Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3881
Digital Twin Hospital Buildings: An Exemplary Case Study through Continuous Lifecycle Integration
Published 2020-01-01“…Hospital buildings usually contain sophisticated facility systems and special medical equipment, strict security requirements, and business systems. Traditional methods such as BIM are becoming less capable of real-time updates of building status and big data volume. …”
Get full text
Article -
3882
-
3883
Strategic priorities and challenges in research software funding: Results from an international survey [version 2; peer review: 2 approved, 1 approved with reservations, 1 not appr...
Published 2025-01-01“…Results The survey revealed that funders place strong emphasis on developing skills, promoting software sustainability, embedding open science practices, building community and collaboration, advancing research software funding mechanisms, increasing software visibility and use, fostering innovation, and ensuring security. Conclusions The findings highlight opportunities to enhance research software’s role through increased funder attention on professional recognition for software contributions and the non-technical, social aspects of research software sustainability. …”
Get full text
Article -
3884
CAPITAL WITHOUT STATEHOOD: EMPIRICAL STUDIES IN STARAYA LADOGA, KASIMOV AND MYSHKIN
Published 2016-08-01“…Two major territorial bases of stateness are traditionally singled out: nation-building and threats to security or, in other words, mental boundaries marking of "Us" community and actualization of "Others". …”
Get full text
Article -
3885
Detection of Jihadism in Social Networks Using Big Data Techniques Supported by Graphs and Fuzzy Clustering
Published 2019-01-01“…Human resources departments can apply the power of profile identification to automatically classify candidates, security teams can detect undesirable clients in the financial or insurance sectors, and immigration officers can extract additional insights with these techniques.…”
Get full text
Article -
3886
Protection of constitutional values in the conditions of the Russian-Ukrainian war
Published 2024-06-01“…A special role belongs to the judicial system, which must ensure a balance between national security and the rights and freedoms of citizens. International support is also critical to strengthening legal stability and protecting democratic values. …”
Get full text
Article -
3887
Victims’ profile by firearm related injuries in the municipality of the state of Rio de Janeiro
Published 2015-07-01“…The study contribution is anchored in orientation to preventive actions to the local population as well as to the elaboration of security public policies and awareness for the participation to combat and minimize the collaborative indexes of the local urban violence.…”
Get full text
Article -
3888
A review of research progress on disease burden of foodborne aflatoxins
Published 2024-12-01Get full text
Article -
3889
Compressed Sensing-Based Order Analysis for Blade Tip Timing Signals Measured at Varying Rotational Speed
Published 2020-01-01“…Monitoring the vibrations of high-speed rotating blades is significant to the security of turbomachineries. Blade tip timing (BTT) is considered as a promising technique for detecting blade vibrations without contact online. …”
Get full text
Article -
3890
Route Selection of Multimodal Transport Based on China Railway Transportation
Published 2021-01-01“…The advantage of multimodal transport is that it can deliver the goods to their destination in a reasonable combination of transport modes while ensuring security and punctuality. Multimodal transportation can effectively reduce logistics costs, improve logistics efficiency, and reduce environmental pollution. …”
Get full text
Article -
3891
THE ALBANIAN FACTOR OF DESTABILIZATION OF THE WESTERN BALKANS: SCENARIO APPROACH
Published 2018-07-01“…Substantiation of the probability of the development and implementation of the scenario is given in four key parameters, including political, economic, military and cultural and religious spheres.Among the main actors of the scenario the author singles out the armed forces of Kosovo, Albanian paramilitary formations on the territory of western Macedonia, transnational corporations, private military companies, as well as the United States, Britain, Turkey and the Arab monarchies who support the project politically and financially.The article concludes that there is a need for an objective political assessment of the situation in the region, an analysis of security threats and risks of another round of destabilization of the Western Balkans. …”
Get full text
Article -
3892
Models for the Design and Operation of Digital Educational Environments
Published 2021-01-01“…It includes a marketing subsystem, a set of technical tools, various types of security and an organizational subsystem. The main functions of these subsystems and their various components have been identified.A didactic model of a typical complex of digital educational resources has been developed. …”
Get full text
Article -
3893
A Dynamic-Balancing Testing System Designed for Flexible Rotor
Published 2021-01-01“…The experiments prove the effectiveness of the testing system, while the testing system has advantages of convenient and intuitive operation, high balance efficiency, and security.…”
Get full text
Article -
3894
Virtual Node-Driven Cloud–Edge Collaborative Resource Scheduling for Surveillance with Visual Sensors
Published 2025-01-01“…For public security purposes, distributed surveillance systems are widely deployed in key areas. …”
Get full text
Article -
3895
Blockchain-based renewable energy certificate system in Indonesia
Published 2025-02-01“…Results show that blockchain technology can revolutionize Indonesian REC market by improving security, traceability, and promote stakeholders' trust. …”
Get full text
Article -
3896
Kazakh Initiatives on Cooperation with European Union
Published 2015-02-01“…The Strategy covered areas of cooperation such as regional integration, economic development, democratization, energy and security. In 2008 under the instructions of the President of Kazakhstan Ministry of Foreign Affairs in cooperation with other ministries developed a state programme "Path to Europe" for 2009 - 2011, which aided the priorities of cooperation between Kazakhstan and the European Union. …”
Get full text
Article -
3897
The Evolution of the NATO-Russia Relations
Published 2020-11-01“…NATO’s eastward enlargement — combined with the firm position of the official Washington and Brussels on the unacceptability of Russia’s membership in the Alliance — meant a complete exclusion of Russia from the decision-making process on the European security. At the same time, for a variety of reasons, in the post-bipolar world the military-political dependence of the Western European subregion on Washington did not decrease, as many hoped, but, on the contrary, has increased, thus excluding for Moscow the very possibility to play on the contradictions between the United States and its European allies. …”
Get full text
Article -
3898
Optimization of position and rating of shunt and series connected FACTS devices for transmission congestion management in deregulated power networks
Published 2024-03-01“…Power system operation and security in liberalized scenarios are maintained by removing branch overloads. …”
Get full text
Article -
3899
Forest Plundering in the Forest Management Unit (KPH) Randublatung, Blora Regency: Types of Plundering and the Involvement of External Community Actors
Published 2024-08-01“…These actions were often supported by security forces.…”
Get full text
Article -
3900
Prospects for the creation of national and supranational cryptocurrencies in the BRICS countries
Published 2019-06-01“…Cryptocurrency is not recognized as a legal means of payment; in the BRICS countries there are no own, national cryptocurrencies, and only projects of future cryptocurrencies are developed, taking into account the features of the set goalsof economic development and management of cryptocurrency activities; the countries of the Association do not abandon the use of blockchain technology in the field of economy and Finance, as it ensures the openness and security of data storage, the creation of centralized exchanges, the exchange of goods and services; the BRICS countries should be interested in a gradual shift away from dollar dependence. …”
Get full text
Article