Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3661
Russia and the Issues of the Korean Peninsula
Published 2014-08-01“…It can be solved only by multilateral efforts for comprehensive solution combining security guarantees for North Korea and its abandonment of nuclear option.…”
Get full text
Article -
3662
Quantum Private Comparison Protocol with Cluster States
Published 2025-01-01“…In this paper, we introduce a quantum private comparison (QPC) protocol designed for two players to securely and privately assess the equality of their private information. …”
Get full text
Article -
3663
Obesity and overweight among the poor and marginalized in rural Mexico: impact analysis of the effect of school breakfasts on children aged five to eleven
Published 2023-05-01“…These findings highlight the need for a more comprehensive school breakfast program, that is connected to the food and nutritional security approach and is designed and implemented according to each Mexican region’s specific alimentary requirements and socioeconomic needs.…”
Get full text
Article -
3664
Stability of Bar Code Information Stored in Magnetic Nanowire Arrays
Published 2017-01-01“…Firmware applications such as security codes, magnetic keys, and similar products can be stored in magnetic bar codes similar to optical bar codes. …”
Get full text
Article -
3665
Effect of balanced nutrition intervention based on local food on young women of orang rimbo in Bukit Duabelas National Park, Jambi province
Published 2024-09-01“…The population of the Anak Dalam Tribe in Jambi Province is 200 thousand people who still live in the forests and around the TNBD forests at risk of experiencing malnutrition, including their teenage daughters, due to socio-economic status factors, limited access to health services, food security, family empowerment, and low levels of knowledge and education. . …”
Get full text
Article -
3666
Enhancing a Commercial Game Engine to Support Research on Route Realism for Synthetic Human Characters
Published 2011-01-01Get full text
Article -
3667
Development of the bank of russia’s fast payment system in modern conditions
Published 2024-10-01“…The potential of FPS in the context of ensuring the Russian payment infrastructure security represents an important direction for strengthening user confidence and system sustainability. …”
Get full text
Article -
3668
Mitigating Sinkhole Attacks in MANET Routing Protocols using Federated Learning HDBNCNN Algorithm
Published 2025-02-01“…In this study, Federated Learning is utilized to improve the security and privacy through empowering nodes to train the model deprived of distribution complex data. …”
Get full text
Article -
3669
Lived experiences of how the care relationship in primary healthcare contributes to recovery from stress-related disorders: a reflective lifeworld research study
Published 2025-12-01“…Conclusions Sensing security and hope is a crucial element in the care relationship in primary healthcare when recovering from stress-related disorders. …”
Get full text
Article -
3670
FARMER-HERDERS CONFLICTS IN NIGERIA: ITS CHALLENGES AND INTERVENTIONS
Published 2023-09-01“…The fight for peace in the north-central states, the fight against social insecurity and conflicts, must comprise determined action against food security, poverty, inequality, injustice, and against the most extreme and most dependence-inducing form of poverty - being hungry, insecure of today's and tomorrow's food. …”
Get full text
Article -
3671
Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing
Published 2014-01-01“…However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features. …”
Get full text
Article -
3672
Investment and Saving Among House Hold in Kabale District: A Case Study of Kitumba Sub-County Kabale District.
Published 2024“…Motives identified included retirement planning, economic development, income security, savings, precautionary measures, inheritance, employment, education, income levels, and social status. …”
Get full text
Thesis -
3673
The Effects of Economic Deprivation on the Welfare of Older Persons in Kabale District: A Case Study of Butanda Sub-County.
Published 2024“…To mitigate these impacts, the study suggested expanding social security schemes to non-civil servants, tailoring grants for older persons, and continuously providing skills training in productive ventures. …”
Get full text
Thesis -
3674
Design of a Maize Sieving Machine.
Published 2024“…Overall, this reciprocating maize sieving machine represents a significant advancement in post-harvest processing techniques, contributing to increased food security and sustainability in agriculture…”
Get full text
Thesis -
3675
Trends, contradictions, and patterns of functioning of interregional and inter-municipal cooperation institutions
Published 2025-01-01“…Among the patterns in the institutions development it is necessary to define their focus on functioning in the context of horizontal links globalization, growth of development sustainability and population mobility, digitalization and innovativeness, ensuring security on the basis of risk management, which implies legal integration and standards harmonization, intensive exchange of the best projects, activation of local authorities and population in projects implementation. …”
Get full text
Article -
3676
-
3677
INTERROGATING THE EFFECTS OF ARMED BANDITRY ON THE SOCIO-ECONOMIC DEVELOPMENT OF NIGERIA’S NORTH-CENTRAL REGION (2015-2022)
Published 2023-09-01“… Armed banditry has being a major security challenge confronting northern Nigeria in recent years. …”
Get full text
Article -
3678
-
3679
A-priori multi-objective optimization for the short-term dispatch of distributed energy resources
Published 2025-03-01“…In order to exploit the flexibility provided by distributed energy resources (DERs), a multi-objective optimization (MOO) approach is proposed to minimize the bus voltage deviations, the network losses, and the current security index. Effective linear power flow equations are included into both the objective functions and the inequality constraints of the MOO model, thus yielding benefits in terms of reduced model dimension and computational complexity. …”
Get full text
Article -
3680
Collective Agreement for Members of Slovenian Armed Forces: Reflections on Features of Collective Negotiations in the Public Sector for the Military Profession
Published 2014-12-01“…The most important European institutions, in terms of safety and protection of the rights in the European region, are following the trend of changes in the security environment, new tasks of the military organization, the changed nature of the military profession in the postmodern era, and defend the concept of the “citizen in uniform”. …”
Get full text
Article