Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3641
A collaborative management model as an effort for the conservation of native plants of Java’s mountains in Mount Merbabu National Park
Published 2025-01-01“…Communities participate in various activities such as protected area security, plant monitoring, nursery development, planting, and environmental education. …”
Get full text
Article -
3642
-
3643
An Overview of Global Wheat Market Fundamentals in an Era of Climate Concerns
Published 2017-01-01“…In addition to gradually and consistently increasing global wheat demand, these market drivers are posited to impact world prices and, ultimately, food security. To investigate how these factors differentially influence wheat markets, an extensive survey of literature regarding wheat market fundamentals was conducted, as well as a trend analysis using a uniquely compiled data set specific to significant wheat-producing areas. …”
Get full text
Article -
3644
Contracting account audit on social networks
Published 2022-01-01“…Social network account audit is an independent review of social network activities to express a professional opinion on the fulfillment of objectives, business compliance, and information security of orders on social networks. It is in principle a voluntary activity and is not subject to legal obligation like some other types of audit such as the audit of financial statements. …”
Get full text
Article -
3645
Complexities in Financial Network Topological Dynamics: Modeling of Emerging and Developed Stock Markets
Published 2018-01-01Get full text
Article -
3646
New Locked-Wire-Type External Fixator (the Ichi-Fixator) for Fourth and Fifth Carpometacarpal Joint Dislocation
Published 2018-01-01“…Linked external wire-type fixation enables enhanced security of fixation, facilitates postoperative mobilization, and may allow an immediate return to work.…”
Get full text
Article -
3647
New Generation of Smart Highway: Framework and Insights
Published 2021-01-01“…Several urgent problems in the current stage are pointed out in terms of system compatibility, standard specification, and information security. This paper provides new insights for sustainable and reproducible highway reformation, drawing some implications for NGSH design.…”
Get full text
Article -
3648
IF-MABAC Method for Evaluating the Intelligent Transportation System with Intuitionistic Fuzzy Information
Published 2021-01-01“…ITS can effectively employ the existing traffic facilities and ensure the safety of traffic, urban traffic, and public security management for effective control in order to satisfy people’s travel demand. …”
Get full text
Article -
3649
Spatial and temporal dynamics of agricultural land carrying capacity (LCC): A case study of Jombang District, Indonesia
Published 2025-01-01“…Agriculture becomes one of the essential sectors in supporting food security. Nevertheless, in many cases around the world, vast urbanization often leads to an imbalance of resource consumption and its carrying capacity including the land. …”
Get full text
Article -
3650
Infiltration of Small Arms and Light Weapons into Benue Valley and Its Impact on the Conflict Between Pastoralists and Farmers
Published 2023-07-01“…This problem is more pronounce in developing countries where there are porous borders and weak institutions responsible for border security like Nigeria. The proliferation and misuse of small arms and light weapons in the country is progressively complex and multifaceted phenomenon that affects people and insecurity. …”
Get full text
Article -
3651
Experimental Research on the Influence of Temperature on the Static Properties of Skarn
Published 2021-01-01Get full text
Article -
3652
The European Union's Mediterranean Policy in the Context of the "Arab Spring"
Published 2014-04-01“…While the EU Foreign Policy in the Mediterranean region was historically conditioned by the security interests of the European Union, it suffered from securitization/democratization dilemma. …”
Get full text
Article -
3653
Optical Image Encryption Using Devil’s Vortex Toroidal Lens in the Fresnel Transform Domain
Published 2015-01-01“…The use of a DVTL-based structured mask enhances security by increasing the key space for encryption and also aids in overcoming the problem of axis alignment associated with an optical setup. …”
Get full text
Article -
3654
The Mechanism of Safety Culture Construction in Chinese Universities Based on POI Data and Gravity Model
Published 2022-01-01“…With the development of social economy, the importance of safety culture has been recognized by the whole society. Campus security is not only related to the common interests of the campus teachers and students but also related to the fundamental interests of each individual in the campus. …”
Get full text
Article -
3655
IMPROVING INTRUSION DETECTION USING TREE ADJOINING GRAMMAR GUIDED GENETIC PROGRAMMING
Published 2017-09-01“…Nowadays, the problem of network security has become urgent and affect the performance of modern computer networks greatly. …”
Get full text
Article -
3656
Cloud Trust-Driven Hierarchical Sharing Method of Internet of Things Information Resources
Published 2021-01-01“…This paper sorts according to the value of the Internet information security model, obtains the optimal model to avoid human tampering, and designs the information resource acquisition process to ensure the reliability of the source data. …”
Get full text
Article -
3657
Analysis of the Thermal Characteristics of Surrounding Rock in Deep Underground Space
Published 2019-01-01“…With the development of society, the economy, and national security, the exploitation of deep underground space has become an inevitable trend in human society. …”
Get full text
Article -
3658
HUMAN RESOURCE MANAGEMENT PRACTICES AND POLICIES AND EMPLOYEE ORGANIZATIONAL COMMITMENT IN BOSNIA AND HERZEGOVINA COMPANIES
Published 2022-05-01“…The paper aimed at examining the impact of characteristics, organizational characteristics, and HRM practices focused on performance appraisal, job security, employee participation, and career planning on employee organizational commitment in BiH companies with more than 50 employees in four sectors. …”
Get full text
Article -
3659
INVESTIGATING THE COST EFFECTIVENESS OF BIODIESEL DISTRIBUTION IN INDONESIA
Published 2023-05-01“… The implementation of biodiesel in Indonesia has been regarded as one of the main strategies to improve country’s energy security equally and equitably. However, as the largest archipelago country in the world, the activity in distributing their biodiesel production bears a key problem. …”
Get full text
Article -
3660
<i>Heterotis niloticus</i> (African Bonytongue) Domestication: Potentials, Efforts, and Challenges
Published 2024-12-01“…Overcoming these challenges is essential to promote the full potential of <i>H. niloticus</i> aquaculture and contribute to improved food security. Future research should focus on refining breeding programs, improving water quality management, and exploring innovative aquaculture systems. …”
Get full text
Article