Showing 6,361 - 6,380 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 6361

    Constitutional basis of Austria’s accession to the European Union by E. A. Vodyanitskaya

    Published 2009-12-01
    “…Finally, a special provision confirming Austria’s participation in the Common Foreign and Security Policy of the Union was introduced.…”
    Get full text
    Article
  2. 6362

    THE PROCESS OF ESTABLISHING THE ADMINISTRATIVE SYSTEM FROM NGANG PASS TO THE SOUTHWESTERN REGION (XI - XVII CENTURY) by Bùi Văn Hùng

    Published 2020-03-01
    “…The article deals with the establishment of sovereignty, production organization, and security - cultural - social stability of the dynasties. …”
    Get full text
    Article
  3. 6363

    Fracture Behavior of Ion-Nitrided AISI 4140 Steel in accordance with Variable Applied Current Density by Hyun Jun Park, Bum Soo Kim, Chi Sung Ahn, Kyun Taek Cho, Kyoung Il Moon, Sang Sub Kim

    Published 2022-01-01
    “…In addition, the compressive stress generated by nitrogen-ion bombardment and implantation had an advantageous effect on the substantially enhanced fatigue strength; it acted as a protective layer to secure the surface from any external impact. It was found that fatigue strength is increased with increasing fracture toughness index on the surface on the sample. …”
    Get full text
    Article
  4. 6364

    L’émirat de Barqa et les Fatimides : les enjeux de la navigation en Méditerranée centrale au xie siècle by David Bramoullé

    Published 2016-06-01
    “…They created a corsary emirate in charge of the security of the shipping lanes in the name of the Fatimids. …”
    Get full text
    Article
  5. 6365

    Germany's Immigration Policy Towards Highly-Skilled Workers in the 21stCentury by N. N. Bolshova

    Published 2012-12-01
    “…In turn, developed and developing countries, faced with a shortage of personnel in high-tech industries and the "brain drain", modernize their immigration policy to attract highly qualified foreign personnel from all over the world and to secure its own intellectual resources. The article examines recent changes in the modern migration policy in Germany, which has become, on the one hand, more selective to different categories of workers, and on the other hand - more open for skilled personnel, especially from developing countries. …”
    Get full text
    Article
  6. 6366

    Rehabilitation of Maxillary Defect Using Zygomatic Implant Retained Obturator by Mounika Ayinala, Gautam Shetty

    Published 2021-01-01
    “…A surgical obturator was secured in position subsequent to the implant placement. …”
    Get full text
    Article
  7. 6367

    Mathematical Modeling and Optimal Control Strategy for a Discrete Time Drug Consumption Model by Abderrahim Labzai, Abdelfatah Kouidere, Bouchaib Khajji, Omar Balatif, Mostafa Rachik

    Published 2020-01-01
    “…We use four control strategies which are awareness programs through media and education, preventing contact through security campaigns, treatment, and psychological support along with follow-up. …”
    Get full text
    Article
  8. 6368

    Problems of investing in enterprises for processing and disposal of solid municipal waste by E. I. Shamanina, I. S. Arshinskaia

    Published 2022-03-01
    “…The issues of investing in enterprises engaged in the utilisation and processing of municipal solid waste are currently relevant due to increasing consumption, correspondingly increasing production and the amount of waste and require the most careful approach from the point of view of environmental security. The object of the research are the factors that determine the potential benefits of investing in enterprises of this industry. …”
    Get full text
    Article
  9. 6369

    Transformation of the Strategic Culture of Ukraine under the Influence of the Russian Threat by Olga Reznikova, Oleksandr Hryhorenko, Viacheslav Myronenko

    Published 2024-12-01
    “…This was based on an analysis of military-political behavior patterns, components, and manifestations of strategic culture, as reflected in state strategies on national security and defense, as well as in other relevant documents and texts. …”
    Get full text
    Article
  10. 6370

    Navigating diversity: Assessing gender inclusivity at the 2023 Association of Geographical Societies in Europe (EUGEO) Congress by Liliana Solé Figueras, Briana Bombana, Anna Ortiz Guitart

    Published 2025-01-01
    “…Additionally, gender disparities were identified in debate participation and feelings, with women expressing less comfort and security during discussions. The research aims to contribute to reflections on gender representation at academic conferences and to provide ideas for possible strategies to foster greater inclusion at such conferences. …”
    Get full text
    Article
  11. 6371

