Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5321
Financial aspects of Public-Private Partnership
Published 2008-03-01“…The growth of public requests is evident in the case of Croatia, but also present in every European country, with the government’s lack of ability to secure sufficient financial income. The look for additional sources of financing, in order to build public infrastructure, is directed therefore more and more to the private financing capital and to public-private partnerships. …”
Get full text
Article -
5322
Constructing Digitized Chaotic Time Series with a Guaranteed Enhanced Period
Published 2019-01-01“…Furthermore, experimental implementation shows that the digitized chaotic time series has great complexity, approximate entropy, and randomness, and the perturbed digitized logistic map can be used as a secure pseudorandom sequence generator for information encryption.…”
Get full text
Article -
5323
Design and Implementation of Software-Based Simulator for Performance Evaluation of Transmission Protocol
Published 2014-03-01“…We propose a method of software-based transmission protocol simulation for the establishment of ubiquitous infrastructure as a method of securing reliability of a ubiquitous sensor network (USN), which is an important element of ubiquitous infrastructure establishment. …”
Get full text
Article -
5324
Du détroit de Malacca jusqu’à sa périphérie
Published 2009-09-01“…Although the Malacca Strait was previously one of the main piracy prone areas, it is becoming increasingly secure, and presents itself as a good example. Nevertheless, field research tends to cast a shadow over this optimistic view. …”
Get full text
Article -
5325
Trucking, Owner-Operators, and Florida Perishables
Published 2005-04-01“…In this report, we examine the extent to which owner-operators have been able to maintain their share of Florida's produce/ornamentals haulage and their dependence upon larger carriers to secure loads. his is EDIS document, FE543, a publication of the Department of Food and Resource Economics, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida, Gainesville, FL. …”
Get full text
Article -
5326
Trucking, Owner-Operators, and Florida Perishables
Published 2005-04-01“…In this report, we examine the extent to which owner-operators have been able to maintain their share of Florida's produce/ornamentals haulage and their dependence upon larger carriers to secure loads. his is EDIS document, FE543, a publication of the Department of Food and Resource Economics, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida, Gainesville, FL. …”
Get full text
Article -
5327
Decolonising Bibles? Image, imagination, and imagin(in)g in the postcolonial academy
Published 2023-11-01“…Ensconced in the image of ideologically secure and contented intellectual space, epistemological and hermeneutical approaches which explicitly involve the social location of interpreters and academic discourses are still viewed with concern if not suspicion. …”
Get full text
Article -
5328
How to Protect Future Generations' Rights in European Governance
Published 2010-10-01“…Given that future generations are right-bearing citizens of tomorrow, legislative systems should secure these rights through appropriate institutions. …”
Get full text
Article -
5329
Chaos Synchronization Based on Unknown Input Proportional Multiple-Integral Fuzzy Observer
Published 2013-01-01“…This paper presents an unknown input Proportional Multiple-Integral Observer (PIO) for synchronization of chaotic systems based on Takagi-Sugeno (TS) fuzzy chaotic models subject to unmeasurable decision variables and unknown input. In a secure communication configuration, this unknown input is regarded as a message encoded in the chaotic system and recovered by the proposed PIO. …”
Get full text
Article -
5330
Direct radiocarbon dating and stable isotopes of the neandertal femur from Les Rochers-de-Villeneuve (Lussac-les-Châteaux, Vienne)
Published 2006-06-01“…The direct radiocarbon date makes it the oldest directly dated European Neandertal specimen, even though others have securely associated radiocarbon dates in the same time range. …”
Get full text
Article -
5331
Dandiacal Conversation in Oscar Wilde’s Comedies of Manners: Conventions, Conversions and Reconfigurations of Phallogocentrism
Published 2010-12-01“…Their strong reliance on rhetoric ensures their supremacy in polite conversation, even if their intellectual and cultural edge does a lot to secure their domination. What is more, their mastery of codes and norms enables them to destabilize the semantics of the age, a gesture which can be equated to a reconfiguration of Victorian patriarchy and even a dismissal of Victorian grand narratives.…”
Get full text
Article -
5332
Energy Conservation, Singular Orbits, and FPGA Implementation of Two New Hamiltonian Chaotic Systems
Published 2020-01-01“…Since the conservative chaotic system (CCS) has no general attractors, conservative chaotic flows are more suitable for the chaos-based secure communication than the chaotic attractors. …”
Get full text
Article -
5333
Internal agricultural policy of the government of A. V. Kolchak
Published 2020-10-01“…This circumstance eventually secured the victory of Bolshevism…”
Get full text
Article -
5334
La lutte contre la piraterie au large de la Somalie
Published 2024-03-01“…At the end of the day, only a global approach of the Somalian issues will be able to secure the Gulf of Aden, which is a strategic Sea Line Of Communication for the world trade. …”
Get full text
Article -
5335
Small Arms and Light Weapons Proliferation and Gun Violence in West Africa Sub-Region
Published 2022-11-01“…The government of the countries in the West African sub region should collaborate to beef securities in their borders. …”
Get full text
Article -
5336
Fibrodysplasia Ossificans Progressiva and Pregnancy: A Case Series and Review of the Literature
Published 2022-01-01“…These cases posed unique anesthetic and obstetric technical challenges, particularly when securing the airway and performing cesarean delivery. …”
Get full text
Article -
5337
A Mislocated Intrauterine Device Migrating to the Urinary Bladder: An Uncommon Complication Leading to Stone Formation
Published 2020-01-01“…We report a case of an IUD migrating from its normal position in the uterine cavity into the urinary bladder causing chronic low urinary tract symptoms in a 43-year-old female patient. The device was securely removed without complications using grasping forceps under cystoscopy, and no parietal defect was detected. …”
Get full text
Article -
5338
Peri-Implant Soft Tissue in Contact with Zirconium/Titanium Abutments from Histological and Biological Perspectives: A Concise Review
Published 2025-01-01“…The attachment between the implant surface and peri-implant mucosa should establish a secure seal to prevent bacterial infiltration and subsequent tissue inflammation. …”
Get full text
Article -
5339
Československá vojenská mise v Kanadě: Činnost a výsledky
Published 2012-01-01“… The Czechoslovak military mission in Canada (1941–1943) aimed to secure the enlistment of local Czechs to Czechoslovak units in Great Britain. …”
Get full text
Article -
5340
Pupils’ approach to teachers’ role as motivating factor in foreign language classes
Published 2017-02-01“…Moreover, it turned out that the schoolchildren feel less secure talking of interaction with teachers: they usually turn to the teachers only for subject matters; they do not always feel free in the classroom. …”
Get full text
Article