Showing 5,221 - 5,240 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 5221

    Whole of Government: An Effective Strategy for Ensuring Child Support Post-Religious Court Rulings by Istiqomah Sinaga, Asmuni Asmuni, Dhiauddin Tanjung

    Published 2024-10-01
    “…This research aims to evaluate how well the 'Whole of Government Response' strategy works in securing post-divorce child support.…”
    Get full text
    Article
  2. 5222

    A global open-source dataset of monthly irrigated and rainfed cropped areas (MIRCA-OS) for the 21st century by Endalkachew Abebe Kebede, Kevin Ong’are Oluoch, Stefan Siebert, Piyush Mehta, Sarah Hartman, Jonas Jägermeyr, Deepak Ray, Tariq Ali, Kate A. Brauman, Qinyu Deng, Wei Xie, Kyle Frankel Davis

    Published 2025-02-01
    “…Abstract Crop production is among the most extensive human activities on the planet – with critical importance for global food security, land use, environmental burden, and climate. …”
    Get full text
    Article
  3. 5223

    Some Issues of Normative and Legal Regulation of Weapons in Ukraine by K. L. Buhaichuk

    Published 2021-07-01
    “…The publication defines the directions for improving the draft laws under consideration in terms of: definitions of the terms of «sporting weapon», «thermal imaging sight», «signal weapon», «night vision sight», «training-split weapon - neutralized weapon», «right to carrying weapon», «right to own weapon»; introduction of the terms of «law enforcement agency», «intelligence agency», «law enforcement agency of special purpose», «state agency of special purpose with law enforcement functions» into the conceptual apparatus of the law, since some authors use them to define the regime of special circulation of civil firearms; establishment of restrictions on the number of civilian firearms and ammunition for them, which can be acquired by an individual; creating legislative prerequisites for the approval of a by-law, which will clearly provide the procedure for transferring seized weapons to the National Police for further storage; securing the obligation of security personnel to provide emergency medical care to persons to whom they use weapons; introduction of norms that will establish the obligation of applicants for the acquisition, possession and use of weapons to take the appropriate courses within first aid; preservation of the wording of the Articles 190-195 of the Code of Ukraine on Administrative Offenses until the relevant law on the legal regime of sidearm is adopted.…”
    Get full text
    Article
  4. 5224
  5. 5225

    USERS’ SATISFACTION WITH INTERCITY BUS TERMINAL QUALITY IN LAGOS STATE, NIGERIA by Umar Obafemi SALISU, Mubarak Olabanji GAFAR, Ayobami Ademola AKANMU, Sekinat Motunrayo SANNI, Simeon Oluwagbenga FASINA

    Published 2024-06-01
    “…Top-rated challenges affecting terminal operations are security concerns, sanitation facility deficiencies and insufficient passenger amenities. …”
    Get full text
    Article
  6. 5226

    The Impact of Stone Quarrying on Socio Economic Status of Households in Nyakyibigi Ntungamo Municipality. by Natweeta, Elvason

    Published 2023
    “…The study findings on strategies to curtail the problems faced by people resulting from stone quarrying in Nyakyibigi Ntungamo municipality were; provision of tax holidays to investors, strengthening of security in quarrying areas, importing equipment's to use in quarrying process and rehabilitation of roads. …”
    Get full text
    Thesis
  7. 5227

    An Examination of Records Retention and Disposition Policy at Kabale University. by Nayakiira, Promise

    Published 2024
    “…The majority of the respondents showed that there is inadequate knowledge about the retention and disposition policy at Kabale University. Lack of security and privacy was also reflected by respondents who showed that the retrieved records may lack security and privacy since they are displayed for review and discussion hence affecting their privacy. …”
    Get full text
    Thesis
  8. 5228

    Agribusiness strategy and rural development: A case study of Ihunga Sub County, Ntungamo District by Denis, Simpson Singahache

    Published 2022
    “…The key study findings were: lack of provision of food security strategy, poor policy articulation and lack of supply of agricultural inputs to farmers. …”
    Get full text
    Article
  9. 5229
  10. 5230

    Les nations indiennes, source inattendue d’innovation by Marie-Claude Strigler

    Published 2006-01-01
    “…Far from being fossilized societies, prisoners of their colonial past, Indian nations have always innovated in this domain, using their traditions to find new and original solutions to their economic problems, while securing their cultural identity. There is a renewal of Indian cultures whenever a tribe’s traditions and values are the basis of its development.…”
    Get full text
    Article
  11. 5231

    State-of-the-art survey of privacy-preserving data aggregation in wireless sensor networks by Xiaoying ZHANG, Hui PENG, Hong CHEN

    Published 2018-10-01
    “…A state-of-the-art survey of privacy-preserving data aggregation techniques in wireless sensor networks was reviewed.Firstly,preliminaries were introduced,including network models,adversary models,and performance evaluation metrics.Secondly,existing related work was classified into several types according to privacy preservation techniques,such as homomorphic encryption,data perturbation,slicing-mixing technique,generalization,secure multiparty computation,and the key mechanisms of typical protocols were elaborated and analyzed.Finally,the promising future research directions were discussed.…”
    Get full text
    Article
  12. 5232

