Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3861
Rural Women’s Cooperatives and Family Standard of Living in Rwanda: A case of Urugero Cooperative in Gatsibo District.
Published 2020“…The study was guided by three specific objectives namely: to study how women cooperatives’ support to farming has improved food production, family nutrition and food security, to explore the role of family and political education supported by cooperatives in women empowerment, community harmony and more accountability by public and community leaders and to investigate the relationship between increase of family assets and rural women’s cooperatives’ support to agriculture, trading and family education in Gatsibo district. …”
Get full text
Thesis -
3862
-
3863
-
3864
Advanced Automotive Fault Diagnosis : automotive technology : vehicle maintenance and repair /
Published 2017Table of Contents: “…In-car entertainment security and communications - 8.9. Diagnostics - ice, security and communications - 8.10. …”
View in OPAC
Book -
3865
Evaluation of Ecological Resilience of Agricultural Ecosystems in Razavi Khorasan Province: Comparison of Integrated and Non-Integrated Ecosystems
Published 2025-12-01“…The intensification of climate change caused by global warming and its consequences, including the occurrence of long droughts, floods and other natural disasters, have threatened the food security of subsistence farmers and smallholders in the first place, and the food security of large communities in the long run. …”
Get full text
Article -
3866
A Model for Bank Management Performance Appraisal with the Advanced Technologies Approach (Meta-Synthesis Method)
Published 2024-12-01“…The growth of knowledge and information technology security are increasing in developing countries because information and communication technology (ICT) plays a vital role in globalized economic scope. …”
Get full text
Article -
3867
Pengaruh Metode Pendidikan Sebaya terhadap Tingkat Pengetahuan Tentang Pemeriksaan Payudara Sendiri (SADARI) Pada Remaja Putri Di SMA Negeri 1 Kubu
Published 2022-10-01“…The population of this study were young women who activly members of the Student Union and School Security Patrol namely 41 young women. Taking samples using total sampling, so amounted to 41 young women. …”
Get full text
Article -
3868
Metabolomics profiling reveals p-aminobenzoic acid enhances resistance to Fusarium head blight in wheat
Published 2025-02-01“…Abstract Fusarium head blight (FHB) not only causes severe yield losses but also mycotoxin contamination in wheat, posing a serious threat to food security and public health. The mechanisms of resistance to FHB in wheat are critical for effective prevention and control of the pathogen. …”
Get full text
Article -
3869
A Review of Multi-Source Data Fusion and Analysis Algorithms in Smart City Construction: Facilitating Real Estate Management and Urban Optimization
Published 2025-01-01“…We found that multi-source data, including sensors, social media, citizen feedback, and GIS data, face challenges such as data quality and privacy security when being fused. Data fusion algorithms are diverse and have their own advantages and disadvantages. …”
Get full text
Article -
3870
The Implementation of Unified Application Data Collection and Analysis in Tobacco Enterprise Platform Design
Published 2022-01-01“…Based on the unified mobile application data collection method, this paper analyzed and analyzed the design of application architecture in the tobacco enterprise platform and further described the business functions, security performance, and system characteristics of the platform.…”
Get full text
Article -
3871
Legal principles of international cooperation of the National Police of Ukraine with foreign law enforcement agencies
Published 2023-12-01“…Law enforcement activity is no exception, since its effective implementation is a guarantee for ensuring the formation of a security space both on the territory of the state and on its borders. …”
Get full text
Article -
3872
The Dietary Use of Pigeon Pea for Human and Animal Diets
Published 2022-01-01“…Huth] plays an important role in preserving poor smallholders’ major source of income in the tropics and subtropics by improving food and feed security, particularly protein intake. In the meantime, protein deficiency is frequent in tropical and subtropical regions due to rapidly increasing human populations and the high cost of animal-origin proteins. …”
Get full text
Article -
3873
Blinding HT: Hiding Hardware Trojan signals traced across multiple sequential levels
Published 2022-01-01“…However, there may be Hardware Trojans (HTs) in IP cores, which will cause critical security problem. There are already many HT detection methods which claim to detect all publicly available HT benchmarks. …”
Get full text
Article -
3874
Research Methodology and Management on Transport: Main Issues at the Final Stage of Russian Transport Sector Reforms
Published 2017-09-01“…It includes substantive formulation of scientific problems, the tracking and proactive evaluation of negative trends from the point of view of economic and national security in the transport of modern Russia. banking crises have serious consequences for the economy. …”
Get full text
Article -
3875
Enhancing the Spatial Resolution of Sentinel-2 Images Through Super-Resolution Using Transformer-Based Deep-Learning Models
Published 2025-01-01“…Satellite imagery plays a pivotal role in environmental monitoring, urban planning, and national security. However, spatial resolution limitations of current satellite sensors restrict the clarity and usability of captured images. …”
Get full text
Article -
3876
RISKS REDUCING THROUGH INTELLIGENT HEADLIGHT MANAGEMENT: OPTIMIZING Q-LEARNING FOR ELECTRIC VEHICLES
Published 2024-09-01Get full text
Article -
3877
MEDIA IN AN ERA OF DIGITAL GLOBALIZATION: THE ETHICAL PERSPECTIVES
Published 2024-07-01“…One of the primary ethical concerns in the digital age is the safeguarding of individual privacy and data security. The collection, storage, and utilization of personal data by corporations, governments, and online platforms have raised significant ethical dilemmas. …”
Get full text
Article -
3878
Conceptual basis of international jurisdiction
Published 2024-06-01“…These concepts reflect the goal of international criminal justice, which is the inevitability of punishment for serious violations of international law, since their commission threatens the security of all humanity.…”
Get full text
Article -
3879
Research on Public Administration and Resource Allocation Based on Blockchain and Structured Occupational Therapy
Published 2022-01-01“…On the basis of summarizing and analyzing the previous published literatures, this study expounded the research status and significance of public administration and resource allocations; elaborated the development background, current status and future challenges of blockchain, and structured occupational therapy; introduced the methods and principles of data quality collaboration model and multiparty collaboration standard management; analyzed the case background of public administration and resource allocation in the prevention and control of the COVID-19 epidemic; discussed the public administration mechanism based on blockchain and structured occupational therapy; established a resource allocation method based on blockchain and structured occupational therapy; fathomed the role of the distributed ledger established by blockchain to increase the information symmetry of public administration activities; proposed a blockchain-established special machine trust for resource allocation; and finally, anatomized the data security sharing and access control mechanism based on blockchain and structured occupational therapy. …”
Get full text
Article -
3880
The role of religious brand community support to increase value co-creation in market religio-centric
Published 2024-06-01“…This study found that the role of RBCS in forming ethical perceptions regarding online shops can provide a sense of security, keep promises, and provide good service recovery. …”
Get full text
Article