Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
3941
Experimental Research on Damping Effect of Double-Layer Tuned Mass Damper for High-Rise Structure
Published 2021-01-01Get full text
Article -
3942
Lactic Acid Bacteria from African Fermented Cereal-Based Products: Potential Biological Control Agents for Mycotoxins in Kenya
Published 2022-01-01“…Cereals play an important role in global food security. Data from the UN Food and Agriculture Organization projects increased consumption of cereals from 2.6 billion tonnes in 2017 to approximately 2.9 billion tonnes by 2027. …”
Get full text
Article -
3943
Parish revival in Southern Russia in the context of revolutionary upheavals and the Civil War
Published 2023-09-01“…Its functions were to be extended to the level of a grass-roots zemstvo, to ensure the legal and economic security of the parishioners, and to influence the surrounding society.…”
Get full text
Article -
3944
Protection System Design of Induction Motor for Industries
Published 2022-01-01“…Providing industrial motors, pumps, lift motors, and other similar devices with security is a major motivation behind the emergence of this issue. …”
Get full text
Article -
3945
Legal Regulation of Spreading Opinions and Beliefs through TV Broadcasting
Published 2021-07-01“…It has been stated that the right to information may be limited by law in the interests of national security, territorial integrity or public morality. …”
Get full text
Article -
3946
Authenticity" About Ferdowsi Neighborhoods Of Tehran with Historical Textures with the Phenomenological Approach
Published 2021-09-01“…Urban neighborhoods are one of the vital elements of each city and the culture of urban residents is concealed in the texture and sinew of that .The advent of new technologies in urban life and percipitance of designers for construction of buildings led to reduce of fixation sense about their living environment and decrease social interaction. once the historical districts are regarded as symbols of security, comfort and authenticity of the residents, due to inefficiency and interruption of their structures, suffer instability and displacement of their residents.According to this, instability and displacement of inhabitants to districts of historical value are known as the main problem in these neighborhoods. …”
Get full text
Article -
3947
Traffic Anomaly Detection Algorithm for Wireless Sensor Networks Based on Improved Exploitation of the GM(1,1) Model
Published 2016-07-01“…Because worms, attacks, intrusions, and other kinds of malicious behaviors can be recognized by traffic analysis and anomaly detection, WSN traffic anomaly detection provides useful tools for timely reaction and appropriate prevention in network security. In the paper, we improve exploitation of GM(1,1) model to make traffic prediction and judge the traffic anomaly in WSNs. …”
Get full text
Article -
3948
-
3949
A Miniature and Low-Power-Consumption Stress Measurement System for Embedded Explosive in Multilayer Target Penetration
Published 2020-01-01“…When a penetrator penetrates a target, security issues such as detonation and deflagration sometimes occur in the embedded explosive under an extreme environment with high overload and severe mechanical shock. …”
Get full text
Article -
3950
Acceptability of improved cook stoves-a scoping review of the literature.
Published 2025-01-01“…Sustained use of ICS depended on fuel supply, fuel security and policies promoting its use. Policies offering subsidies in support of supply-chain garnered institutional trust among community members and resulted in the sustained use of ICS. …”
Get full text
Article -
3951
SHADOW GLOBALIZATION
Published 2014-06-01“…Some of the world development trends been observed over the past years raise serious concerns about the security and welfare of the peoples of the world. One of such trends has been the globalization of shadow economic activities. …”
Get full text
Article -
3952
Detection of network intelligence features with the decision tree model
Published 2022-03-01“…Early detection of network intelligence allows to reduce the risks of information security of organizations. The study was carried out to develop software module for detecting the features of network intelligence by machine learning methods.M e t h o d s . …”
Get full text
Article -
3953
Condition Recognition of High-Speed Train Bogie Based on Multi-View Kernel FCM
Published 2019-03-01“…Monitoring the operating status of a High-Speed Train (HST) at any moment is necessary to ensure its security. Multi-channel vibration signals are collected by sensors installed on bogies and beneficial information are extracted to determine the running condition. …”
Get full text
Article -
3954
Effect of lactose-free milk powder on lactose intolerance symptoms and nutritional status of pet dogs
Published 2022-11-01Get full text
Article -
3955
Effect of Moisture on the Macro Failure Characteristics of Weakly Consolidated Mudstone: Mesomechanism
Published 2022-01-01“…Mudstone, whose significant characteristic is water-weakening, widely exists in all kinds of geotechnical engineering, which brings great security risks to engineering safety. In this paper, through a series of macro and meso test methods, the macro and meso action mechanism of water on the weakly consolidated plane of mudstone was studied. …”
Get full text
Article -
3956
Russian-тajik cooperation as a factor of stability in Central Asia (1992– 2022)
Published 2022-12-01“…This position meets the national interests not only of both countries, but also of the Central Asian states, guaranteeing their security and stability.…”
Get full text
Article -
3957
Leveraging Social Engineering Techniques for Ethical Purposes: An Approach to Develop Fake Android App for Collecting Valuable Data Discreetly
Published 2024-09-01“…However, these techniques can also be utilized ethically, as many cybersecurity professionals do, particularly when evaluating vulnerabilities and testing security defenses. This paper presents EDC (Ethical Data Collector), an Android application that utilizes social engineering techniques to discreetly collect valuable data from an Android device for ethical purposes. …”
Get full text
Article -
3958
The interplay of perceived benefit, perceived risk, and trust in Fintech adoption: Insights from Sub-Saharan Africa
Published 2025-01-01“…Conversely, perceived legal risk, security risk, and privacy concerns act as significant inhibitors of Fintech adoption. …”
Get full text
Article -
3959
Hydrological drought in the lower reaches of the Yangtze River (China): a 70-year data analysis
Published 2025-02-01“…The combined impact of climate change and human activity has brought uncertainty regarding hydrological drought in the lower reaches of the Yangtze River (LYR), thereby threatening the security of regional water resources. To address this uncertainty, based on data from over 70 years, the trends, mutations, and causes of hydrological drought in the LYR were analyzed using the Mann–Kendall test method. …”
Get full text
Article -
3960
Operating Thermal Power Plants Efficiency Improvement under Current Conditions
Published 2022-12-01“…In the limit, the share of natural gas in the incoming part of the energy balance should be reduced to values not exceeding 50 %, in accordance with the requirements of energy security. The article considers examples of utilization of low-temperature secondary energy flows occurring at thermal power plants: the heat of the cooling processes of the generator, lubrication systems, as well as the heat of condensation of turbine exhaust steam and deeper cooling of flue gases. …”
Get full text
Article