Showing 7,561 - 7,580 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 7561
  2. 7562
  3. 7563

    Internet marketing organization with the use of intellegent and block chain technologies by U. A. Vishniakou

    Published 2020-05-01
    “…Blockchain technology is used to control and guarantee the authorship of startups and signed contracts.As IM development trend, the development of models for joint activity of intelligent agents in the cloud environment to support decision-making using blockchain technology to legally secure the authorship of innovations is proposed. …”
    Get full text
    Article
  4. 7564

    New Generation of Smart Highway: Framework and Insights by Chenglong Liu, Yuchuan Du, Yiheng Ge, Difei Wu, Cong Zhao, Yishun Li

    Published 2021-01-01
    “…Several urgent problems in the current stage are pointed out in terms of system compatibility, standard specification, and information security. This paper provides new insights for sustainable and reproducible highway reformation, drawing some implications for NGSH design.…”
    Get full text
    Article
  5. 7565

    A multidimensional momentum chain model for tennis matches based on difference equations. by Jingya Wang, Sihang Guo, Yuanyun Zhou

    Published 2024-01-01
    “…Furthermore, the likelihood of scoring is substantially greater for players possessing higher momentum, with data suggesting that the serving side has an 84% chance of securing a match victory. When applied to 6,870 tennis matches, our model achieves a prediction accuracy exceeding 80%. …”
    Get full text
    Article
  6. 7566

    IF-MABAC Method for Evaluating the Intelligent Transportation System with Intuitionistic Fuzzy Information by Yanping Li

    Published 2021-01-01
    “…ITS can effectively employ the existing traffic facilities and ensure the safety of traffic, urban traffic, and public security management for effective control in order to satisfy people’s travel demand. …”
    Get full text
    Article
  7. 7567

    Political ecology survey of human-chimpanzee coexistence within postwar Mabi-Yaya Nature Reserve, Côte d’Ivoire by Sasha Pruvost, Vincent Leblan

    Published 2024-11-01
    “…Given the Ivorian political context, this local support and the persistence of high canopy forest appear to be more related to a local understanding of the protected area as a land-securing device against “outsiders” in a context of strong political and identity crises than to any agreement with conservation policies. …”
    Get full text
    Article
  8. 7568

    Infiltration of Small Arms and Light Weapons into Benue Valley and Its Impact on the Conflict Between Pastoralists and Farmers by Paulina Ada Akpa, Terver Akpar, Samson Aondowase Fada

    Published 2023-07-01
    “…This problem is more pronounce in developing countries where there are porous borders and weak institutions responsible for border security like Nigeria. The proliferation and misuse of small arms and light weapons in the country is progressively complex and multifaceted phenomenon that affects people and insecurity. …”
    Get full text
    Article
  9. 7569
  10. 7570

    The Rising Religious Extremism and Mob violence in Nigeria by Ismail Husain Mshelia

    Published 2024-07-01
    “…Looking beyond human security threats like poverty and illiteracy, the paper utilised desk review of published documents to establish the historical and political factors that sowed in the country, the seeds of religious extremism now germinating. …”
    Get full text
    Article
  11. 7571

    Research on the cross-contagion between international stock markets and geopolitical risks: the two-layer network perspective by Xiao-Li Gong, Hao-Yang Ning, Xiong Xiong

    Published 2025-01-01
    “…Finally, the study on the dynamic changes of the double-layer network connectedness between the international stock market and geopolitics found that the shock of extreme events, such as military conflict and public health security, is an important factor in triggering the cross-contagion of risks. …”
    Get full text
    Article
  12. 7572

    User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment by Tarun Kumar, Prabhat Kumar, Suyel Namasudra

    Published 2025-01-01
    “…The increasing number of security issues with cloud data raises confidentiality concerns about keeping these stored or shared data. …”
    Get full text
    Article
  13. 7573

    MEDIA COMMUNICATIONS IN THE INFORMATION STRATEGY OF UKRAINE'S INTEGRATION INTO THE EU by Leonid Novokhatko

    Published 2024-12-01
    “…The topic of Ukraine's integration into the European Union is vital not only for the political, economic, security, and humanitarian aspects of the state's life but also for the national media space. …”
    Get full text
    Article
  14. 7574

    The European Union's Mediterranean Policy in the Context of the "Arab Spring" by V. A. Latkina

    Published 2014-04-01
    “…While the EU Foreign Policy in the Mediterranean region was historically conditioned by the security interests of the European Union, it suffered from securitization/democratization dilemma. …”
    Get full text
    Article
  15. 7575

    Attribution Analysis of Runoff Variability in Northern-Huai River Plain Based on Improved Budyko-Fu Equation by LIU Kailei, WANG Yining, LI Rui

    Published 2024-07-01
    “…Issues like insufficient water resource security capacity and competition for water among different sectors are common. …”
    Get full text
    Article
  16. 7576

    The influence of communication on an effective relationship marketing strategy for sport unions in the new millennium by Frikkie Herbst

    Published 2022-10-01
    “…A long-term relationship is recognised as a very important and basic ingredient of marketing, securing and keeping customers and can be regarded as a tool for the new millennium. …”
    Get full text
    Article
  17. 7577

    De frontier até pós-frontier: regiões pioneiras no Brasil dentro do processo de transformação espaço-temporal e sócio-ecológico by Martin Coy, Michael Klingler, Gerd Kohlhepp

    Published 2017-02-01
    “…This holds particularly true inasmuch as the incorporation of land through settler colonisation after Latin American countries’ independence – mainly in Argentina, Chile, Paraguay and Brazil – became one of the key instruments for opening up and developing areas, for geostrategic securing, and for economic valorisation of hinterland spaces discursively framed as free of settlements and populations. …”
    Get full text
    Article
  18. 7578

    The Mechanism of Safety Culture Construction in Chinese Universities Based on POI Data and Gravity Model by Wu Zhao, Zhe Zhou, Haibo Jiang

    Published 2022-01-01
    “…With the development of social economy, the importance of safety culture has been recognized by the whole society. Campus security is not only related to the common interests of the campus teachers and students but also related to the fundamental interests of each individual in the campus. …”
    Get full text
    Article
  19. 7579

    Prediction Model of Water Demand for Scouring Siltation in Coastal River Networks Based on APSO and SVM: A Case Study of Doulong Port by MA Zhutong, XIANG Long, YAN Ke

    Published 2024-12-01
    “…Siltation in coastal river networks is a serious water security issue, and balancing siltation through water diversion is an important measure in ecological water resource dispatching. …”
    Get full text
    Article
  20. 7580

    Cloud Trust-Driven Hierarchical Sharing Method of Internet of Things Information Resources by Jianpeng Zhang

    Published 2021-01-01
    “…This paper sorts according to the value of the Internet information security model, obtains the optimal model to avoid human tampering, and designs the information resource acquisition process to ensure the reliability of the source data. …”
    Get full text
    Article