Showing 6,381 - 6,400 results of 9,720 for search '"Securities ', query time: 0.16s Refine Results
  1. 6381

    Debt load impact on sustainable development of Russian regions by Yu. S. Lisachkina

    Published 2024-12-01
    “…The authors of the study faced the following tasks: to conduct a comparative assessment of regional sustainable development and debt load, to consider the directions for effective management of the load as an element of economic security of the constituent entities, as well as to analyze the economic essence and peculiarities of formation of the Russian regions’ public debt. …”
    Get full text
    Article
  2. 6382

    The SEIRS-NIMFA epidemiological model for malware propagation analysis in IoT networks by Laura Quiroga-Sánchez, Germán A. Montoya, Carlos Lozano-Garzon

    Published 2025-01-01
    “…Our findings demonstrate that our proposal can effectively aid decision-making in implementing security measures in real-world situations. Finally, our proposal and its implementation are open to further enhancements, broadening their potential applications.…”
    Get full text
    Article
  3. 6383

    Los difusos contornos para distinguir la desobediencia a la autoridad como delito y como infracción administrativa: mandato de tipificación, libertad ambulatoria y mínima intervenc... by José Ignacio Cubero Marcos

    Published 2024-12-01
    “…The Criminal Code and the 4/2015 Organic Law regulating the protection of the citizens security have criminalised disobedience as an illegal act. …”
    Article
  4. 6384

    OPTIMIZING AUTONOMOUS VEHICLE PATH PLANNING USING REINFORCEMENT LEARNING AND DYNAMIC MAPPING by Sundaram Arumugam, Frank Stomp

    Published 2024-12-01
    “…Path planning is essential for autonomous driving, enabling secure and effective navigation in intricate and dynamic settings. …”
    Get full text
    Article
  5. 6385

    Research on the spectrum sensing and sharing technology in the dynamic spatiotemporal data driven cognitive Internet of vehicles by Caili GUO, Jiujiu CHEN, Yidi XUAN, He ZHANG

    Published 2020-09-01
    “…With the explosive development of the intellectualization and network connection of the global automobile industry,the communication technology as a crucial support of the Internet of vehicles (IoV) is facing the problem of spectrum shortage.In addition to providing security services,the diverse service demands of the IoV make the introduction of the cognitive radio technology an effective solution,which can share heterogeneous spectrum resources integrating the sub-6 GHz and millimeter-wave spectrum resources with primary users.But the performance is limited due to the influence of the complex dynamic environment of the IoV.To address this issue,a novelty method was proposed which aimed to make full use of the potential multi-source dynamic spatiotemporal data,mine and learn the changing rules of the vehicle trajectory and traffic flow,and the rules were used to guide the sensing and sharing of the spectrum resource.The system-level simulation platform was built for simulation analysis,the results showed that the performance of the proposed scheme was effectively improved.…”
    Get full text
    Article
  6. 6386

    The Risks and Opportunities of Forming a Specific Business Environment in Ukraine in the Conditions of War by Maryana Melnyk, Iryna Leshchukh, Uliana Ivaniuk

    Published 2024-12-01
    “…Therefore, the authors analyse the opportunities for the creation of a specific business environment in Ukraine under martial law with the view to develop a policy directed at securing economic resilience as well as the maintenance of the country’s economic capacity. …”
    Get full text
    Article
  7. 6387

    The Food Safety Modernization Act of 2011 – Proposed Rule for Preventive Controls for Human Food by Soohyoun Ahn, Keith R. Schneider, Michelle D. Danyluk, Renee Goodrich-Schneider

    Published 2014-09-01
    “…FSMA aims to ensure the safety and security of the US food supply by focusing on preventing food safety problems rather than responding after they occur. …”
    Get full text
    Article
  8. 6388

    Why Aceh-Indonesia Conflict Resolution can’t be Copy-Paste in Bangsamoro-Philippines Issue? by Sidik Jatmika, Nanang Sumanang, Ajeng Puspa Marlinda, Chalilla Raihan Nabilazka, Muhammad Indrawan Jatmika

    Published 2022-06-01
    “…The main objective is to identify similarities rational choice (survival, security, economy/welfare, prestige, and influence) especially how political elites would still feel enjoy to conduct those agreements in both regions. …”
    Get full text
    Article
  9. 6389

    Labor Issues that the H2A Temporary Agricultural Worker Policy Attempts to Resolve in Florida by Jonathan C. Stephens, John Lai, Bachir Kassas

    Published 2024-03-01
    “…We rely on food, fiber, and natural resources, and effective agricultural labor is a critical social need, but the challenges inherent in the effort to secure agricultural labor are many and difficult to solve. …”
    Get full text
    Article
  10. 6390

    Perspectives of Turkish foreign policy based on analysis of Romanian documents by Ionuț Cojocaru

    Published 2024-09-01
    “…The Treaty of Lausanne and then the Treaty of Montreux were vital – in the first – for the security of the new Turkish state, but also for the states bordering the Black Sea. …”
    Get full text
    Article
  11. 6391

    Contrôle de l’intimité et normes de genre : la qualification d’un comportement suspect et sa contestation dans le cadre de perquisitions et d’assignations à résidence pendant l’éta... by Flora Hergon

    Published 2021-12-01
    “…This study on the use of gender norms to justify or to contest some security measures article extends the analysis of state control of intimacy, beyond the domestic space, to the arena of administrative justice.…”
    Get full text
    Article
  12. 6392

