Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
8641
Rural Households’ Vulnerability to Food Insecurity and Its Determinants in North Shewa Zone of Ethiopia
Published 2025-01-01“…Accordingly, based on the intensity of their vulnerability, households were grouped as chronic food insecure (43.72%), transient food insecure (12.57%), highly vulnerable-food secure (16.23%), and low vulnerable-food secure (27.49%). …”
Get full text
Article -
8642
-
8643
Surgical Synechiolysis of Iridocapsular Adhesion and Sulcus Placement of a Rigid Intraocular Lens on an Oversized Residual Capsular Rim
Published 2018-01-01“…A preserved capsulorhexis after sufficient synechiolysis, which can secure the IOL optic intraoperatively, may yield better stability of the IOL position.…”
Get full text
Article -
8644
NEGATIVE INTEREST RATES: CENTRAL BANKS INITIATED AN EXPERIMENT
Published 2016-08-01“…Such new tools could be represented by futures contracts on interest rates securities.…”
Get full text
Article -
8645
Food-Insecure Women Eat a Less Diverse Diet in a More Temporally Variable Way: Evidence from the US National Health and Nutrition Examination Survey, 2013-4
Published 2019-01-01“…Previous research using food recalls suggests that the total energy intake of food-insecure women is not elevated, though macronutrient composition may differ from that of food-secure women. There is limited evidence on temporal patterns of food consumption. …”
Get full text
Article -
8646
Pressure and rolling torque in high-speed finishing blocks of wire mills with account of mass forces in deformation zones
Published 2001-08-01“…Tasks of working out of theoretical bases of continuos high-speed rolling of rolled wire are set forth and solved with considerańon of influence of mass forces securing necessary acceleration in deformation zones.…”
Get full text
Article -
8647
Feasibility and parameter optimization of ground-to-satellite uplink continuous-variable quantum key distribution
Published 2025-01-01“…Driven by the necessitates of wide-area quantum secure communication networks, ground-to-satellite quantum key distribution (QKD) has been highlighted in the field of quantum information. …”
Get full text
Article -
8648
Relationship Between Attachment and Social Skills in Adulthood Education in the Digital Society
Published 2025-01-01“…After carrying out the analyses, the existence of a statistically significant relationship was detected between the social skills variable and Attachment Scale 3, corresponding to subjects with good abilities to express feelings and comfort with relationships (secure attachment). It is concluded by stating that subjects who have developed a secure attachment will have more satisfactory social relationships.…”
Get full text
Article -
8649
A dataset of Antarctic ecosystems in ice-free lands: classification, descriptions, and maps
Published 2025-01-01Get full text
Article -
8650
Mellem Skylla og Charybdis – træk af legalitetsprincippets historie i dansk strafferet
Published 2017-02-01“…While the principle of legality was designed to secure the predictability of the criminal law, measures were also taken in order to secure flexibility in the application of the code by the courts. …”
Get full text
Article -
8651
Parallel remote state preparation for fully device-independent verifiable blind quantum computation
Published 2025-01-01“…We introduce a device-independent two-prover scheme in which a classical verifier can use a simple untrusted quantum measurement device (the client device) to securely delegate a quantum computation to an untrusted quantum server. …”
Get full text
Article -
8652
Une alliance de circonstance : l’Italie et les musulmans d’Albanie (1912-1920)
Published 2017-06-01“…While its military intervention aimed at securing the Adriatic Sea, it draws Roma to claim protection over the Albanian Muslims in front of the competing powers in the Balkans. …”
Get full text
Article -
8653
Staying in Marriage is Not Enough: Influence of Marital Commitment and Adult Attachment Style on Marital Flourishing
Published 2024-06-01“…The results showed that marital commitment (p = .000) and a secure attachment style (p = .000) significantly predict marital flourishing. …”
Get full text
Article -
8654
A Rare Complication of Tracheal Intubation: Tongue Perforation
Published 2012-01-01“…Laryngoscopy demonstrated the ETT to perforate the base of the tongue. The airway was secured with tracheostomy and the ETT was removed. …”
Get full text
Article -
8655
An Overview on The Pandemic Coronavirus Disease 2019 (COVID-19) Outbreak
Published 2020-05-01“…The other objective of this review was to encourage publics to treat the virus in safe way based on the discovery by researchers toward secure life of million peoples that could be infected by the 2019 new coronavirus. …”
Get full text
Article -
8656
Acceptability of donor funding for clinical trials in the UK: a qualitative empirical ethics study using focus groups to elicit the views of research patient public involvement gro...
Published 2022-06-01“…Existing governance processes will do some of this work, but additional REC guidance, particularly in relation to donors securing a place on the trial, may be necessary to help RECs navigate ethical concerns consistently.…”
Get full text
Article -
8657
La crise de l’oléoduc Edjeleh-Gabès : Au cœur des enjeux de souveraineté du Maghreb (1954-1962)
Published 2018-06-01“…While the French-Libyan discussions (1954-1956) were retaining the attention of French oil companies, Paris was focusing on securing the evacuation of oil from the Algerian Sahara during the Algerian War (1954-1962). …”
Get full text
Article -
8658
Sensor Relocation Technique Based Lightweight Integrated Protocol for WSN
Published 2014-06-01“…However, this approach fails to focus on connectivity issue due to node migration and secured communication too, which may compromise our collecting data. …”
Get full text
Article -
8659
A requirement-driven approach for competency-based collaboration in industrial data science projects
Published 2024-01-01“…Simultaneously, especially manufacturing companies need to gain and secure knowledge in the field of Industrial Data Science (IDS) and to collaborate with partners to form a competitive value chain. …”
Get full text
Article -
8660
Building a Digital Health Research Platform to Enable Recruitment, Enrollment, Data Collection, and Follow-Up for a Highly Diverse Longitudinal US Cohort of 1 Million People in the...
Published 2025-01-01“…Participants were recruited by in-person, print, and online digital campaigns. Participants securely accessed the DHRP via web and mobile apps, either independently or with research staff support. …”
Get full text
Article