Results 21 to 30 of about 5,525,844 (353)
The impact of foreign markets globalization on the price and functionality of electronic access control systems [PDF]
Research background: The research, which is the subject of the paper, is based on the global expansion of the use of electronic access control systems using biometric data for user verification.
Boroš Martin, Lenko Filip, Velas Andrej
doaj +1 more source
Social Security Programs Throughout the World: The Americas, 2011 [PDF]
[Excerpt] This fourth issue in the current four-volume series of Social Security Programs Throughout the World reports on the countries of the Americas.
International Social Security Association +1 more
core +4 more sources
Evaluation of Airport Security Training Programs: Perspectives and Issues [PDF]
While many governments and airport operators have emphasized the importance of security training and committed a large amount of budget to security training programs, the implementation of security training programs was not proactive but reactive ...
De Gramatica, Martina +4 more
core +1 more source
Bone metastatic carcinoma coexisting with plasma cell myeloma: a case report
Objective Multiple myeloma is a clonal plasma cell proliferation often causing bone lytic lesions. It is sometimes challenging to differentiate these lytic lesions associated with multiple myeloma from bone destruction due to a metastasis.
Marwa Aloui +5 more
doaj +1 more source
This article investigates how modern neo-liberal states are 'securing by design' harnessing design to new technologies in order to produce security, safety, and protection.
Adorno +60 more
core +1 more source
The rapid expansion of nuclear technology across various sectors due to global economic growth has led to a substantial rise in the transportation of radioactive materials.
Panpan Jiang +7 more
doaj +1 more source
Computer security and security technologies [PDF]
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information.
Dragan Velickovic, Lazar Stošić
openaire +2 more sources
How do foreign powers disengage from a conflict? We study this issue by examining the recent, large-scale security transition from international troops to local forces in the ongoing civil conflict in Afghanistan. We construct a new dataset that combines information on this transition process with declassified conflict outcomes and previously ...
Fetzer, Thiemo +3 more
openaire +4 more sources
Particle Propagation Model for Dynamic Node Classification
With the popularity of online social networks, researches on dynamic node classification have received further attention. Dynamic node classification also helps the rapid popularization of online social networks.
Wenzheng Li +4 more
doaj +1 more source
5G Security Threat Assessment in Real Networks
Advances in mobile communication networks from 2G to 5G have brought unprecedented traffic growth, and 5G mobile communication networks are expected to be used in a variety of industries based on innovative technologies, fast not only in terms of ...
Seongmin Park +5 more
doaj +1 more source

