Showing 5,061 - 5,080 results of 9,720 for search '"Securities ', query time: 0.13s Refine Results
  1. 5061

    Key Discourses of Turkish Eurasianism and Their Impact on Turkey’s Foreign Policy by Ғ.Б. Жұматай, А.С. Ысқақ

    Published 2024-12-01
    “…From this standpoint, it would be premature to talk about the Turkish disengagement from the West and its pivot to Eurasia, as Ankara’s security and foreign policy are closely intertwined with the West and deeply embedded within the Western security system. …”
    Get full text
    Article
  2. 5062

    Is there a relationship between human development and dependence on fisheries? by Can Mehmet Fatih, Mazlum Yavuz, Erkan Birol

    Published 2023-06-01
    “…International food and raw material security issues has gained much more importance than ever. …”
    Get full text
    Article
  3. 5063

    BNPL in the Consumerism World: About the Excessive Debt Trap by Bartosz Bagniewski, Jakub Kubiczek, Zuzanna Żuchowska

    Published 2024-12-01
    “…Like other digital services, BNPL requires the sharing of personal data, introducing potential security concerns. Therefore, BNPL providers must prioritize data protection to secure consumer information. …”
    Get full text
    Article
  4. 5064

    Breaking the Barriers for Women Participation in Agroforestry in the Context of AfCFTA by Patrick Opoku, Awonlimali Kenneth Ali, Peter Ampadu-Daaduam, Dorothy Asare Akoto

    Published 2025-01-01
    “…With the establishment of the African Continental Free Trade Area (AfCFTA), there arises a unique opportunity to leverage agroforestry for food security, environmental protection, and poverty alleviation. …”
    Get full text
    Article
  5. 5065

    Factoring Central Asia in the Russia-India Energy Trade by A. Dhaka, M. Dmitrieva

    Published 2020-12-01
    “…India and Russia share a very special relationship due to long-standing cultural and political ties and this has been a facilitator to India’s energy security needs. The Central Asian Republics hold a special position for Russia and India in terms of strategic security across South and Central Asian region. …”
    Get full text
    Article
  6. 5066

    Application of BIM Digital Information Technology in the Economic Optimization Operation of Integrated Energy Systems by Jingjing Bu

    Published 2022-01-01
    “…Energy is an important support for national economic development, and energy security directly affects national security, sustainable development, and social stability. …”
    Get full text
    Article
  7. 5067

    Questions of the legal nature of the Minsk agreements (international legal analysis) by V. V. Markov, A. V. Voitsikhovskyi

    Published 2020-12-01
    “…For Ukraine, which in the framework of the «hybrid war» faced such factors as the temporary occupation of the territory of Ukraine by the Russian Federation, issues of peace and security in the east of the state have become extremely important. …”
    Get full text
    Article
  8. 5068

    UKRAINE’S ENERGY POLICY IN THE POST-SOVIET ERA by Y. V. Borovsky

    Published 2016-08-01
    “…In the post-Soviet era the Ukrainian authorities, irrespective of their political affiliations, have tried to diversify the Russian oil and gas supplies either by securing deliveries from other sources or by enhancing production within the country. …”
    Get full text
    Article
  9. 5069
  10. 5070
  11. 5071

    Explainable correlation-based anomaly detection for Industrial Control Systems by Ermiyas Birihanu, Imre Lendák

    Published 2025-02-01
    “…The method is evaluated on the Secure Water Treatment (SWaT), Hardware-in-the-loop-based augmented ICS security (HIL-HAI), and Internet of Things Modbus dataset using precision, recall, and F-1 score metrics. …”
    Get full text
    Article
  12. 5072

    Electronic invoice public verification scheme based on SM2 coalition signature algorithm by Yurong LUO, Jin CAO, Hui LI, Xingwen ZHAO, Chao SHANG

