Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
821
Perennial crop farming and food security in Kigezi: a case study of Kigezi highland tea
Published 2023Subjects: Get full text
Article -
822
Security of Physical Library Materials and Utilisation: A Case Study of National Teachers College Kabale.
Published 2023“…The purpose of the study was to assess the status of the security of physical library materials and their utilization at National Teachers College Kabale. …”
Get full text
Thesis -
823
Assessing the Influence of High Population Growth Rate on Food Security in Nyamweru Subcounty Rubanda District.
Published 2024Subjects: Get full text
Thesis -
824
Perennial crop farming and food security in Kigezi: a case study of Kigezi highland tea
Published 2023Subjects: Get full text
Article -
825
-
826
The Paradox of Cyber Warfare and Clausewitz’s Conception of War
Published 2025-01-01Subjects: Get full text
Article -
827
From pyramid to pillar : population change and social security in Europe.
Published 1989Subjects: “…Social security Europe. 10386…”
View in OPAC
Book -
828
Design and Construction of an Aquaponics System: A Sustainable Approach to Enhancing Local Food Security in Offa, Nigeria
Published 2025-02-01Subjects: Get full text
Article -
829
Investigating the effect of sense of security and perceived value on tourists\' spatial attachment Case Study (Zanjan Province)
Published 2022-09-01Subjects: “…feelings of security…”
Get full text
Article -
830
Retracted: Construction of Social Security Fund Cloud Audit Platform Based on Fuzzy Data Mining Algorithm
Published 2023-01-01Get full text
Article -
831
Comparison of Port Security Switch Layer 2 MAC Address Dynamic With MAC Address Static Sticky
Published 2022-12-01Subjects: Get full text
Article -
832
Investigating the relationship between the sense of belonging to the place and the level of social security of citizens - Case study: Qom-
Published 2021-06-01Subjects: “…security…”
Get full text
Article -
833
Multi-hop broadcast message dissemination in vehicular ad hoc networks: A security perspective review
Published 2017-11-01“…Among these issues, those related to security are of particular importance. In this article, the main security issues of broadcast message dissemination in vehicular ad hoc networks are discussed. …”
Get full text
Article -
834
N − 1 Security Criteria Based Integrated Deterministic and Probabilistic Framework for Composite Power System Reliability
Published 2024-01-01“…In this paper, N − 1 security criteria based reliability of the composite power system (CPS) is proposed using an integrated deterministic and probabilistic framework (D-P) considering outage of the transmission line. …”
Get full text
Article -
835
Theorizing International Politics of Research, Science, and Technology: Implications for Global Governance, National Security, and Economic Growth
Published 2023-07-01“… This article examines the value of understanding the international politics surrounding research, science and technology (RST) in today‟s world.It encompasses intricate connections between nations, international organizations, and multinational enterprises,which is essential for economic growth, social development, and national security.The significance of elements like anarchy, capitalism, welfare, and security that influences the global politics of RST is highlighted in the essay.In order to counteract technology misuse, the authors stress the significance of establishing ethical standards. …”
Get full text
Article -
836
The Impact of Peatland Damage and Its Influence on Food Security Policy in Sungai Apit Sub-District in 2023
Published 2025-01-01Subjects: Get full text
Article -
837
A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks
Published 2013-05-01“…However, they have serious limitations in terms of security and usability. First, even though they are enhancements of other works, they still have several security flaws, such as vulnerability against parallel session, privileged-insider, and gateway-node bypassing attacks and lack of mutual authentication between user station and gateway node. …”
Get full text
Article -
838
A Blockchain-Assisted Federated Learning Framework for Secure and Self-Optimizing Digital Twins in Industrial IoT
Published 2025-01-01“…Optimizing digital twins in the Industrial Internet of Things (IIoT) requires secure and adaptable AI models. The IIoT enables digital twins, virtual replicas of physical assets, to improve real-time decision-making, but challenges remain in trust, data security, and model accuracy. …”
Get full text
Article -
839
Deep learning–based resource allocation for secure transmission in a non-orthogonal multiple access network
Published 2022-06-01Get full text
Article -
840
Ukraine-Russian Federation Relations within the Concepts of Security Dilemma and Responsibility To Protect (R2P)
Published 2023-07-01Subjects: “…international security…”
Get full text
Article