Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5601
Analysis of Annual Total Revenues of the Iraqi National Insurance Company
Published 2024-03-01“…This is necessary to secure their development and reliability. The current study intends to analyse the annual total data of different types revenues of Iraqi National Insurance company besides investigating the elements that influence the insurance income during 2010–2015. …”
Get full text
Article -
5602
Bonds, Bondholders Protection and Asset Allocation of Multimarket Funds
Published 2020-01-01“…This research comprised 926 debentures series issued in Brazil from 2009 to 2017, and 1,753 multimarket funds, which allocated some portfolios’ percentage in these securities. In creating the BPI, we contemplated 15 restrictive clauses, which the most common correspond to negligent business performance, liquidation, dissolution and bankruptcy, and restrictions related to company structure. …”
Get full text
Article -
5603
RELATIVE EFFICACY OF THE CAPITAL MARKET OVER THE MONEY MARKET IN A GROWTH-FINANCING ECONOMY
Published 2023-10-01“…The study uses data from the Central Bank of Nigerian and Securities and Exchange Commission Bulletins between from 1981 and 2020. …”
Get full text
Article -
5604
Hierarchical Factor Analysis Methodology for Intelligent Manufacturing
Published 2021-01-01“…Because the micromanufacturing process involves manufacturing products through multiple steps, it is difficult to determine the process or equipment that has encountered failure, which can lead to difficulty in securing high yields. This study presents a structural model for building a factory integration system to analyze big data at manufacturing sites and a hierarchical factor analysis methodology to increase product yield and quality in an intelligent manufacturing environment. …”
Get full text
Article -
5605
Development and Testing of Road Signs Alert System Using a Smart Mobile Phone
Published 2022-01-01“…Furthermore, the system application was secured by limiting access to the application program interface key to avoid unauthorized access to sensitive information.…”
Get full text
Article -
5606
Utilizing Diagnostic Musculoskeletal Ultrasound for Assessment of the Infraspinatus Muscle and Tendon: Implications for Rehabilitation Professionals
Published 2024-07-01“…The rotator cuff, comprising the subscapularis, supraspinatus, infraspinatus, and teres minor muscles, plays a crucial role in stabilizing the glenohumeral joint by securing the head of the humerus within the glenoid cavity of the scapula. …”
Get full text
Article -
5607
A case series on the basic concept and design of removable partial dentures: support and bracing considerations
Published 2025-01-01“…Therefore, it is essential to emphasize the importance of providing patients with appropriate, safe, and secure removable partial dentures and have clinicians rerecognize the concept and importance of support and bracing. …”
Get full text
Article -
5608
Internet marketing organization with the use of intellegent and block chain technologies
Published 2020-05-01“…Blockchain technology is used to control and guarantee the authorship of startups and signed contracts.As IM development trend, the development of models for joint activity of intelligent agents in the cloud environment to support decision-making using blockchain technology to legally secure the authorship of innovations is proposed. …”
Get full text
Article -
5609
Political ecology survey of human-chimpanzee coexistence within postwar Mabi-Yaya Nature Reserve, Côte d’Ivoire
Published 2024-11-01“…Given the Ivorian political context, this local support and the persistence of high canopy forest appear to be more related to a local understanding of the protected area as a land-securing device against “outsiders” in a context of strong political and identity crises than to any agreement with conservation policies. …”
Get full text
Article -
5610
The influence of communication on an effective relationship marketing strategy for sport unions in the new millennium
Published 2022-10-01“…A long-term relationship is recognised as a very important and basic ingredient of marketing, securing and keeping customers and can be regarded as a tool for the new millennium. …”
Get full text
Article -
5611
Development of a Family of Chaotic Systems with Infinite Equilibria and Its Application for Image Encryption
Published 2022-01-01“…Therefore, this study not only enriched the research on infinite equilibria chaotic systems but also further expanded secure communication technology by combining chaotic synchronization control and DNA coding in image encryption.…”
Get full text
Article -
5612
Research on design intervention in spatial planning of traditional rural tourism: based on the perspective of tourists’ willingness to visit again
Published 2025-01-01“…Through scientific management and marketing strategies, traditional villages can not only enhance their competitiveness but also secure a place in the global tourism market, achieving both economic and cultural prosperity.…”
Get full text
Article -
5613
Informal Savings Groups and Economic Empowerment of Women in Northern Division Kabale Municipality.
Published 2024“…Conversely, the least mentioned benefit was access to safe-keeping facilities like a secure box. Concerning the challenges faced by women’s informal savings groups, the predominant issue highlighted was the competition threatening the survival of individual groups, while the least reported challenge was the lack of capital or financial resources. …”
Get full text
Thesis -
5614
Financial inclusion and the growth of small medium enterprises in Uganda: empirical evidence from selected districts in Lango sub-region
Published 2021“…Digital financial service providers should encourage their clientele to use digitalized financial services which are cheap, secure, and risk averse. The cost of capital should also be reduced to encourage borrowing while SMEs should innovatively produce goods that can be competitive at both domestic and international markets.…”
Get full text
Article -
5615
Paradigms of intraoperative neuromonitoring in paediatric thyroid surgery
Published 2025-01-01“…Intraoperative neuromonitoring (IONM) is frequently used in thyroid surgery as an effective means of securing the recurrent laryngeal nerve (RLN). Little information is available on the clinical efficacy of IONM in paediatric surgery. …”
Get full text
Article -
5616
Evaluation of digital competence level among educators: assessment tools
Published 2024-12-01“…Digital competences encompass a combination of knowledge, skills, and attitudes related to the effective use of technology for performing tasks, problem-solving, and secure, creative, independent, and ethical communication. …”
Get full text
Article -
5617
DESIGN OF A PROPERTY PRODUCT RECOMMENDATION SYSTEM USING ASSOCIATION RULE METHOD BASED ON USER INTERACTION PATTERNS
Published 2024-07-01“…User data and privacy must be secured to optimize the recommendation system. Association rule and user engagement patterns can transform property recommendations. …”
Get full text
Article -
5618
Specialized contact sites regulate the fusion of chlamydial inclusion membranes
Published 2024-10-01“…As IncA concentrates within ICSs, its C-terminus likely interacts in trans with IncA on the apposing membrane, securing a high concentration of IncA at fusion sites. …”
Get full text
Article -
5619
Carrageenan Edible Coating Application Prolongs Cavendish Banana Shelf Life
Published 2020-01-01“…Banana is very important for both food and economic securities in many tropical and subtropical countries, because of its nutritional values. …”
Get full text
Article -
5620
A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme
Published 2020-01-01“…Our scheme is also a leakage-resilient secret-sharing scheme (LRSS) in the bounded-leakage model, which remain provably secure even if the adversary learns a bounded amount of leakage information about their secret key. …”
Get full text
Article