Showing 7,701 - 7,720 results of 9,720 for search '"Securities ', query time: 0.12s Refine Results
  1. 7701

    Amazonia in Brazilian military thought: Army and Navy conceptual frameworks and strategic actions in the 90s by Dilceu Roberto Pivatto Junior, Raul Cavedon Nunes

    Published 2020-09-01
    “…The end of the Cold War and the rise of new issues in the regional security agenda such as drug trafficking and the environment, led the Brazilian military to rethink its defense strategy, developing new hypotheses of regional conflict which included the potential participation of extra-continental powers.…”
    Get full text
    Article
  2. 7702

    Russia’s Policy in the Sphere of External Labor Migration: Management Problems by M. A. Burda

    Published 2017-06-01
    “…Taking into account the need to balance national security interests and supported by loyal Russian foreign political elites, the author proposes to separate the management of migration on the field of law enforcement and socio-economic part, which requires a political decision of government institutions. …”
    Get full text
    Article
  3. 7703

    Public Diplomacy in EEU Region: Understanding the Phenomenon and its Development by K. P. Borishpolets

    Published 2015-10-01
    “…Such resources strengthen humanitarian cooperation, good-neighborly relations and security atmosphere in the nearest regions.…”
    Get full text
    Article
  4. 7704

    Rethinking Gender and Epistemic Injustice: A Comparative Study of Male and Female Breast Cancer Memoirs by Mahua Bhattacharyya, Ajit K Mishra

    Published 2025-01-01
    “…Therefore, reading and writing such memoirs might secure future epistemic justice to all breast cancer patients irrespective of their gender.…”
    Get full text
    Article
  5. 7705

    POLITICAL DIALOGUE AS THE BASIS OF FOREIGN POLICY: A CASE STUDY OF MODERN RUSSIAN-GERMAN RELATIONS by N. V. Zaytseva

    Published 2014-06-01
    “…Political dialogue helps to form the basis for cooperation between states to ensure the security, political and socio-economic stability of countries. …”
    Get full text
    Article
  6. 7706

    Economic Potentials and Use Dynamics of Sorghum Food System in Ethiopia: Its Implications to Resolve Food Deficit by Teshome Sirany, Esubalew Tadele, Haimanot Aregahegn, Dagnachew Wale

    Published 2022-01-01
    “…Therefore, this crop is used to ensure productivity, food security, and availability of food when other crops fail and food deficit and famine are affected in the region. …”
    Get full text
    Article
  7. 7707

    ARCTIC DEVELOPMENT VECTOR OF NORTH-EASTERN FEDERAL UNIVERSITY NAMED AFTER M.K. AMMOSOV by Anatoly N. Sleptsov

    Published 2016-12-01
    “…The active processes of strengthening of the international contacts and interaction among the Arctic States in theeconomy, in the field of scientific research, security, cultural and educational exchange take place in Arctic now. …”
    Get full text
    Article
  8. 7708

    Vulnerability Testing and Analysis on Websites and Web-Based Applications in the XYZ Faculty Environment Using Acunetix Vulnerability by Mifthahul Rahmi, Yuhandri Yunus, Sumijan Sumijan

    Published 2024-12-01
    “…This study examines the security level of the Integrated website and application within the Faculty of Medicine, Universitas Andalas (Fakultas XYZ) environment, utilizing the Acunetix Web Vulnerability Scanner tool. …”
    Get full text
    Article
  9. 7709

    The Impact of Design Characteristics on the Psychological Connection Between the Heritage Building and its Occupants by Zahraa Ahmed, Saba Sami Al Ali

    Published 2024-12-01
    “…The majority of respondents indicated that characteristics such as clarity of function, clarity of elements, sense of security, privacy, and flexibility, were satisfactory. …”
    Get full text
    Article
  10. 7710

    Bladder Neck Contracture after Transurethral Resection of the Prostate for Benign Prostatic Hyperplasia Treated with a Thermo-Expandable Metal Stent (Memokath® 045) by Jan Wen, Bettina Nørby, Palle Jörn Sloth Osther

    Published 2018-01-01
    “…The correct position was monitored with antegrade and retrograde endoscopy, securing the proximal cone expanded above the stricture and the distal cone above the sphincter. …”
    Get full text
    Article
  11. 7711

