Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5301
Sustainability Goals in Economic Policy — Economic Considerations
Published 2022-05-01“…This should be prevented by formulating the goals as concretely and legally securely as possible and by building up competence in the authorities entrusted with their implementation.…”
Get full text
Article -
5302
USE OF CORPORATE ACCOUNTING AND CONTROL SYSTEM IN MANAGEMENT
Published 2019-12-01“…According to the results of the study a conclusion has been made, that the corporate accounting and control system is one of the modern algorithmized and automated tools of the corporate management system of economic development strategy in a highly competitive environment and the unpredictability of the behavior of economic entities in the market of goods, works, services, currency, securities, etc., which is integrated with other management systems in the mode of their parallel automation.…”
Get full text
Article -
5303
Prime Field ECDSA Signature Processing for Reconfigurable Embedded Systems
Published 2011-01-01“…Communication and system authentication by digital signature schemes is a major issue in securing such systems. This contribution presents a complete ECDSA signature processing system over prime fields for bit lengths of up to 256 on reconfigurable hardware. …”
Get full text
Article -
5304
Reducing Human-Bear Conflicts: Bear-Resistant Trash Cans
Published 2017-06-01“…Pienaar, and and Mike Orlando and published by the Wildlife Ecology and Conservation Department explains how to secure human garbage from bears so that they don’t become reliant on human food sources, a condition that puts them at great risk of being killed from vehicle collisions, illegal shooting, or euthanasia.http://edis.ifas.ufl.edu/uw429 …”
Get full text
Article -
5305
Cattell-Braasch Maneuver: A Gadget to Manipulate Abdominal Aortic Aneurysm in a Patient with a Left-Sided Inferior Vena Cava
Published 2019-01-01“…He underwent open surgery, and we employed the Cattell-Braasch maneuver to approach the abdominal aortic aneurysm from the right side. This enabled securing of the abdominal aortic aneurysm neck without mobilizing or dissecting the inferior vena cava. …”
Get full text
Article -
5306
Bedřich ze Strážnice a husitské posádky ve Slezsku
Published 2020-12-01“…In Silesia, the priest Bedřich of Strážnice helped to transform the system operating among the garrisons in Central and South Moravia, including the collection of food in the form of tributes, obtaining the spoils of war, supplying through the convoys sent from the Hussite domain, and the cooperation with local elites. At the same time, securing supplies determined the main features of military operations. …”
Get full text
Article -
5307
Anonymous Aggregator Election and Data Aggregation in Wireless Sensor Networks
Published 2011-10-01“…More specifically, we propose two private aggregator node election protocols, a private data aggregation protocol, and a corresponding private query protocol for sensor networks that allow for secure in-network data aggregation by making it difficult for an adversary to identify and then physically disable the designated aggregator nodes. …”
Get full text
Article -
5308
Piracy around the Horn of Africa
Published 2009-09-01“…Piracy around the Horn of Africa has risen to a level serious enough for the international community to take concerted action to secure an international sea lane. However, the efforts so far have been initiated mainly by the international community while regional efforts are only just beginning. …”
Get full text
Article -
5309
A Review of Semantic Sensor Technologies in Internet of Things Architectures
Published 2019-01-01“…Intelligent sensors should be seamlessly, securely, and trustworthy interconnected to enable automated high-level smart applications. …”
Get full text
Article -
5310
Islanding Detection for Microgrid Based on Frequency Tracking Using Extended Kalman Filter Algorithm
Published 2014-01-01“…Islanding detection is essential for secure and reliable operation of microgrids. Considering the relationship between the power generation and the load in microgrids, frequency may vary with time when islanding occurs. …”
Get full text
Article -
5311
Safe Harbor Agreement: A Regulatory Assurance under the Endangered Species Act
Published 2016-02-01“… The involvement of the private sector is critical for the conservation and recovery of many species, but landowners’ fears that increased management restrictions could keep them from enjoying their land can present a challenge to securing their trust and assistance in conservation efforts. …”
Get full text
Article -
5312
The Art of Storytelling in Science: A Personal Journey
Published 2025-02-01“…Drawing from my experiences across Brazil, the United States of America, India, and South Africa, I explore how crafting compelling narratives enhances scientific communication, increasing the likelihood of publishing, securing funding, and building collaborations. Reflecting on formative “hot seat” sessions at the National Institutes of Health, in the United States, I emphasize the importance of structuring ideas clearly, regardless of language fluency. …”
Get full text
Article -
5313
Market Efficiency and Organizational Corruption: Study on the Impact on Shareholder Value
Published 2015-01-01“…We selected 28 events for analysis and we observed negative and positive variations of the securities in relation to the market, in the days before the disclosure, as in most o f the 20 days after publication. …”
Get full text
Article -
5314
Tributary
Published 2023-05-01“…Tributary explores covert, 'black-boxed' data centres (remote and highly secure sites) by tracking water and geothermal sources to the infrastructure required to power and house these physical locations of intensive computational processing. …”
Get full text
Article -
5315
Safe Harbor Agreement: A Regulatory Assurance under the Endangered Species Act
Published 2016-02-01“… The involvement of the private sector is critical for the conservation and recovery of many species, but landowners’ fears that increased management restrictions could keep them from enjoying their land can present a challenge to securing their trust and assistance in conservation efforts. …”
Get full text
Article -
5316
Identification of critical nodes in supply chain networks
Published 2025-01-01“…The accurate identification of the critical nodes in a SCN is important for securing the supply chain. This study proposes a new method for identifying critical nodes in SCNs based on the topological and functional characteristics of SCNs. …”
Get full text
Article -
5317
A Laryngoscope with Shape Memory Actuation
Published 2024-09-01“…Endotracheal intubation is a medical procedure to secure a patient’s airways, which can be challenging in emergency situations due to an individual’s anatomy. …”
Get full text
Article -
5318
Long-Term Remission of a Spinal Atypical Teratoid Rhabdoid Tumor in Response to Intensive Multimodal Therapy
Published 2019-01-01“…Provided clinical and diagnostic suspicion is high, the histopathological diagnosis is relatively straightforward to secure by testing for the characteristic loss of the tumor suppressor protein SMARCB1/INI1. …”
Get full text
Article -
5319
Effectiveness of pre-employment card policy on employment transition during covid-19: evidence from Indonesian dual labor market
Published 2024-11-01“…The effectiveness of the PEC policy is measured through key indicators such as labor absorption rates, reduction in unemployment, and the likelihood of securing formal employment over informal alternatives. …”
Get full text
Article -
5320
Application of Fractional Wave Packet Transform for Robust Watermarking of Mammograms
Published 2015-01-01“…Watermarking plays an important role in protecting, sharing, and securing medical data. In this work, a robust nonblind medical image watermarking scheme is proposed. …”
Get full text
Article