Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3681
Genesis of the Institute of Interaction of the State Border Guard Service of Ukraine with Other Law Enforcement Agencies
Published 2019-12-01“…The article is focused on the research of historical aspects of interaction between the State Border Service of Ukraine with other law enforcement agencies of Ukraine, which is conditioned by the importance of the tasks assigned to the State Border Service of Ukraine on the security and protection of the state borders, especially in the current conditions of integration of the state into the European space, by reforming a number of law enforcement agencies of Ukraine, the creation of new law enforcement structures and, accordingly, the need to improve existing or establish new cooperation mechanisms of interaction between the above entities. …”
Get full text
Article -
3682
Customs institutions development strategy: design and implementation issues
Published 2022-05-01“…The aim of the study was to analyse the existing approaches and methodological support used to research and develop strategic planning documents on national (economic) security of the Russian Federation, and to substantiate proposals and approaches to the design of strategies and programmes for the development of public administration and administration institutions in terms of foreign economic and customs activities. …”
Get full text
Article -
3683
Quantization Effects on Zero-Dynamics Attacks to Closed-Loop Sampled-Data Control Systems
Published 2025-01-01“…This paper focuses on cyber-security issues of networked control systems in closed-loop forms from the perspective of quantized sampled-data systems. …”
Get full text
Article -
3684
Recognition of Reconstructed Frontal Face Images Using FFT-PCA/SVD Algorithm
Published 2020-01-01“…Modern face recognition modules/algorithms have been successful in many application areas (access control, entertainment/leisure, security system based on biometric data, and user-friendly human-machine interfaces). …”
Get full text
Article -
3685
International organisations on national politics: Council of Europe effects on political party in Turkiye
Published 2024-08-01“…These headings are examined with the help of graphics as 8 subcategories: “law”, “fundamental rights and freedoms”, “foreign policy”, “public administration”, “fight against corruption”, “democracy”, “labour and social security” and “family and social policies”. Among these, “law” and “fundamental rights and freedoms” categories stand out as the most emphasized issues in the context of the CoE for both parties. …”
Get full text
Article -
3686
Amazonia in Brazilian military thought: Army and Navy conceptual frameworks and strategic actions in the 90s
Published 2020-09-01“…The end of the Cold War and the rise of new issues in the regional security agenda such as drug trafficking and the environment, led the Brazilian military to rethink its defense strategy, developing new hypotheses of regional conflict which included the potential participation of extra-continental powers.…”
Get full text
Article -
3687
Russia’s Policy in the Sphere of External Labor Migration: Management Problems
Published 2017-06-01“…Taking into account the need to balance national security interests and supported by loyal Russian foreign political elites, the author proposes to separate the management of migration on the field of law enforcement and socio-economic part, which requires a political decision of government institutions. …”
Get full text
Article -
3688
Public Diplomacy in EEU Region: Understanding the Phenomenon and its Development
Published 2015-10-01“…Such resources strengthen humanitarian cooperation, good-neighborly relations and security atmosphere in the nearest regions.…”
Get full text
Article -
3689
POLITICAL DIALOGUE AS THE BASIS OF FOREIGN POLICY: A CASE STUDY OF MODERN RUSSIAN-GERMAN RELATIONS
Published 2014-06-01“…Political dialogue helps to form the basis for cooperation between states to ensure the security, political and socio-economic stability of countries. …”
Get full text
Article -
3690
Economic Potentials and Use Dynamics of Sorghum Food System in Ethiopia: Its Implications to Resolve Food Deficit
Published 2022-01-01“…Therefore, this crop is used to ensure productivity, food security, and availability of food when other crops fail and food deficit and famine are affected in the region. …”
Get full text
Article -
3691
ARCTIC DEVELOPMENT VECTOR OF NORTH-EASTERN FEDERAL UNIVERSITY NAMED AFTER M.K. AMMOSOV
Published 2016-12-01“…The active processes of strengthening of the international contacts and interaction among the Arctic States in theeconomy, in the field of scientific research, security, cultural and educational exchange take place in Arctic now. …”
Get full text
Article -
3692
Redesigning the Serpent Algorithm by PA-Loop and Its Image Encryption Application
Published 2023-01-01“…The proposed method is simple and speedy in terms of computations, meanwhile it affirms higher security and sensitivity. In contrast to GF, PA-loop are non-isomorphic and have several Cayley table representations. …”
Get full text
Article -
3693
Vulnerability Testing and Analysis on Websites and Web-Based Applications in the XYZ Faculty Environment Using Acunetix Vulnerability
Published 2024-12-01“…This study examines the security level of the Integrated website and application within the Faculty of Medicine, Universitas Andalas (Fakultas XYZ) environment, utilizing the Acunetix Web Vulnerability Scanner tool. …”
Get full text
Article -
3694
The forgotten factor: Exploring consumer perceptions of artificial intelligence in the food and agriculture systems
Published 2025-06-01“…Conversely, concerns over privacy, data security, and potential job displacement contribute to hesitancy. …”
Get full text
Article -
3695
Space-Air-Ground Integrated Network for Disaster Management: Systematic Literature Review
Published 2023-01-01“…Our results indicate that several challenges are faced by disaster management systems such as hardware-based challenges, network-based characteristics and communication protocols related challenges, availability and accuracy of imagery data, and security and privacy issues.…”
Get full text
Article -
3696
Deep Learning-Assisted Short-Term Power Load Forecasting Using Deep Convolutional LSTM and Stacked GRU
Published 2022-01-01Get full text
Article -
3697
-
3698
Causes of Wars and Their Role in Social Evolution: Generalization of Modern Concepts
Published 2024-12-01“…Weber and M. Mann: power-security, power-dominance, prestige-dignity-legitimacy, and wealth-resources-access to resources. …”
Get full text
Article -
3699
-
3700
Evaluation of Housing Quality Indicators Using Analytic Network Process (ANP)
Published 2025-03-01“…Subsequently, after evaluating the indicators using the ANP model, the results indicate that among the examined indicators, housing facilities and amenities with 0.318, housing security with 0.218, housing comfort with 0.145, compatibility with complementary uses with 0.142, housing durability with 0.109, and housing climate adaptation with 0.065 have been assigned the highest weights, respectively.…”
Get full text
Article