414 results found (page 5 of 28)
https://www.academia.edu/120307644/The_Enlargement_Policy_of_the_European_Union_and_Its_Li…

…roaching the end of the IGC and the new revised treaty is in sight, the dice is about to be cast: Which applicant countries are to become future members of the Union and when? The aim of this paper is to explore the link between the enlargement policy of the EU and its external h…

https://www.academia.edu/145188200/Detecting_Cybercrime_Risks_in_Employee_Behavior_Using_G…

…ke up the suggested model's flowchart. Section 4 presents the research findings about the model's performance in comparison to other tested models, along with a brief overview of these models. Finally, Section 5 presents the inferred conclusion from our trials with the future sco…

https://www.academia.edu/145188009/Automated_Smart_Attendance_System_for_Higher_Education_…

…e recognition. One kind of computer vision is face recognition, which uses data about a person's facial features to determine their identification. To put it simply, there are two main components to face recognition: detection and matching. In order to identify a person, face rec…

https://www.academia.edu/8327230/Welfare_Benefits_criteria_and_information_an_advice_sheet…

… 2014) and UK migrants‟ rights NGOs (Flynn, 2014) have warned the UK government about the possible contradiction of these new national rules to EU law guaranteeing freedom of movement. The European Commission has yet to release its assessment of the recent legal developments in r…

https://www.academia.edu/5491979/Rethinking_Insecurity_War_and_Violence_Beyond_Savage_Glob…

…forms of identity, primordial and irrational assertions of politics. Such ideas about the sources of insecurity have become entrenched in a wide variety of media sources, and have framed both government policies and academic arguments. Rather than treating the sources of insecuri…

https://www.academia.edu/51484250/Shaping_the_European_External_Action_Service_and_its_pos…

…s EEAS and crisis management institutions, scholars can gain important insights about how “personal qualities” and prior foreign policy experience can influence the HR/VPs strategic choices and their impact within and across the EEAS. Finally, the article considers the differing eff…

https://www.academia.edu/128427133/Permissioned_Blockchain_Network_for_Proactive_Access_Co…

…data. Conclusions Our proposed mechanism informs proactively the emergency team about patients’ critical situations by combining fuzzy and predictive techniques, and it exploits the distributed data of the blockchain network, guaranteeing the integrity and security of the data, a…

https://www.academia.edu/84665669/Endocrine_disrupting_compounds_in_streams_in_Israel_and_…

… or release into the environment (Cohen et al., 2016; Tal and Katz, 2012), only about 20% of the raw sewage produced within the PA (including much of the sewage produced in Israeli settlements) is treated within the PA. Another 14% of the wastewater from the PA is captured and tr…

https://www.academia.edu/827502/Beyond_Exceptionalism_New_Security_Conceptions_in_Contempo…

…se elites were neither willing nor eager to stimulate larger public discussions about national security. 252 CONTEMPO RA RY SECURITY POLICY Only by the 1970s did challengers to these established positions emerge, largely from a heterogeneous group of peace activists and ecologist…

https://www.academia.edu/130111058/In_the_factory_of_migratory_risk_Latin_American_women_i…

… the “migratory risk.” Political scientist Casella Colombeau (2017) has written about the way in which the French border police contributed to (re)defining the target of border controls during the second half of the 20th century. Following on from the work on police autonomy (Mon…

https://www.academia.edu/1269095/Radicalisation_and_media_connectivity_and_terrorism_in_th…

… in the shape of indi- 18 viduals and groups holding or espousing radical views about religion, ideology, 19 20 21 oo often represented in the media as oppositional to Western values. This book asks what, if anything, is new about these radicalising discourses, how and why they r…

https://www.academia.edu/108022047/Performance_and_Power_Efficient_Massive_Parallel_Comput…

…chitectures, up to 10 million number of cores are resided per node that consume about 25 to 60 MW power. Applying this power consuming ratio, Exascale computing systems will demand up to 130 MW power consumption to achieve Exaflops which is not affordable for maximum countries. H…