Showing 5,641 - 5,660 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 5641
  2. 5642
  3. 5643

    REPRODUCTION OF BUSINESS POTENTIAL IN UKRAINE by Tetiana Kharchuk, Kateryna Klymenko, Oksana Shkolenko, Victoria Melnik

    Published 2025-01-01
    “…The article examines the impact of Ukraine’s EU candidate status on the innovative component of business economic security. It emphasizes the importance of innovation for business and the role of the EU in promoting innovative practices. …”
    Get full text
    Article
  4. 5644

    Biochemical and Histopathological Studies of Key Tissues in Healthy Male Wistar Rats Fed on African Yam Bean Seed and Tuber Meals by Omena Bernard Ojuederie, John Adebayo Ajiboye, Olubukola Oluranti Babalola

    Published 2020-01-01
    “…To mitigate this effect, focus is being given to orphan or underutilized crops with immense potentials to boost food and nutrition security in Africa, such as the African yam bean (AYB) Sphenostylis stenocarpa. …”
    Get full text
    Article
  5. 5645

    Ex-ante impact of pest des petits ruminant control on micro and macro socioeconomic indicators in Senegal: A system dynamics modelling approach. by Joshua Aboah, Andrea Apolloni, Raphaël Duboz, Barbara Wieland, Pacem Kotchofa, Edward Okoth, Michel Dione

    Published 2023-01-01
    “…Also, the consequences of PPR control on socioeconomic indicators like food and nutrition security at a macro-national level have not been explored thoroughly. …”
    Get full text
    Article
  6. 5646

    Effectiveness of Health Management Information System in Selected Sub-Counties of Ryakarimira Town Council and Rubaya Sub-County. by Ayebare, Esther Loy

    Published 2024
    “…The study recommended enhancing infrastructure, providing comprehensive training, investing in updated technology, and securing additional resources.…”
    Get full text
    Thesis
  7. 5647

    Investigating the Factors Affecting the Growth of Tourism in Kabale Municipality. by Amiidu, Muriisa

    Published 2024
    “…Based on results from the study, 100% of the respondents agreed that potential factors that have led to the growth in the Kabale district include; environment and events, community perception, accessibility of infrastructure, good reception, lodge owners and managers, natural attraction, perceived safety and security and Perceived safety and security. The study findings revealed how government policy has contributed to tourism in Kabale district were presented in the table and these included consolidating and streamlining the law relating to tourism. …”
    Get full text
    Thesis
  8. 5648

    Effect of Household Income on Household Welfare in Kitumba Sub-County Kabale District. by Kakuru, Richard

    Published 2024
    “…The objectives of the study were; to find out the effect of household income on the level of education in Kitumba sub-county Kabale District, to investigate the effect of household income on health accessibility in Kitumba sub-county Kabale District and to establish the effect of household income on food security in Kitumba sub-county Kabale District. A cross-sectional study design was used and data was collected using interviews and questionnaires. …”
    Get full text
    Thesis
  9. 5649

    Simple power analysis attack against cryptosystems based on Montgomery algorithm by Gang GAN, Min WANG, Zhi-bo DU, Zhen WU

    Published 2013-08-01
    “…The SPA (simple power analysis) attacks against public-key cryptosystems based on Montgomery algo-rithm implementation were presented by exploitation of the inherent security vulnerability which that sensitive informa-tion leakage could be used by side-channel attack. …”
    Get full text
    Article
  10. 5650

    Safe Harbor Agreement: A Regulatory Assurance under the Endangered Species Act by Melissa M. Kreye, Elizabeth F. Pienaar, Raoul K. Boughton, Lindsey Wiggins

    Published 2016-02-01
    “… The involvement of the private sector is critical for the conservation and recovery of many species, but landowners’ fears that increased management restrictions could keep them from enjoying their land can present a challenge to securing their trust and assistance in conservation efforts. …”
    Get full text
    Article
  11. 5651

    Water in the Chartreuse, a mirror reflecting a renewal of relationships between mountains areas and their surrounding towns by Bérangère Serroi, François Besancenot, Philippe Brégard, Gérard Hanus, Fabien Hobléa

    Published 2016-03-01
    “…In so doing, it analyses the new management strategies that communities have adopted and explores possible synergies against a backdrop of the power relationship between private and public management in order to move towards an approach that embraces solidarity and security of supply.…”
    Get full text
    Article
  12. 5652

    Human rights in procedural democracies: a contribution to the debate by José Armando Ponte Dias Júnior, Eneida Desiree Salgado

