Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3601
Global sustainable development programs: Challenges to the achievement of the goals
Published 2024-09-01“…Meanwhile, failure to implement the SDGs is fraught with a sharp aggravation of the problems of global inequality, food security and climate migration, especially dangerous for the most vulnerable groups of the population. …”
Get full text
Article -
3602
SOIL COMPACTION AND ITS IMPACT ON SOIL PROPERTIES, MICROBIOME, GREENHOUSE GAS EMISSION AND PLANT ROOT GROWTH
Published 2024-06-01“…This comprehensive review paper contributes valuable insights for designing sustainable agricultural practices prioritizing soil health, ecosystem resilience, and food security.…”
Get full text
Article -
3603
Regulating Working Hours in the Transition to Flexible Work
Published 2024-12-01“…The findings offer recommendations for reforming Ukraine’s labor laws, aligning them with global trends, and advancing education in labor law and social security disciplines.…”
Get full text
Article -
3604
VALUE CHAIN IN AGRICULTURE: THE CASE OF THE EUROPEAN UNION
Published 2021-05-01“…Through a deduction method, certain conclusions were made about the state of the EU food system as well as demand and supply trends in order to provide a broader understanding of the food security and the significance of agricultural sector in general. …”
Get full text
Article -
3605
-
3606
ABOUT DATA MODELING SUBJECT DOMAINS PRACTICE-ORIENTED DIRECTION FOR UNIVERSAL SYSTEM OF STORAGE AND PROCESSING DATA
Published 2017-11-01“…Offered appropriate data models, considered relationship between them as data processing and data warehouse creation, which can be built on information data storage technology and which has some characteristics as extensible complex subject domain, data integration, which get from any data sources, data time invariance with required temporal marks, relatively high data stability, search necessary compromises in data redundancy, system blocks modularity, flexibility and extensibility of architecture, high requirements to data storage security. It’s proposed general approach of data collection and data storage, appropriate data models, in the future, will integrate in one database scheme and create generalized scheme of data warehouse as type «constellation of facts». …”
Get full text
Article -
3607
Covert Network Analysis for Key Player Detection and Event Prediction Using a Hybrid Classifier
Published 2014-01-01“…National security has gained vital importance due to increasing number of suspicious and terrorist events across the globe. …”
Get full text
Article -
3608
FARMERS-HERDERS CONFLICTS AND FOOD INSECURITY IN NIGERIA
Published 2024-05-01“…Furthermore, given the rise in tensions between farmers and herdsmen and the significant implications for the nation, the study recommends the Nigerian government enact stringent agricultural policies that support agricultural activities in order to ensure food security while also providing grazing lands for herders in their area. …”
Get full text
Article -
3609
Operational Risk Assessment of Distribution Network Equipment Based on Rough Set and D-S Evidence Theory
Published 2013-01-01“…Therefore, scientific assessment of power distribution equipment operation risk is significant to the security of power distribution system. In order to get the satisfactory assessment conclusions from the complete and incomplete information and improve the assessment level, an operational risk assessment model of distribution network equipment based on rough set and D-S evidence theory was built. …”
Get full text
Article -
3610
How to Develop Renewable Power in China? A Cost-Effective Perspective
Published 2014-01-01“…To address the problems of climate change and energy security, Chinese government strived to develop renewable power as an important alternative of conventional electricity. …”
Get full text
Article -
3611
Status of Biomass Derived Carbon Materials for Supercapacitor Application
Published 2017-01-01“…Environmental concerns and energy security uncertainties associated with fossil fuels have driven the world to shift to renewable energy sources. …”
Get full text
Article -
3612
A systematised review and evidence synthesis on the broader societal impact of vaccines against Salmonella
Published 2025-02-01“…Despite variations in study design, methodology, and study quality, salmonellae infections were largely associated with negative broader societal impacts, including detriments in childhood physical development (very weak association), childhood educational development (strong to very strong association), household security (moderate association), public health spending (moderate association), and national income (moderate to strong association). …”
Get full text
Article -
3613
FOREIGN AID TO UKRAINE AFTER 2014: VOLUMES, PROJECTS AND DONORS’ MOTIVATION
Published 2018-11-01“…While multilateral institutions tend to address the needs of Ukrainian economy by funding the reforms and infrastructure, donor states pay more attention to their long-term strategic and economic interests. They fund nuclear security and non-proliferation, support defense, law enforcement and border control agencies, encourage civil society and media development, consult agricultural sector and bilateral trade. …”
Get full text
Article -
3614
Missed, but Momentous: A Comprehensive Review of Neglected Tropical Skin Diseases in Southern India and their Global Impact
Published 2025-01-01“…By prioritizing NTD control in South India, we can collectively alleviate local suffering and contribute to global health security and equity, charting a course toward a healthier, more resilient world.…”
Get full text
Article -
3615
Optimal SES Selection Based on SVD and Its Application to Incipient Bearing Fault Diagnosis
Published 2018-01-01“…To distinguish the incipient fault of bearing before it steps into serious failure is the main task of condition monitoring and fault diagnosis technology which could guarantee the reliability and security of rotating machinery. The early defect occurring in the REB is too weak and manifests itself in heavy surrounding noise, thus leading to the inefficiency of the fault detection techniques. …”
Get full text
Article -
3616
Religious Investor Sentiment, Shariah Compliance Impact, and Theological Risk: Evidence from Bursa Malaysia
Published 2024-08-01“…Employing the market model in an event study approach and using data from Malaysian firms between 2000 and 2016, the study focuses on 30 announcements from the Security Commission Malaysia’s List of Shariah Compliant Securities (LSCS), resulting in 370 additions and 284 deletions from the compliance list. …”
Get full text
Article -
3617
Exploring Age and Gender Differences in ICT Cybersecurity Behaviour
Published 2022-01-01“…Older users appear less likely to secure their devices compared to younger users; however, the reverse was found for the other behaviours, with older users appearing more likely to generate secure passwords and show proactive risk awareness and regularly install updates. …”
Get full text
Article -
3618
Aerosolization of Water Ejected from a Full Container Impacted by Bomb Fragments
Published 2012-01-01Get full text
Article -
3619
Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version
Published 2015-01-01“…Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. …”
Get full text
Article -
3620
Evaluation of Blockchain Technology for Supply Chains using an Integrated Fuzzy Cognitive Map-QFD Methodology
Published 2024-06-01“…The results of this study show that the top priorities for blockchain characteristics in a supply chain are smart contract functionality, privacy, transaction per second, tokenization, security, permissioned network, scalability, cost, modularity, and licensing, in order of importance.…”
Get full text
Article