    Algorithm Domination As A New Surveillance System by Ahmet Ayhan Koyuncu, Muhittin Evren

    Published 2024-12-01
    “…Algorithms constitute a domination form because they threaten people's freedoms and security. Algorithm domination is seen as a form of control and discipline in today's world. …”
    Get full text
    Article
  12. 6372

    Effects of Neutralization, Decoloration, and Deodorization on Polycyclic Aromatic Hydrocarbons during Laboratory-Scale Oil Refining Process by Yuxiang Ma, Longkai Shi, Yulan Liu, Qiyu Lu

    Published 2017-01-01
    “…Data obtained in this study suggest that the use of activated carbon during oil refining process is highly recommended; moreover, these results provide a useful guidance for oil refining plant to reduce security risk and ensure the quality of the vegetable oil products.…”
    Get full text
    Article
  13. 6373

    Study and Analysis of Barriers for Implementation of Industry 4.0 Technologies Using Spherical Fuzzy TOPSIS Method by Akshay Kumar, Chimata Murli Krishna

    Published 2025-01-01
    “…Drivers such as government initiatives, establishment of fast internet connectivity, job security, etc., are recommended in this research work for minimizing the effect of barriers.…”
    Get full text
    Article
  14. 6374

    Covert Network Analysis for Key Player Detection and Event Prediction Using a Hybrid Classifier by Wasi Haider Butt, M. Usman Akram, Shoab A. Khan, Muhammad Younus Javed

    Published 2014-01-01
    “…National security has gained vital importance due to increasing number of suspicious and terrorist events across the globe. …”
    Get full text
    Article
  15. 6375

    ptimal Allocation of Orders in the Online Load Distribution and Load Balancing of Assembly Lines by Nima Rahmani, Amir Najafi

    Published 2022-03-01
    “…Proper assembly line planning is one of the challenges production managers face at the tactical level. Failing to apply a secure way of assembly line balancing can cause various complications and problems for the production system. …”
    Get full text
    Article
  16. 6376

    Effects of biological agents on rhizosphere microecological environment and nutrient availability for rice by Hang Zhou, Hang Zhou, Hang Zhou, Kaibo Yu, Lingli Nie, Lingli Nie, Lang Liu, Jianqun Zhou, Kunlun Wu, Kunlun Wu, Kunlun Wu, Honghong Ye, Zhaohui Wu, Zhaohui Wu, Zhaohui Wu

    Published 2025-01-01
    “…As the world’s population grows, pursuing sustainable agricultural production techniques to increase crop yields is critical to ensuring global food security. The development and application of biological agents is of great significance in promoting the sustainable development of agriculture. …”
    Get full text
    Article
  17. 6377

    Status of Biomass Derived Carbon Materials for Supercapacitor Application by Talam Kibona Enock, Cecil K. King’ondu, Alexander Pogrebnoi, Yusufu Abeid Chande Jande

    Published 2017-01-01
    “…Environmental concerns and energy security uncertainties associated with fossil fuels have driven the world to shift to renewable energy sources. …”
    Get full text
    Article
  18. 6378

    Temporary employment and its impact on wages in Latin America by Roxana MAURIZIO

    Published 2019-05-01
    “…The high incidence of informality becomes a source of low wages and lack of social security benefits. Even within formal employment, the significant prevalence of non-permanent contracts frequently leads to consequences similar to those of informal occupations. …”
    Get full text
    Article
  19. 6379

    Analysis of the self-sufficiency of wheat production in Bosnia and Herzegovina by Ivanišević Marko, Popov Tatjana, Gvozden-Sliško Dijana

    Published 2024-01-01
    “…These insights offer a foundation for future research that could delve deeper into the spatial-temporal, economic, and food security dimensions of wheat production.…”
    Get full text
    Article
  20. 6380

    Selected Topics on Business Information Systems Research: Editorial Introduction to Issue 26 of CSIMQ by Ben Roelens

    Published 2021-04-01
    “…This CSIMQ issue contains five articles that deal with various information system (IS) issues, including IS security, product-related ISs, blockchain technology and sensor technology. …”
    Get full text
    Article