Showing 6,581 - 6,600 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 6581

    20th Anniversary of 9-11: Corporate Disaster Preparedness, Lessons Learned, and Ways Forward by Stefane Kabene, Said Baadel

    Published 2021-08-01
    “…This paper deals with security crisis and disaster management and some effective approaches companies should take to deal with these issues. …”
    Get full text
    Article
  2. 6582

    Efektivitas Pelayanan Perangkat Desa oleh Kepemimpinan Kepala Desa (Datuk Penghulu) by Muhammad Hardiansyah, Muhammad Arif Nasution, Armansyah Matondang

    Published 2019-01-01
    “…Leaders can influence morale, job satisfaction, security, work quality and especially the level of achievement of an organization.  …”
    Get full text
    Article
  3. 6583
  4. 6584

    Control system for aquatic biological resources in the Northern fisheries basin of Russia by S. S. Vopilovskii

    Published 2022-01-01
    “…It has been determined that the allocation of aquatic biological resources for industrial fishing is managed on the basis of Russian regulatory legal acts, and the implementation of the tasks of developing the fishery sector and ensuring the country’s food security is consistent with the implementation of the Basic State Policy of Russia. …”
    Get full text
    Article
  5. 6585

    The assessment of environment protection cooperation in the South China Sea by Satyawan Ignatius Agung

    Published 2025-01-01
    “…Located in a strategic position and geopolitics significance, the South China Sea is rich of biodiversity so it has abundance of fish stock to sustain food security among people in the coastal area. Since the increase of urbanization along the coastal area, pollution becomes inevitable. …”
    Get full text
    Article
  6. 6586

    The land left behind: a systematic review of transnational migration-induced change and its implication for rural sustainability in Nepal by Saroj Koirala, Soniya Bashyal

    Published 2025-01-01
    “…The central theme underscores the connections between transnational migration and its implication for food security, livelihood enhancement, income diversification, and ecological restoration. …”
    Get full text
    Article
  7. 6587

    Scalable PBFT-like algorithm for trust management of degree/graduation certificates by ZHANG Xuewang, LEI Zhitao, LIN Jinzhao

    Published 2024-09-01
    “…Analysis and simulation experiments demonstrate that the proposed algorithm ensures security while achieving higher throughput and scalability in large-scale applications of degree/graduation certificate trust management.…”
    Get full text
    Article
  8. 6588

    Research and prospect of intelligent internet of vehicles based on 5G technology by Rongyue YANG, Pengzhou ZHANG, Qing SONG

    Published 2020-05-01
    “…With the rapid development of 5G communication technology,in the future,V2X will take 5G communication technology as the starting point,integrate 5G vehicle unit,5G base station,5G mobile terminal,5G cloud server and other advanced equipment,to provide comprehensive and high-quality services for multi-type users.Firstly,the key technologies of V2X and its evolution to 5G era were outlined.5G is deeply integrated with the internet of vehicles,which has the technical advantages of relatively low deployment cost and clear evolution route.Then,the application and research status of 5G emerging key technologies such as mobile edge computing (MEC) and network slicing in typical application scenarios of the Internet of vehicles was focused on.Finally,the problems of 5G internet of vehicles in communication interference,network security and privacy protection,communication interference were put forward,and the research direction was pointed out.…”
    Get full text
    Article
  9. 6589

    Logiques touristiques en station de haute-montagne : quelles évolutions possibles vers la durabilité ? by Laurent Arcuset

    Published 2009-12-01
    “…The local approach of "sustainable tourism", indeed, seems for the moment rather to aim - as in many other high mountain ski resorts - towards a more environmental management of the basic urban functions than a real questioning of a tourist model based upon the triptych development of the ski slopes, securizing of the snow resource and touristic real estate programs.…”
    Get full text
    Article
  10. 6590

    FEATURES OF DIGITALIZATION OF RELATIONSHIPS IN THE INDUSTRIAL MARKET by A. V Zheregelya

    Published 2020-03-01
    “…However, the issues of security, protectability, stability, continuity, integrity and reliability of operations and work with information are of particular importance, which makes high demands on the digital shell of the enterprise.…”
    Get full text
    Article
  11. 6591
  12. 6592

    Electoral Management in the Western Balkans – Overview of Institutional Setting by Marko Milenković