    Looking at NFT Art Through the Eyes of Virtual Communities: A Netnographic Analysis by Murat Aytas, Ceren Karaviran

    Published 2025-01-01
    “…It is concluded that NFT offers new opportunities to artists and collectors by securing the ownership, authenticity, and trade of artworks in a digital environment.…”
    Get full text
    Article
  12. 7712

    The forgotten factor: Exploring consumer perceptions of artificial intelligence in the food and agriculture systems by Cheng-Xian Yang, Lauri M. Baker, Anissa Mattox, David Diehl, Sydney Honeycutt

    Published 2025-06-01
    “…Conversely, concerns over privacy, data security, and potential job displacement contribute to hesitancy. …”
    Get full text
    Article
  13. 7713

    Research on multi-user identity recognition based on Wi-Fi sensing by Zhongcheng WEI, Wei CHEN, Yanhu DONG, Bin LIAN, Wei WANG, Jijun ZHAO

    Published 2024-03-01
    “…With the advancement of wireless sensing technology, research on Wi-Fi-based identity recognition has garnered significant attention in fields such as human-computer interaction and home security.While identity recognition based on Wi-Fi signals has achieved initial success, it is currently primarily suitable for scenarios involving individual user behavior.Identity recognition for multiple users in concurrent behavior scenarios still faces a series of challenges, including issues related to mutual interference between users and poor model robustness.Therefore, a Wiblack system for recognizing multiple user identities in a concurrent distribution behavior scenario was proposed.The core idea was to train a multi-branch deep neural network (Wiblack-Net) to extract unique features for each individual user.Firstly, the common features among multiple users were extracted using the backbone network.Then, a binary classifier was assigned to each user to determine the presence of the target user within a given group, thereby achieving identity recognition for multiple users based on concurrent behavior.In addition, experiments comparing Wiblack with several independent binary classification models and a single multiclassification model were conducted to analyze operational efficiency.System performance experimental results demonstrate that when simultaneously identifying the identities of three users, Wibalck achieves an average accuracy of 92.97%, an average precision of 93.71%, an average recall of 93.24%, and an average F1 score of 92.43%.…”
    Get full text
    Article
  14. 7714

    Space-Air-Ground Integrated Network for Disaster Management: Systematic Literature Review by Muhammad Junaid Anjum, Tayyaba Anees, Fatima Tariq, Momina Shaheen, Sabeen Amjad, Fareeha Iftikhar, Faizan Ahmad

    Published 2023-01-01
    “…Our results indicate that several challenges are faced by disaster management systems such as hardware-based challenges, network-based characteristics and communication protocols related challenges, availability and accuracy of imagery data, and security and privacy issues.…”
    Get full text
    Article
  15. 7715
  16. 7716
  17. 7717

    «Partnership for Modernization» as an Instrument of Developing the Legal Base of Customs Cooperation between Russia and the EU by D. A. Turlanov

    Published 2014-02-01
    “…Besides, legal base of Russia-EU customs cooperation does not take into consideration the following measures of modernization of customs regulation in the EU: active use of preliminary information change, electronic methods of fulfilment of customs formalities as well as implementation of modern customs techniques, targeted at simplification and securing of customs formalities. Due to the above-mentioned facts and keeping in mind the high role of mutual trade for well-being of both Russia and EU, improvement of customs cooperation legal base becomes the urgent task. …”
    Get full text
    Article
  18. 7718

    Causes of Wars and Their Role in Social Evolution: Generalization of Modern Concepts

    Published 2024-12-01
    “…Weber and M. Mann: power-security, power-dominance, prestige-dignity-legitimacy, and wealth-resources-access to resources. …”
    Get full text
    Article
  19. 7719
  20. 7720

    Evaluation of Housing Quality Indicators Using Analytic Network Process (ANP) by hossein mobarra, Mahsa Faramarzi Asli

    Published 2025-03-01
    “…Subsequently, after evaluating the indicators using the ANP model, the results indicate that among the examined indicators, housing facilities and amenities with  0.318, housing security with 0.218, housing comfort with 0.145, compatibility with complementary uses with 0.142, housing durability with 0.109, and housing climate adaptation with 0.065 have been assigned the highest weights, respectively.…”
    Get full text
    Article