Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3621
Risk Assessment of an Existing Metro Tunnel in Close Proximity to New Shield Tunnels following Construction
Published 2022-01-01“…The threshold of indicators in the existing tunnel structure risk assessment system was determined based on the tunnel function and structure security. Then, we described the membership vector determination method, weight vector determination method, and comprehensive evaluation vector processing method. …”
Get full text
Article -
3622
The effect of smart contracts (blockchain technology) on Jordan’s land registry and survey department for sustainable development
Published 2025-02-01“…The data, gathered through online surveys and analyzed via Partial Least Squares Structural Equation Modeling (PLS-SEM), reveals significant positive relationships between blockchain implementation facets—such as Security and Fraud Prevention, Efficiency and Automation, Regulatory Compliance, Transparency and Trust, and Accessibility and User Experience—and sustainable development outcomes. …”
Get full text
Article -
3623
Analysis of high-rise building safety detection methods based on big data and artificial intelligence
Published 2020-06-01“…The experiments in this article use the concept of big data to divide the system into modules such as data collection, data preprocessing, feature extraction, prediction model building, and model application in order to provide massive data storage and parallel computing services to form a security test system. The experimental data show that wireless sensor technology is applied to the inclination monitoring of buildings, and a monitoring system based on wireless inclination sensors is designed to enable real-time dynamic monitoring of buildings to ensure human safety. …”
Get full text
Article -
3624
Residual life prediction of defected Polypropylene Random copolymer pipes (PPR)
Published 2018-01-01“…Sudden overpressure is one of the most common problems in piping. It can affect the security of goods and the safety of people. In this context, we have performed tests of overpressures at the laboratory scale according to ASTM D1599 standard, on virgin and notched pipes, to characterize mechanically the fracture behavior of PPR pipes. …”
Get full text
Article -
3625
-
3626
THE EFFECT OF FINANCIAL DEVELOPMENT ON RENEWABLE ENERGY CONSUMPTION IN CAMEROON
Published 2024-05-01“…Our empirical results provide valuable insights into the best ways to deploy capital in the renewable energy sector, in order to provide customers with cost-competitive options, and to facilitate the implementation of policies that contribute to environmental sustainability and energy security. …”
Get full text
Article -
3627
Corruption as a Problem of Political Theory and Political Practice
Published 2015-12-01“…The present article names most important political consequences of corruption: shift of ideas from public development to the security of power of oligarchy, decrease of trust to the state, decrease of image of the country at the international arena, increase of its economical and political isolation, decrease of political competition. …”
Get full text
Article -
3628
The tip of an iceberg? Adult children’s experiences with parental suicidal behaviour in childhood
Published 2025-12-01“…This instability imposed significant emotional and practical responsibilities on the children, forcing them to sacrifice their own development and sense of security. Responsibility was characterized as a life lasting burden. …”
Get full text
Article -
3629
Energy Transition in Azerbaijan: Advantages of System Value Analysis and Strategic Role of the Global Climate Actors
Published 2024-12-01“…We argue that Azerbaijan's strategic engagement with the EU is crucial, as it serves as a means for Europe to bolster energy security and assist Azerbaijan in its political drive and strategy for transitioning to green energy. …”
Get full text
Article -
3630
Beyond Profession: The Impact of the Job on Probation Personnel
Published 2025-01-01“…While staff report deriving satisfaction from helping individuals break the cycle of crime and receiving positive feedback, they encounter challenges such as emotional labor, lack of professional recognition, and inadequate working conditions. Security concerns related to working with probationers were also emphasized. …”
Get full text
Article -
3631
An Analysis of the Legal Standard in the Fight Against Torture and Treatment of Prisoners under International Law: What Prospect for Application under Cameroonian Law?
Published 2020-02-01“…Cameroon in its compliance with the international standard set, has contributed enormously by enacting credible laws which varies from its constitution, criminal codes, and other relevant provision all in the aim of safeguarding and ensuring that this right should be treated with lots of human protection and security. Even though with efforts laid in place by the country through its various legal and institutional dispositions, prohibition and protection has continued to be considered as a nightmare, as we continue in experiencing violations of this fundamental right by those who were vested with the powers and competent in ensuring and securing this sacred right. …”
Get full text
Article -
3632
Optimal Pest Control Strategies with Cost-effectiveness Analysis
Published 2021-01-01“…Pest and plant diseases cause damages and economic losses, threatening food security and ecosystem services. Thus, proper pest management is indispensable to mitigate the risk of losses. …”
Get full text
Article -
3633
Advanced Facial Recognition Systems for Real-Time Embedded Applications
Published 2025-01-01“…Addressing mounting concerns in security and surveillance, this project aims to develop an advanced facial recognition system using a 2D detection approach. …”
Get full text
Article -
3634
CONTROVERSIAL ISSUES REGARDING THE EXTENSION OF THE “NEW START” TREATY: CAN THE USA AND RUSSIA PRESERVE EXISTING STRATEGIC ARMS CONTROL?
Published 2021-02-01“…Its expiration on 5 February 2021 is a top security challenge and indicates a possible new strategic arms race. …”
Get full text
Article -
3635
Additional sources of financing for the updated national development goals
Published 2025-01-01“…The main reasons were ensuring sustainable economic and social development of the RF, improving living standards and increasing the population, ensuring state and public security as well as strengthening state and economic sovereignty. …”
Get full text
Article -
3636
Advancements in genome editing tools for genetic studies and crop improvement
Published 2025-02-01“…The rapid increase in global population poses a significant challenge to food security, compounded by the adverse effects of climate change, which limit crop productivity through both biotic and abiotic stressors. …”
Get full text
Article -
3637
Management of abdominal pain: clinical guidelines of the Russian gastroenterological association
Published 2015-09-01Get full text
Article -
3638
Data Verification of Logical Pk-Anonymization with Big Data Application and Key Generation in Cloud Computing
Published 2022-01-01“…Anonymization of data is done at the point of collection in order to safeguard the data. More secure than K-Anonymization, Pk-Anonymization is the area’s first randomization method. …”
Get full text
Article -
3639
A DDoS Attack Detection Method Based on Hybrid Heterogeneous Multiclassifier Ensemble Learning
Published 2017-01-01Get full text
Article -
3640
RUSSIAN-SAUDIAN POLITICAL INTERACTION
Published 2017-11-01“…The general attitude of both sides towards ISIS and Jabha al-Nusra as a source of terrorism, regional instability and the challenge of international security does not remove the two main contradictions that divide Moscow and Riyadh – attitude toward the official Syrian regime and the Iran’s regional policy. …”
Get full text
Article