    Published 2020-02-01
    “…This is enhanced by regular election monitoring in the region by the Organisation for Security and Cooperation in Europe (OSCE) and the process being followed and evaluated by both the European Union institutions and member states as part of fulfilment of the Copenhagen criteria to join the EU. …”
    Get full text
    Article
  13. 6593

    Scalable Low Power Accelerator for Sparse Recurrent Neural Network by Panshi JIN, Junjie LI, Jingyi WANG, Pengchong LI, Lei XING, Xiaodong LI

    Published 2023-12-01
    “…The use of edge computing devices in bank outlets for passenger flow analysis, security protection, risk prevention and control is increasingly widespread, among which the performance and power consumption of AI reasoning chips have become a very important factor in the selection of edge computing devices.Aiming at the problems of recurrent neural network, such as high power consumption, weak reasoning performance and low energy efficiency, which were caused by data dependence and low data reusability, this paper realized a sparse RNN low-power accelerator with scalable voltage by using FPGA, and verifies it on the edge design and calculation equipment.Firstly, the sparse -RNN was analyzed and the processing array was designed by network compression.Secondly, due to the unbalanced workload of sparse RNN, it introduced voltage scaling method to maintain low power consumption and high throughput.Experiments show that this method could significantly improve the RNN reasoning speed of the system and reduce the processing power consumption of the chip.…”
    Get full text
    Article
  14. 6594

    Covid-19 and the Call to Sanitize Human Conscience by Prem Xalxo SJ

    Published 2021-09-01
    “… Amidst the unprecedented health crisis, annihilation of economy and social security, and upsurge in the loss of job opportunities caused by Covid-19, the emergence of a dynamic global spirit of collaboration has reinvigorated the human ability to work together to respond collectively to any peril that threatens the integral well-being of the entire humanity. …”
    Get full text
    Article
  15. 6595

    Differential privacy protection technology and its application in big data environment by Yu FU, Yihan YU, Xiaoping WU

    Published 2019-10-01
    “…The privacy protection in big data is a research hotspot in the field of cyberspace security.As a strict and provable definition of privacy protection,studying application status of differential privacy protection in big data environment can provide reference and guidance for its subsequent system applications.Based on the analysis of the related concepts and technical characteristics of differential privacy protection,the application of differential privacy protection technology was reviewed in data distribution and analysis,cloud computing and big data computing,location and trajectory services and social networks,which expounded the current representative research results and analyzed its existing problems.The research shows that the existing results have made effective innovation and exploration of differential privacy protection applications from the aspects of differential privacy protection mechanism,noise addition mechanism and location,and data processing methods,and the related results have been cross-applied in different scenarios.Finally,four major problems that need to be studied in the further systematic application of differential privacy protection in the big data environment are proposed.…”
    Get full text
    Article
  16. 6596

    Continuous User Verification in Cloud Storage Services using Deep Learning by burhan albayati

    Published 2025-01-01
    “…The behavior profiling technique has been successfully investigated as an additional intelligent security measure for continuous verification users after the simple login. …”
    Get full text
    Article
  17. 6597

    Metropolitan Regions: Challenges for Sustainability and Governance of Periurban Areas in Brazil. by Prof. Dr. Martin Coy, Dr. Simone Sandholz, Dr. Tobias Töpfer, Dr. Frank Zirkl

    Published 2019-02-01
    “…Especially the most populous Brazilian metropolitan areas have to deal with peri-urban development challenges like the lack of infrastructure and public security or new forms of fragmentation that come along with social and ecological problems. …”
    Get full text
    Article
  18. 6598
  19. 6599

    Expansão do agronegócio canavieiro no sul goiano e os efeitos na produção de alimento by Pedro Dias Mangolini Neves, Marcelo Rodrigues Mendonça

    Published 2020-03-01
    “…In the meantime, it is considered that the State must intervene in the food production as well as they currently intervene in the production of commodities with financing programs, fiscal incentives, infrastructure construction and protectionism, for sovereignty and food security.…”
    Get full text
    Article
  20. 6600

    The Odd One Out? Revisiting the Belgian Welfare State by Cor Wagenaar

    Published 2011-06-01
    “…This by now historical socio-political model had decidedly collectivist traits, culminating in the provision of social security networks and a vast expansion of the public domain. …”
    Get full text
    Article