HRM practices focused on performance appraisal, job security, employee participation, and career planning on employee organizational commitment in BiH companies with more than 50 employees in four sectors. …”
Get full text
Article -
3564
Decline of post-neoliberal regionalism in South America: Weaknesses of “pink tide” political leadership on Defense policies
Published 2020-09-01“…Finally, evidence is provided that shows that domestic variables played a crucial role in accounting for the demise of this new regional security model. Structural internal weaknesses within the regional States also played a major part in limiting the capacity of political leaders to sustain their control over Defense policies. …”
Get full text
Article -
3565
Consumer Protection in TikTok Shop Sale Transactions Based on Law Number 8 of 1999
Published 2024-12-01“…The law provides fundamental rights for consumers, such as the right to security, accurate information, and compensation for non-conforming products. …”
Get full text
Article -
3566
Anomaly Detection in IoMT Environment Based on Machine Learning: An Overview
Published 2024-12-01“…One of the important areas that require online monitoring is medical imaging equipment, whose functional information is transmitted through the Internet of Things. Server security and intrusion prevention, along with anomaly detection, are critical requirements for these networks. …”
Get full text
Article -
3567
Reconfigurable Antenna Assisted Intrusion Detection in Wireless Networks
Published 2013-10-01“…The results show that the proposed scheme can add an additional layer of security that can significantly alleviate many vulnerabilities and threats in current fixed wireless networks.…”
Get full text
Article -
3568
Vehicle Attribute Recognition for Normal Targets and Small Targets Based on Multitask Cascaded Network
Published 2019-01-01Get full text
Article -
3569
Analysing the manipulation of the youths, election violence and democratic retrogression in South Africa
Published 2025-01-01“…Rather than replicating the character of the youths of the 1970s who fought for better education and life as well as the freedom of the black population during the dark days of apartheid, some youths have taken to drugs, election violence while others have become personal security to top politicians owing to difficult economic hardship. …”
Get full text
Article -
3570
Commissariats of Military Industry during the Great Patriotic War
Published 2015-04-01“…The price of enormous effort of labor, research and design teams, huge material and financial costs in the course of the prewar five-year plans in the Soviet Union was paid and incurred to create the military-industrial complex (MIC) - sector of social production, designed to provide security for the state in armed struggle. The core of the DIC were four industry: Commissariat of Aviation Industry (NCAP), the People’s Commissariat of ammunition (NBC) weapons Commissariat (IEC) and the People's Commissariat of the shipbuilding industry (NCSP), formed in accordance with the Decree of the Presidium of the Supreme Soviet on January 11, 1939 by separation of the People's Commissariat of Defense Industry of the USSR. …”
Get full text
Article -
3571
Digital currency of the Central bank in Russia and in the world: current status and development prospects
Published 2024-06-01“…Special attention is given to identifying such advantages of digital currencies over conventional ones as independence, security, transparency and the possibility of using smart contracts. …”
Get full text
Article -
3572
A Rare Case of Single-Rooted Mandibular Second Molar with Single Canal
Published 2020-01-01Get full text
Article -
3573
Oath-Taking, Peacebuilding and Conflict Resolution in Traditional African Society: The Izzi Example
Published 2024-12-01“…Over the ages, African men have continued to search for peace and security in their immediate environment. Hence, to ensure that man lives safely and peacefully, the forefathers of different African societies invented the culture of oath-taking as a means of survival. …”
Get full text
Article -
3574
Assessment the Vulnerability of Infrastructures in Ardabil City in terms of passive defense
Published 2017-03-01“…At the moment with regard to geopolitical and geostrategic situation of Iran, the existence of countless underground resources and the formation of ideological state, unfortunately, in urban areas of the country, especially in Ardabil ,because of its proximity to the border of northern and northwestern borders with knowledge of this particular situation, economic and infrastructural projects, Infrastructures and installations have been made without observing and interference of considerations and defense and security arrangements and have become a bare and significant available target for enemy and invading countries. …”
Get full text
Article -
3575
Exploring In-Network Computing with Information-Centric Networking: Review and Research Opportunities
Published 2025-01-01“…We review state-of-the-art advancements involving INC and ICN, addressing critical topics such as service naming, executor selection strategies, compute reuse, and security. Furthermore, we discuss key challenges and propose research directions for deploying INC via ICN, thereby outlining a cohesive roadmap for future investigation.…”
Get full text
Article -
3576
Optimizarea generării de itinerarii pentru ghizi turistici autonomi prin integrarea datelor în timp real în algoritmi genetici
Published 2024-12-01“…Research in the field of autonomous vehicles has made good progress in the last years, but mass adoption is unlikely to happen very soon due to, in most part, important ethical and security concerns. The authors consider that niche uses of autonomous vehicles are more likely to be researched and developed, since they can substantially make an immediate difference in specific applications. …”
Get full text
Article -
3577
Legal Protection of Innovations in the Regime of Commercial Secrets, Industrial Property: Comparative Analysis
Published 2020-06-01“…The legal regime of industrial property is a legal monopoly, as it provides the receipt of a security document (patent, declaratory patent). The trade secret regime is provided by a de facto monopoly, as it is ensured by the application of certain protective measures. …”
Get full text
Article -
3578
Identification of bald patches in degraded alpine meadows by UAV-based remote sensing and deep learning
Published 2024-12-01“…Alpine meadow patchiness is the starting point and an important feature of the formation of ‘Black Beach’ on the Tibetan Plateau, which directly threatens regional ecological security and economic development. Therefore, exploring an efficient, rapid and accurate method for identifying bald patches in degraded alpine meadows is of great significance for the dynamic monitoring and rational utilization in the grassland region. …”
Get full text
Article -
3579
Leveraging Deep Learning for Real-Time Coffee Leaf Disease Identification
Published 2025-01-01“…The findings lay the groundwork for the development of practical and efficient systems that can assist coffee growers in disease management, promoting sustainable farming practices, and food security.…”
Get full text
Article -
3580
Innovative strategies for pollution assessment in Northern Bangladesh: Mapping pollution areas and tracing metal(loid)s sources in various soil types.
Published 2025-01-01“…These results emphasize the need for stringent measures to reduce industrial emissions and remediate soil contamination in order to improve soil quality and food security.…”
Get full text
Article