Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
9001
Global Britain in international politics and strategic options of Serbia in relations with the United Kingdom
Published 2023-01-01“…It is also claimed that Serbia's attitude towards Russia and, to a lesser extent, China will primarily affect the future of Belgrade-London relations, although other issues will certainly have an impact (Kosovo and Metohija, Bosnia and Herzegovina, security cooperation with NATO, etc.). Through analysis of main strategic documents in the field of foreign and defence policy, as well as through the analysis of the recent UK behavior in international relations, the first part of the paper presents the international strategy of "Global Britain" after Brexit and outlines the general international goals of the UK. …”
Get full text
Article -
9002
Information: on the question as for the meaningful evolution of the term
Published 2021-09-01“…The urgency and importance of studying the issue of information in our country is emphasized given that Ukraine is in a state of constant information war with the Russian Federation, which is quite active and aggressive in using information as a weapon of mass destruction against the territorial integrity and state security of Ukraine. The basic approaches to understanding of this term taking into account branch delimitation of scientific knowledge are defined. …”
Get full text
Article -
9003
-
9004
PROBLEMS OF DIPLOMACY IN THE PROCESS OF EURASIAN INTEGRATION
Published 2014-06-01“…The Union State of Russia and Belarus and Organization of the Collective Security Treaty associations played a particular role in structuring the EAU. …”
Get full text
Article -
9005
Optimization of sustainable corn–cattle integration in Gorontalo Province using goal programming
Published 2024-12-01“…The sensitivity interval for the optimal use of production resources in the corn–cattle integration system with the target of profit, cost, and production risk can be increased by 1% from the amount of resources used to infinity and can be reduced by 4–16% of the amount of resources used. To be more food secure, independent, wealthy, and able to support ecosystem sustainability in rural areas, farmers should set up an integrated corn–cattle system with the right mix of output and resource allocation.…”
Get full text
Article -
9006
Electronic contracts on medical care of the population under medical guarantees program
Published 2024-06-01“…The author has identified the principles of electronic medical deeds: information exchange takes place exclusively in electronic form; the legislation establishes the security of exchange and preservation of medical information, in particular medical confidentiality; modern access to medical care and resources is provided due to their assistance; these electronic contracts are aimed at improving the quality of service and meeting patients needs, transparency of the health care system; they are signed considering technological neutrality and independence from decisions developers; while signing such contracts, the information is recorded in the e-health system without the possibility of deleting or correcting the entered data; electronic identification and authentication of participants in medical relations with a high level of trust is used while they are being signed. …”
Get full text
Article -
9007
Personalized Federated Learning for Heterogeneous Residential Load Forecasting
Published 2023-12-01Get full text
Article -
9008
Global Governance of Biogenic Threats
Published 2021-04-01“…The SARS-CoV-2 virus, which caused a pandemic in 2020, has posed not only a medical, economic and social threat, but also a challenge to international security and international cooperation. It is now becoming obvious that the problem of the current pandemic cannot be reduced to individual states and regions and has the potential to influence the entire political organization of the modern world. …”
Get full text
Article -
9009
Design and development of an integrated enset processing machine suitable for central highland farmers of west shewa zone Ethiopia
Published 2025-01-01“…Abstract The development of Integrated Enset processing technology is significant for the easy availability of stable food in the current condition for fulfilling the pangs of hunger in Ethiopia, currently; individual manual technologies such as decortication, corm granting, bulla extraction, and fermenting techniques eventually contribute to utilizing food security such as Kocho, which is not affordable for the marginal farmers of Ethiopia. …”
Get full text
Article -
9010
CRISIS OF TRUST IN GOVERNMENT: THE ROLE OF PUBLIC RELATIONS IN ITS RESTORATION
Published 2024-12-01“…Overall, it emphasizes the need for systemic changes in communication management approaches to secure political stability and promote economic development. …”
Get full text
Article -
9011
