Showing 7,261 - 7,280 results of 9,720 for search '"Securities ', query time: 0.13s Refine Results
  1. 7261

    Psychiatric and Behavioral Complications of GPi DBS in an Adolescent with Myoclonus Dystonia by Graciela Kriegel, Melanie I. Stuckey

    Published 2019-01-01
    “…The patient was transferred to a secure treatment centre where he was able to gain control over his behaviors with intense dialectical behavior therapy, but the aggressive behavior and safety concerns continue to persist today.…”
    Get full text
    Article
  2. 7262

    The current state of international economic relations between Russia and African countries by M. M. Mahamat

    Published 2024-08-01
    “…There are also difficulties in securing financing for projects, especially for small and medium-sized enterprises.…”
    Get full text
    Article
  3. 7263

    Socialisation of student youth in social networks by T. Shcherban, O. Samoilov

    Published 2024-06-01
    “…It was noted that the protection of privacy and the development of critical thinking are important for ensuring the security and information competence of social network users. …”
    Get full text
    Article
  4. 7264
  5. 7265

    Minasse Tcheraz’s Contacts of Europe and His Impressions of Berlin Congress by Serdar, Sakin

    Published 2015-06-01
    “…Before Berlin Congress assembled, Armenian Patriarch Nerses Varjabedyan had sent a delegation to the Congress in order to present the countries participating in the Congress with a memorandum that contained the requests of Armenian people and to secure these countries’ support throughout the Congress. …”
    Get full text
    Article
  6. 7266

    Playing by the rules: Government regulation and consumer trust in the online poker industry by Kahlil S. Philander, Bradley S. Wimmer

    Published 2025-03-01
    “…Players are willing to pay an extra $1.83 per hour to play on government-regulated sites and players who view these sites as more secure are willing to pay even more. However, the size of the regulatory premium falls and, in some cases, becomes negative when players believe that government regulation increases the likelihood that their winnings will be taxed. …”
    Get full text
    Article
  7. 7267

    National Defense as fiscal policy during the Mauricio Macri administration (2015-2019) by Sergio Gabriel Eissa

    Published 2020-09-01
    “…The article establishes that, although the security-oriented discourse was apparently predominant, in the end, a fiscal adjustment rationale prevailed over all the other proposals. …”
    Get full text
    Article
  8. 7268

    The Problem of Determining International Economic Sanctions in Modern Science by Y. S. Butakova

    Published 2024-01-01
    “…For a long time, the doctrine was dominated by the approach that sanctions should be understood exclusively as sanctions of the UN Security Council. This approach is still seen as correct from the standpoint of the conceptual and categorical apparatus of international law, but at the same time, it is outdated, not reflecting modern international economic sanctions. …”
    Get full text
    Article
  9. 7269
  10. 7270

    Human-Terrestrial Wildlife Conflict in Ethiopia: A Systematic Review by Getahun Shanko, Bekele Tona

    Published 2022-01-01
    “…About 178 keywords’ analysis revealed a focus on “coexistence,” “mitigation,” and “food security.” The literature focused mainly on larger mammals, led by Ethiopian authors, and excluded the social dimensions of HWC. …”
    Get full text
    Article
  11. 7271

    Preparations of the Shipping Company “Żegluga Polska SA” for the Second World War by Jordan Siemianowski

    Published 2024-01-01
    “…Important preparations also included securing the port by state authorities.…”
    Get full text
    Article
  12. 7272

    Side Trip Multipath Routing Protocol for Spatial Node Failure in Data-Gathering WSNs by Keisuke Fujita, Yumi Takaki, Chikara Ohta, Hisashi Tamaki

    Published 2016-04-01
    “…We compare the ST scheme, STNC scheme, and two existing multipath protocols (i.e., H-SPREAD (Hybrid-Secure Protocol for REliable dAta Delivery) scheme and SMRP (Subbranch Multipath Routing Protocol) scheme) by means of a self-developed simulator. …”
    Get full text
    Article
  13. 7273

    Risk-based approach in external migration public management by V. A. Volokh, T. N. Dmitrieva

    Published 2024-03-01
    “…External migration state management should be aimed at solving the socio-economic development problems in Russia and ensuring national security and at the same time should minimize potential risks of social and cultural nature. …”
    Get full text
    Article
  14. 7274

    Assessment of Lag Screws in Treatment of Anterior Mandibular Fracture by Esha Chowdhury, Vijay Ebenezer

    Published 2024-12-01
    “…Two lag screws, ranging in length from 16 to 20 mm, were used to secure the fragments, depending on the needs of each case. …”
    Get full text
    Article
  15. 7275

    Implementation of Simplified Data Encryption Standard on FPGA using VHDL by salim Qadir Mohammed

    Published 2022-03-01
    “…Due to enormous development in communication devices, globally internet-connected network largely used in all human activities. The security of information has been becoming a major concern for all users and clients, whom depend on network system. …”
    Get full text
    Article
  16. 7276

    TR-SDTN: Trust Based Efficient and Scalable Routing in Hostile Social DTNs by Zhenjing Zhang, Maode Ma, Zhigang Jin

    Published 2015-07-01
    “…In view of these defects, we propose a novel solution to address the selfish and security issues in social DTNs. Based on nodes’ social characteristics, a dynamic trust model is proposed to prevent bad-mouthing and ballot stuffing attacks and the Shannon entropy function is introduced to avoid blackhole and greyhole attacks. …”
    Get full text
    Article
  17. 7277

    The war inside your mind: unprotected brain battlefields and neuro-vulnerability by Robert McCreight

    Published 2024-02-01
    “…Experts in neuromedicine, technology, societal security, and strategy must grasp that a variety of technologies that arguably enhance brain function, influence or augment intelligence, link brains with computers, and enablenon invasice access to the brain-are highly attractive. …”
    Get full text
    Article
  18. 7278
  19. 7279

    Modeling the Grain Import Trade: A Cointegration Analysis of China’s Panel Data by Feng Zhao, Pingping Sun, Jie Zhang

    Published 2021-01-01
    “…Therefore, China should pay close attention to the impact of international factors on the fluctuation of its own food prices and enhance its ability to rationally utilize the international food market and international agricultural resources to ensure domestic food security.…”
    Get full text
    Article
  20. 7280

    The Political Economy of the Gifts on Tiktok by Cristina-Oana Cristea

    Published 2025-02-01
    “…It is a multifaceted object of study, allowing research on various topics such as security and surveillance, algorithms and addiction, and communication and online interactions. …”
    Get full text
    Article