Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5481
Vitamin D, Essential Minerals, and Toxic Elements: Exploring Interactions between Nutrients and Toxicants in Clinical Medicine
Published 2015-01-01“…It appears preferable to secure essential mineral status in conjunction with adequate vitamin D, as intake of vitamin D in the absence of mineral sufficiency may result in facilitation of toxic element absorption with potential adverse clinical outcomes.…”
Get full text
Article -
5482
Online Auction System for Guma Stocks
Published 2025“…The system's objectives include streamlining the online trading process, fostering a sense of community engagement, and providing a user-friendly platform for secure transactions. It incorporates features such as user authentication, product listings, real-time bidding. …”
Get full text
Thesis -
5483
-
5484
La relation économique et commerciale sino-marocaine : De la coopération au partenariat stratégique
Published 2013-10-01“…Since the 1990s, Morocco has made the opening of its economy a strategic focus of its trade policy. Securely fastened to the European Union, by far its largest trading partner, the Kingdom of Morocco has stepped up trade agreements, especially with emerging powers. …”
Get full text
Article -
5485
Agriculture Supply Chain Management Based on Blockchain Architecture and Smart Contracts
Published 2022-01-01“…This strategy would be more efficient and secure.…”
Get full text
Article -
5486
Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
Published 2012-12-01“…Recent research efforts have shown that NC can be combined with classical error control codes and cryptography for secure communications or misbehavior detections. Nevertheless, when it comes to Byzantine attacks, these results have limited effects. …”
Get full text
Article -
5487
Foreign experience of socially responsible investing: trends, problems and prospects
Published 2024-06-01“…It is shown that at present one of the key challenges in the development of the SRI market is lack of a generally accepted integrated methodology, standards and methods for valuation and accounting of the allocation of securities and use of income from them precisely in connection with the ESG (еnvironmental, social, and governance) agenda. …”
Get full text
Article -
5488
Скандал в эго-документах позднесоветских писателей: попытка “насыщенного описания”
Published 2025-02-01“…Since the primary audience for such scandals was international public opinion, prominent writers frequently leveraged the threat of an ‘international scandal’ to secure desired outcomes from editors, censors, and – most critically – special ‘curators’ responsible for overseeing literature on behalf of the Central Committee of the Communist Party. …”
Get full text
Article -
5489
Des SIG aux observations de terrain : étude de la « trame jardinée potagère » dans les petites villes du Vexin français
Published 2024-07-01“…Our results show that the existence of these gardens is rooted in a manual culture associated with the working classes and that their renewal is declining. Securing the tenure of unbuilt land advocated by the Regional National Park does not therefore seem to be enough to maintain the food-growing function of the green belts. …”
Get full text
Article -
5490
Representing succession: Tudor royal portraits, 1544–1546: context, production and analysis
Published 2025-12-01“…Evidence suggests that it was Kateryn, who helped achieve for Mary and Elizabeth the dynastic legitimacy that secured their subsequent reigns. In celebration of this achievement, between 1544 and 1546, evidence also suggests that it was the queen who was instrumental in commissioning a campaign of portraits of her stepchildren as a visual affirmation of their enhanced status. …”
Get full text
Article -
5491
L’environnement juridique de la lutte contre la pollution par les plastiques en Asie du Sud-Est (ASEAN)
Published 2024-12-01“…External aid is the key to securing funding, which is sorely lacking in most of these developing countries. …”
Get full text
Article -
5492
Government Efforts to Protect Habitat for the Florida Panther on Private Lands
Published 2016-10-01“…Multiple policy approaches have been put in place by local, state, and federal governments to address habitat loss and secure natural resources in Florida for our panthers. …”
Get full text
Article -
5493
The Establishment of Ramadan Principality
Published 2013-12-01“…They showed maximum effort during the campaigns by Mamluks onto the Armenians living in Cukurova, and after the collapse of this state, they secure their position in that region as being subject to Mamluks. …”
Get full text
Article -
5494
BUILDING COMPETITIVE ADVANTAGE OF THE COMPANY BASED ON CHANGING ORGANIZATIONAL CULTURE
Published 2013-05-01“…This analysis provides important data and secures suitable (transparent) background for guidelines and activities in further development and improvement (change) of culture which these companies maintain, according to their selected ways of competing. …”
Get full text
Article -
5495
Ensuring the resilience of health systems in the face of the effects of climate change
Published 2025-01-01“…Becoming resilient: heath infrastructures are impacted by the effects of climate change, such as the need to cool premises during heatwaves, disruptions to energy supplies, and securing logistics chains.2. Preparing for the exacerbation of chronic diseases that will lead to an overload of the health system.3. …”
Get full text
Article -
5496
A New Chaotic System with Only Nonhyperbolic Equilibrium Points: Dynamics and Its Engineering Application
Published 2022-01-01“…Finally, chaos-based encoding/decoding algorithms for secure data transmission are developed by designing a state chain diagram, which indicates the applicability of the new chaotic system.…”
Get full text
Article -
5497
Human Resource Information System with Machine Learning Integration
Published 2022-06-01“…Based on the thorough evaluation of the experts and respondents, it was found that the human resource information system is highly usable, secured, efficient, and provides a fast and easy way to manage employees' records and predict employees over using a supervised machine learning that uses the linear regression method. …”
Get full text
Article -
5498
Government Efforts to Protect Habitat for the Florida Panther on Private Lands
Published 2016-10-01“…Multiple policy approaches have been put in place by local, state, and federal governments to address habitat loss and secure natural resources in Florida for our panthers. …”
Get full text
Article -
5499
South Africa’s Battle Against COVID-19 Pandemic
Published 2022-02-01“…As the country struggles to secure and administer COVID-19 vaccines to its people, the Coronavirus has been rapidly mutating and causing new waves of infections within the nation. …”
Get full text
Article -
5500
BUILDING COMPETITIVE ADVANTAGE OF THE COMPANY BASED ON CHANGING ORGANIZATIONAL CULTURE
Published 2013-05-01“…This analysis provides important data and secures suitable (transparent) background for guidelines and activities in further development and improvement (change) of culture which these companies maintain, according to their selected ways of competing. …”
Get full text
Article