Impact of distortions in UAV images on quality and accuracy of object localization
Published 2024-11-01“…The localization and classification of objects of different types in images is an important and actively researched topic because the designed methods and tools are exploited in a wide variety of fields, including remote sensing, security systems, and medical diagnostics. Imaging systems installed on-board unmanned aerial vehicles (UAVs) and drones have become popular recently, and they are potentially beneficial for numerous applications like mine detection, traffic control, and crowd control. …”
Get full text
Article -
9012
Women’s empowerment as a determinant of neonatal mortality in Sub-Saharan Africa: a narrative review focused on Nigeria
Published 2024-12-01“…By integrating women’s empowerment within a broader strategy to improve maternal and newborn health, Nigeria can advance towards securing a healthier future for its youngest population.…”
Get full text
Article -
9013
The die is cast: Sweden and Finland’s long road to NATO
Published 2024-11-01“…The consequences of this decision have yet to be assessed by politicians and experts, but one its immediate effect is clear — the emergence of a new security dilemma for the countries of the region.…”
Get full text
Article -
9014
A literature review on transformative impacts of blockchain technology on manufacturing management and industrial engineering practices
Published 2025-07-01“…Key findings reveal its effectiveness in improving data security, risk management, and intellectual property protection, alongside optimizing inventory control and customer satisfaction. …”
Get full text
Article -
9015
Humanitarian activity as a ‘soft power’ instrument of transnational corporations
Published 2023-10-01“…The author shows that within the framework of corporate humanitarian expansion Nestle implemented a wide range of humanitarian projects, which allowed it not only to secure a foothold in the Colombian market, but also to penetrate its political system, as well as to gain opportunities to further expand its political presence in the region. …”
Get full text
Article -
9016
Civil defendant representation in criminal proceedings
Published 2024-12-01“…The main areas of activity of a civil defendant’s representative are summarised as follows: 1) identifying other co-defendants if the damage was caused by the actions of more than one person; 2) checking whether the representative of the civil plaintiff has sufficient grounds to represent the interests of the state, a minor, incapacitated or partially incapacitated victim; 3) filing an objection to the claim, provided that there are sufficient grounds and the defendant is not properly identified; 4) recognising the claim in whole or in part based on a thorough study and analysis of the text of the civil claim; 5) assessing the nature and amount of claims, including material claims, set out in the claim, determining their objectivity and relevance to the circumstances of the case, the reliability and sufficiency of evidence provided in support of them in order to formulate an appropriate legal position; 6) finding out whether any person has previously compensated for the damage caused; 7) verifying the validity of actions taken by the prosecution to secure the claim, etc. Given these areas of activity of the civil defendant's representative, the author concludes that in general, this participant in criminal proceedings performs the following functions: informational, supportive and protective. …”
Get full text
Article -
9017
Investigating the Impacts of Road Traffic Conditions and Driver’s Characteristics on Automated Vehicle Takeover Time and Quality Using a Driving Simulator
Published 2021-01-01“…With these findings, this study emphasizes the importance of having effective countermeasures and driver interface to monitor drivers in the automated vehicle system; therefore, an early and effective alarm system to alert drivers for the vehicle takeover can secure enough time for stable recovery to manual driving and ultimately to achieve safety during the takeover.…”
Get full text
Article -
9018
Self-Reported Violence Experienced by Swiss Prehospital Emergency Care Providers
Published 2021-01-01“…In order to increase their own security, they increased their protection. These results illustrate their feelings of insecurity, which may have deleterious effects on work satisfaction and motivation. …”
Get full text
Article -
9019
The Paradox of Indonesia Cyberspace Policy and Cooperation: Neoclassical Realism Perspective
Published 2022-09-01“…Cyberspace is a new threat to state security, especially in Indonesia. The increase of internet users in Indonesia is followed by several policies Jakarta takes to adapt to the fast pace of cyberspace challenges. …”
Get full text
Article -
9020
Assessment of Ecosystem Vulnerability in the Tropic of Cancer (Yunnan Section)
Published 2025-01-01Get full text
Article