Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
9381
DIAGNOSTIC CRTITERIA OF ORTHODONTIC TREATMENT WITH EXTRACTION OF SOME TEETH
Published 2019-06-01“…Besides, necessity of teeth extraction of some teeth which are written in medical protocol, secures a doctor from law risks. The aim of the investigation was to establish correlative link between parameters of morphometric analysis of control and diagnostic models of jaws by Snagina and roentgenologic parameters of lateral cephalometry by Kim. …”
Get full text
Article -
9382
ENVIRONMENTAL AND SOCIAL INFORMATION DISCLOSURE QUALITY AND FINANCIAL PERFORMANCE OF LISTED MANUFACTURING COMPANIES IN NIGERIA
Published 2024-10-01“…This study concluded that substantive investment in sustainability activities and quality disclosure is a form of undisputed contribution to sustainable development that in turn provide a basis for securing enhanced FP. This study recommends that manager should henceforth, consider potential returns that will come from investment in substantive environmental and social activities and quality disclosure that follow GRI quality reporting principle. …”
Get full text
Article -
9383
Delineating a “non-place” in the UK?10 notes on experimental poetry written by women: Caroline Bergvall and Redell Olsen
Published 2008-10-01“…Leur poésie du territoire déconstruit, et de l’identité en question se donne à lire dans deux œuvres particulières : celle de Caroline Bergvall, poète dont la langue inassignable bouscule la syntaxe du monde en redéfinissant les frontières entre les langues, et celle de Redell Olsen dans laquelle les territoires fixes, familiers et controversés de « l’identité nationale » sont constamment battus en brèche dans Secure Portable Space, notamment par une hybridation des textes du poète américain Charles Olson.…”
Get full text
Article -
9384
GaitVision: Real-Time Extraction of Gait Parameters Using Residual Attention Network
Published 2021-01-01“…This state-of-the-art work creates a gait-based access authentication that can be used in highly secured premises. This work was specially designed for Defence Department premises authentication. …”
Get full text
Article -
9385
Policy Fragmentation, Women’s Land Rights and Governance in Zimbabwe
Published 2025-01-01“…Context and background The above comes in a context where the Malabo Declaration call for equitable access to land and secure land rights for women is coming to an end in 2025. …”
Get full text
Article -
9386
Pursuing a corporate sustainable identity: Green governance strategy, hybrid vehicle development, knowledge and sustainability performance
Published 2025-03-01“…The study further reveals that despite economic pressures such as rising electricity costs, companies committed to GGS continue to prioritize hybrid vehicle production as a critical strategy to enhance sustainability performance and secure recognition in sustainability awards. However, a significant gap persists: 60 % of surveyed companies fail to address SDG 11 (Sustainable Cities and Communities), while 55 % neglect SDG 13 (Climate Action). …”
Get full text
Article -
9387
ON IMPROVING THE ENERGY SUPPLY OF BATCH DYEING APPARATUSES IN THE LIGHT INDUSTRY ENTERPRISES
Published 2016-02-01“…The suggested ways of solving the problem are not exhaustive and offer evolutionary changes that secure economic indicators fitting the dictates of time and the enterprises capabilities. …”
Get full text
Article -
9388
Lifesaving surgical approaches for severe penetrating knife injury to the neck
Published 2025-01-01“…As tracheal repair was not possible posterior wall was approximated with 3 − 0 polypropylene and size 7 tracheostomy tube was inserted and secured. The patient was managed post-operatively in the ICU and was discharged in stable condition on the 25th day adviced regular follow-up. …”
Get full text
Article -
9389
A sector fast encryption algorithm for color images based on one-dimensional composite sinusoidal chaos map.
Published 2025-01-01“…Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. …”
Get full text
Article -
9390
Organizing the spatial space of the urban rivers\' margin of tourism development (case study of Poldokhtar city)
Published 2023-03-01“…The range of results showed that the most important strategy for creating urban river tourism in Poldokhtar is the attempt to create a social and secure environment with facilities and ease of access and special emphasis on environmental and ecological issues. …”
Get full text
Article -
9391
Soviet Diplomatic Efforts to Prevent Hungary’s Alignment with Germany in World War II (1939– 1941)
Published 2024-01-01“…Hungary, as strategized by Budapest, hoped to secure a position among these observers, avoiding direct conflict participation, and to later engage in territorial reconfiguration post-World War II. …”
Get full text
Article -
9392
The Everyday Commoning Practices in Urbanising Localities
Published 2025-01-01“…Negotiating Rights to Inhabit Common Lands for Housing in Two Cities of South India This paper presents a framework for understanding the everyday political dynamics of commoning initiated by residents to secure their claims to ‘common land’ in urbanising localities. …”
Get full text
Article -
9393
Environmental literacy, the key to sustainable conservation of wetlands in urban areas
Published 2024-01-01“…The study concluded that individuals are more concerned with their primary needs of securing food and shelter, with little or no consideration of the after effects of such on the environment which include individual heath, as well as depreciation of other services and goods found in wetlands. …”
Get full text
Article -
9394
Challenging Our Assumptions: Listening to Refugee and Immigrant Women’s Voices About Career Aspirations
Published 2025-01-01“…These newcomers face significant barriers to obtaining economic stability. Those who secure a job usually work in low-paying, entry-level positions such as food service, hospitality, or cleaning. …”
Get full text
Article -
9395
Development and Validation of Cloud-based Heart Rate Variability Monitor
Published 2024-12-01“…Aims: Medical investigations carried out at dispensaries or hospitals impose substantial physiological and psychological stress (white coat effect), disrupting cardiovascular homeostasis, which can be taken care by point-of-care cloud computing system to facilitate secure patient monitoring. Settings and Design: The device employs MAX30102 sensor to collect peripheral pulse signal using photoplethysmography technique. …”
Get full text
Article -
9396
Global FRAND-Licensing by EU National Courts: The Winner Asks Them All? – On Global SEP Disputes and International Jurisdiction
Published 2023-06-01“…Parties are fighting to secure jurisdictions for a judicially determined portfolio FRAND licence by seeking anti-suit-injunctions or anti-anti-suitinjunctions (and so on). …”
Get full text
Article -
9397
Comparative Analysis of Visual Field Characteristics and Perceptual Processing in Peripheral Vision Between Virtual Reality and Real World
Published 2024-01-01“…In various domains, virtual reality (VR) has emerged as a valuable tool for simulating specific scenarios and facilitating training within controlled and secure conditions. As peripheral vision plays a crucial role in numerous contexts, it must be duly considered in VR simulations. …”
Get full text
Article -
9398
RUSSIAN-ARAB COOPERATION BEFORE AND AFTER THE "ARAB SPRING"
Published 2014-06-01“…Ultimately, the firm position of Russia on the Syrian issue secured her role as an important political player in the Middle East. …”
Get full text
Article -
9399
IoT intrusion detection method for unbalanced samples
Published 2023-02-01“…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
Get full text
Article -
9400
Russia-India cooperation on Post-American Afghanistan
Published 2023-05-01“…Both countries are interested in a stable and secure Afghanistan, and both may be willing to accept Taliban rule, subject to certain conditions, if it helps achieve that goal. …”
Get full text
Article