    Published 2022-04-01
    “…In order to solve the current problems of electronic invoices, such as anti-counterfeiting, privacy leakage and low verification efficiency, an electronic invoice public verification architecture based on the national signature algorithm was proposed.Electronic invoice documents have complex data sources, sensitive user information on the ticket surface, frequent data flow and other characteristics as well as the demand for efficient public verification.Based on these motivations, the e-invoice generation and verification protocol was designed.Besides, a signature code generation scheme for invoice anti-counterfeiting was proposed based on certificate-free joint signature.Then multiple data verification and signatures of the invoicing party and the taxation authority can be realized.All kinds of invoice holders can not only verify the authenticity and data integrity of electronic invoices, but also publicly check the authenticity and data integrity of electronic invoices.The integration of data encryption algorithms protects user privacy data in electronic invoices, and at the same time can fulfill the requirements for authenticity or status verification under various invoice application scenarios.The checking party only needs to verify one signature to confirm the authenticity of the electronic invoice signed by both parties.Scyther security simulation tools were used to analyze the security of the proposed solution, which can verify the integrity and authenticity of the data source and check the confidentiality of the privacy data under various types of attacks.Compared with a typical overseas e-invoice checking scheme and a similar digital signature-based e-invoice checking scheme, the proposed scheme has obvious advantages in terms of checking efficiency and invoice file size.…”
    Get full text
    Article
  13. 5073

    POLITICAL ECONOMY OF RUSSIA-UKRAINE WAR AND THE MACRO-ECONOMIC INSTABILITY IN EUROPE by CELESTINE OGECHUKWU OKAFOR, WOYINMO TIMI AMAKOROMO, VICTOR IHEANYI ASIEGBU

    Published 2024-12-01
    “…The findings of this paper showed that the war has far-reaching implications, notably impacting energy security in Europe due to disruptions in energy supply routes. …”
    Get full text
    Article
  14. 5074
  15. 5075

    Coverless Steganography for Face Recognition Based on Diffusion Model by Yuan Guo, Ziqi Liu

    Published 2024-01-01
    “…It ensures the higher security of hidden images and solves the limitation of existing methods in protecting the privacy of face images. …”
    Get full text
    Article
  16. 5076

    Hybrid quantum enhanced federated learning for cyber attack detection by G. Subramanian, M. Chinnadurai

    Published 2024-12-01
    “…Abstract Cyber-attack brings significant threat and become a critical issue in the digital world network security. The conventional procedures developed to detects are centralized and often struggles with concerns like data privacy and communication overheads. …”
    Get full text
    Article
  17. 5077

    SINO-NIGERIA RELATIONS AND GLOBAL OIL POLITICS, 1999-2023: ASYMMETRICAL OR SYMMETRICAL? by RUTH O. OGUNNOWO, SAMUEL S. OJO

    Published 2024-07-01
    “…This paper examines Sino-Nigerian relations within the context of global politics, focusing on China's primary interest in securing access to Nigeria's natural resources to sustain its expanding economy. …”
    Get full text
    Article
  18. 5078

    Intensive care nurses’ experiences of teamwork during the covid-19 pandemic. a qualitative study. by Jeanette Eckerblad, Åsa Dorell, Helen Conte

    Published 2025-01-01
    “…Conclusion Losing the security of the intensive care unit team, having to adapt to constant changes, and the need to provide care to an increased number of critically ill patients led to a sense of being left to manage on their own. …”
    Get full text
    Article
  19. 5079

    Formation and development of the militia: historical and legal analysis by O. K. Maliutina, M. D. Klymenko

    Published 2024-06-01
    “…The necessity of studying the historical processes of formation of the modern police, its institutional origins in the context of the State development is emphasised, and the crucial role of the police in maintaining the rule of law, public order and security of citizens of modern Ukraine is noted. The study of historical factual material contributes to a better understanding of the evolution, nature and role of state institutions designed to protect Ukraine's sovereignty and solve other tasks in the field of national security and law enforcement in response to the needs of society, offering ideas for future effective strategies based on historical experience and current challenges.…”
    Get full text
    Article
  20. 5080

    Soil quality indicator-based land productivity modelling for agricultural sustainability. by Ibraheem A H Yousif, Ali Abdel Hamid, Abdalsamad A Aldabaa, Sayed A Hassanein, Nazih Y Rebouh, Elsayed Said Mohamed, Mohamed S Shokr

    Published 2025-01-01
    “…Rapid population expansion has made food security a global concern for humanity, necessitating a sustainable assessment of natural resources. …”
    Get full text
    Article