    Research on intrusion detection of industrial control system by Ying-xu LAI, Zeng-hui LIU, Xiao-tian CAI, Kai-xiang YANG

    Published 2017-02-01
    “…Industrial control system was an important part of national critical infrastructure,once it was suffered from the cyber attack,it would cause property damage,casualties and other serious disasters.For providing theoretical supports to industrial security researchers,the features of attacks in an industrial control system and the difficulties of detection to these attacks were introduced.Then,a survey of intrusion detection technologies used by the industrial control systems was given.Also,the performance and characteristic were compared for the different types of detection technologies.Fi-nally,an industrial intrusion detection research was generated.…”
    Get full text
    Article
  13. 5233

    Threshold traceability anonymous authentication scheme without trusted center for ad hoc network by Fang-bin LIU, Kun ZHANG, Hai LI, Hong ZHANG

    Published 2012-08-01
    “…In order to provide anonymous authentication for ad hoc network,democratic group signatures with centerless secret sharing scheme and proposed a threshold traceability anonymous authentication scheme without trusted center for ad hoc network were combined.The scheme was centerless and self-organized,which was well suited to the characters of ad hoc network and had solved the problem that those schemes of traditional network were not suited to the ad hoc network.The prover of the scheme was anonymous,traceable,and complete,which well satisfied the security of anonymous authentication.…”
    Get full text
    Article
  14. 5234

    Boardroom electronic voting scheme based on DC-net by Long-hai LI, Shao-feng FU, Cheng-qiang HUANG

    Published 2012-09-01
    “…A novel electronic voting scheme was proposed which was quite suitable for small scale election setting.An outstanding characteristic of the design was its guarantee of unconditionally perfect ballot secrecy.It satisfied self-tallying,fairness and verifiability.Disruption of the result of an election equals to breaking the discrete logarithm problem.The scheme is built on top of the DC-net (dining cryptographers network) anonymous broadcast protocol.It needs no trusted authority to guarantee its security,but assumes a complete network of private channels between voters.…”
    Get full text
    Article
  15. 5235

    Unknown attack detection model based on network behavior analysis by Yi-han YU, Yu FU, Xiao-ping WU

    Published 2016-06-01
    “…As for the intranet security threats of the increasing number of unknown attacks,an unknown attack detection model based on network behavior analysis was proposed.With the help of the information resources within the intranet,firstly,the information resources of the intranet were collected,then the risk factors of abnormal behav-ior of the internet information node were analyzed,finally,the information node and the information resources ac-quisition path as the key element were used to construct the detection model of the directed graph.By verifying,the model can achieve the desired detection results.…”
    Get full text
    Article
  16. 5236

    Construction of network ecological civilization based on the anti-terrorism of colleges and universities by You-deng CHEN

    Published 2017-06-01
    “…Firstly,the basic connotation,significance and potential crisis of the network ecological civilization were introduced.Secondly,the basic situation of the current network terrorism and the challenge to the human civilization and security were analyzed,and the information dissemination was the foundation and that the key point of building the network ecological civilization was put forward.Finally,from the construction of the network discourse system,the construction of the network culture system,the construction of the network ethics system,the planning suggestions were put forward to explore and perfect the construction of the anti-terrorism path of the university network in our country.…”
    Get full text
    Article
  17. 5237

    Executive dynamic scheduling algorithm based on high-order heterogeneity by Hongyong JIA, Yunfei PAN, Wenhe LIU, Junjie ZENG, Jianhui ZHANG

    Published 2022-03-01
    “…At present, most isomer scheduling models in DHR systems only considered second-order isomerism and lack dynamics.In order to solve these problems, a dynamic scheduling algorithm was proposed, which combined heterogeneity and dynamics by determining a scheduling scheme with maximum scheduling value.The value was obtained by combining high-order heterogeneity and historical information.The experimental results show that the proposed algorithm has better defense capabilities than other scheduling algorithms, and its strategy can achieve a balance of dynamics and security.…”
    Get full text
    Article
  18. 5238

    Research on the Architecture of a Basic Reconfigurable Information Communication Network by Ruimin Wang, Lei Zhuang, Yuqiang Luo, Hongchang Chen

    Published 2013-01-01
    “…The current information network cannot fundamentally meet some urgent requirements, such as providing ubiquitous information services and various types of heterogeneous network, supporting diverse and comprehensive network services, possessing high quality communication effects, ensuring the security and credibility of information interaction, and implementing effective supervisory control. …”
    Get full text
    Article
  19. 5239

    Iterative algorithms with seminorm-induced oblique projections by Yair Censor, Tommy Elfving

    Published 2003-01-01
    “…Existence and uniqueness of such projections are secured via directional affinity of the sets with respect to the diagonal matrices involved. …”
    Get full text
    Article
  20. 5240

    Random Emission and Control of Whispering Gallery Mode Using Flexible Optical Fiber by Bingyang Cao, Zhen He, Weili Zhang

    Published 2025-01-01
    “…Additionally, the application of this laser in information security encryption is demonstrated and explored.…”
    Get full text
    Article