    On 6G and wide-area IoT by Xiaohu YOU, Hao YIN, Hequan WU

    Published 2020-03-01
    “…6G technology is still in its initial stage of research.It is expected that in the next few years,the world will gradually reach a consensus on visions and key technical parameters of 6G .Focusing on the further expansion of application areas and further enhancement of technical capability,the technical fields were summarized that may be involved in the future 6G radio access,including the coverage expansion based on the satellite-terrestrial integration,millimeter wave and terahertz communications,data-driven network artificial intelligence (AI) and security,large-scale cooperation and cell-free architecture innovation,etc.On this basis,some important technologies,such as ultra-high reliability and low latency,full dynamic radio resource allocation and centimeter level precise positioning,which need to be further broken through in the wide-area Internet of things (IoT) based on the public mobile communication system were analyzed and prospected.Finally,the conclusions were given.…”
    Get full text
    Article
  13. 6393
  14. 6394

    Two decades of research capacity strengthening and reciprocal learning on sexual and reproductive health in East Africa – a point of (no) return by Caroline Frisendahl, Emelie Looft-Trägårdh, Amanda Cleeve, Susan Atuhairwe, Elin C. Larsson, Othman Kakaire, Herbert Kayiga, Annette Aronsson, Anne Kihara, Marleen Temmerman, Marie Klingberg Allvin, Josaphat Byamugisha, Kristina Gemzell Danielsson

    Published 2024-12-01
    “…As the world is facing challenges such as pandemics, climate change, conflicts, and changing political landscapes, the need to secure access to safe and high-quality abortion care is more urgent than ever. …”
    Get full text
    Article
  15. 6395

    How Does Nursing Staff Perceive the Use of Electronic Handover Reports? A Questionnaire-Based Study by Torbjørg Meum, Gro Wangensteen, Karen S. Soleng, Rolf Wynn

    Published 2011-01-01
    “…A web-based anonymous and secure questionnaire was distributed by e-mail to all nursing staff at a psychogeriatric ward at a university hospital. …”
    Get full text
    Article
  16. 6396

    Espaces de l’insécurité : réalités territoriales et réponses locales à la délinquance by Igor Lefèvre

    Published 2014-07-01
    “…It thus questioned the relevance of the résidentialist paradigm (that is to say, the assumption of a crime would depend in form and intensity of urban, sociological , economic and demographic patterns and trends) and its impact on work organization and missions of law enforcement forces, but also all the local actors involved in security policy and crime prevention. At the level of Midi-Pyrénées, this contribution will give synthetically to know which transformations frameworks and patterns of public policies could emerge in the decade 2000-2010, in different situations, but all with a common element: the need to respond to situations perceived by local actors as risky or dangerous for the safety of citizens.…”
    Get full text
    Article
  17. 6397
  18. 6398

    Environmental Taxation: New Evidence for Energy Taxes by Maja Grdinić, Maja Klun, Žiga Kotnik

    Published 2015-12-01
    “…Various economic instruments, including taxation, may help policy makers in the EU meet environmental targets, among them a more secure and competitive green economy in Europe. The focus of this paper is on empirically investigating the direct effect of environmental taxes and the indirect effect of environmental expenditures sourced from environmental taxes on greenhouse gas (GHG) emissions in the energy sector. …”
    Get full text
    Article
  19. 6399

    Research and implementation of network architecture of LSN DCI EVPN VxLAN by Yongming YAN, Liang ZUO, Bin XU, Haifeng XU, Kechuang YE

    Published 2017-06-01
    “…With the rise of virtualization technology,the architecture of traditional data center is disrupted.There exit a large number of interconnected needs among the data centers,such as data center active-active,data center redundancy,data synchronous backup,data migration,integrated data store,shared virtual resource pool,virtual machine drift and so on.Thereby,a large amount of east-west flow was generated,it is necessary to build a reliable,flexible,secure,and easy to deploy layer-2 and layer-3 network to meet the requirement of DCI (data center interconnection).The network architecture of EVPN VxLAN was analyzed,there hasn’t been successful large-scale business case for implementation of multi-vendor DCI EVPN VxLAN networking.Combined with current status of LSN data center of Shanghai Telecom,the deployment of DCI via existing network was proposed and achieved.…”
    Get full text
    Article
  20. 6400

    Privacy-preserving photo sharing framework cross different social network by Fenghua LI, Zhe SUN, Ben NIU, Jin CAO, Hui LI

    Published 2019-07-01
    “…With rapid developments of digital photography and social networks,users of photo-sharing-supported social networking applications can easily forward photos across different social networks at the cost of their growing privacy concerns.To address this problem,a privacy-preserving photo sharing framework was proposed,which could apply to extended control and privacy invasion tracing.In extended control scheme,the following users on a dissemination chain was restrained by each user’s privacy policy.Then several privacy areas of photos were encrypted and the access control polices were bound to the uploaded photos,so that any privacy areas on the photos could be hidden away from unwanted viewers even across different social networks.On this basis,the behaviors of users were record by tracing scheme of privacy invasion,the integrality of records was protected by using nested signature algorithm.The correctness,security and performance of overhead of the scheme are then thoroughly analyzed and evaluated via detailed simulations.…”
    Get full text
    Article