    Published 2021-12-01
    “…Liberal democracy – descriptive, procedural and to some extent minimalist, primarily concerned with formally securing classic individual freedoms – now faces an acute crisis, with its historic achievements threatened by populist and undemocratic ideas. …”
    Get full text
    Article
  13. 5653

    «Save the Man». In way of documentary and exhibition project by Yu. Z. Kantor

    Published 2020-02-01
    “…The article, thanks to documents from the Pantyukhov family archive, the archives of the Federal Security Service of Russia in the Omsk Region and the Ministry of Internal Affairs of Russia in the Magadan Region, the Historical Archive of the Omsk Region and the archive of the Omsk State Medical University, for the first time put into scientific circulation, makes it possible to find out the details of the biography of Pantyukhov, who devoted himself to serving the most humane from professions…”
    Get full text
    Article
  14. 5654

    Scheme of Attribute-Based Disclosure Mobile Trust Negotiation by Qiuyun Wang, Wenbao Jiang, Hong Wang

    Published 2013-10-01
    “…For it is difficult to use traditional trust negotiation on the mobile environment,which has large communication overhead,storage overhead and computational overhead,an attribute-based disclosure mobile trust negotiation scheme was proposed.In the negotiation process,two sides in trust negotiation exchange certificate which contains encrypted credential attributes firstly,then,one side in trust negotiation can selectively dispose the sensitive attributes to the other side in trust negotiation procedure based on the trust evaluation result of the other,next,two sides in trust negotiation exchange attribute encryption key based on personal security policy until the trust negotiation was completed.The implementation procedure was given in concrete application instances and the scheme was analyzed.…”
    Get full text
    Article
  15. 5655

    Cost Share Programs for Florida's Agricultural Producers and Landowners by Rao Mylavarapu, Kelly Hines, Alyssa Dodd

    Published 2009-01-01
    “… SL-264, a 4-page fact sheet by Rao Mylavarapu, Kelly Hines, and Alyssa Dodd, describes several conservation programs included in the 2008 Farm Bill — the Environmental Quality Incentives Program (EQIP), Wetlands Reserve Program (WRP), Grassland Reserve Program (GRP), Wildlife Habitats Incentive Program (WHIP), and the Conservation Security Program (CRP) — which may be of high interest to farmers, ranchers, land owners, agricultural consultants, local decision-makers and extension agents. …”
    Get full text
    Article
  16. 5656

    The Art of Storytelling in Science: A Personal Journey by Bruno Bezerril Andrade

    Published 2025-02-01
    “…Drawing from my experiences across Brazil, the United States of America, India, and South Africa, I explore how crafting compelling narratives enhances scientific communication, increasing the likelihood of publishing, securing funding, and building collaborations. Reflecting on formative “hot seat” sessions at the National Institutes of Health, in the United States, I emphasize the importance of structuring ideas clearly, regardless of language fluency. …”
    Get full text
    Article
  17. 5657

    Flat Experience Curve Profiles of Foreign Employees in Germany by Stephan Brunow, Oskar Jost

    Published 2021-11-01
    “…Abstract This paper sheds light on the wage structure of foreign and German employees who are subject to social security contributions in fulltime employment and focuses on the experience structure. …”
    Get full text
    Article
  18. 5658

    « Peurs » et pratiques répressives : mobilisations musulmanes et pouvoir éthiopien (2011-2014) by Jean-Nicolas Bach

    Published 2015-04-01
    “…But conjunctures should be taken into account in a region marked by real security threats. Above all, recent religious tensions are deriving from concrete political authoritative practices of the regime’s leadership.…”
    Get full text
    Article
  19. 5659

    Scenario Building by Design: Pathways Towards Anticipative Collaborative Governance 
by Design by Corbin Raymond

    Published 2025-01-01
    “…In focus is the use of scenario building that is communicated through conceptual and process diagrams, as well as contextual situations of people participating with designed artefacts to illustrate how scenario building can encourage community engagement to address challenges like water security and stewardship. By building on established design practices and literature on scenarios in design, the article proposes ‘Anticipative Collaborative Governance’ as a model for creating long-term, systemic solutions through design. …”
    Get full text
    Article
  20. 5660

    Legislative reflection on critical information infrastructure protection in China by UANGDao-li HUANG, Ting FANG

    Published 2016-03-01
    “…To speed up the formulation and promulgation of critical information infrastructure protection legislation, the organization system and its working mechanism of critical information infrastructure protection should be clearly defined, and early warning and monitoring mechanism, emergency response and recovery mechanisms, security supervision system, accountability system and basic safeguard system should be built.…”
    Get full text
    Article