Showing 8,061 - 8,080 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 8061

    THE ALBANIAN FACTOR OF DESTABILIZATION OF THE WESTERN BALKANS: SCENARIO APPROACH by E. G. Ponomareva

    Published 2018-07-01
    “…Substantiation of the probability of the development and implementation of the scenario is given in four key parameters, including political, economic, military and cultural and religious spheres.Among the main actors of the scenario the author singles out the armed forces of Kosovo, Albanian paramilitary formations on the territory of western Macedonia, transnational corporations, private military companies, as well as the United States, Britain, Turkey and the Arab monarchies who support the project politically and financially.The article concludes that there is a need for an objective political assessment of the situation in the region, an analysis of security threats and risks of another round of destabilization of the Western Balkans. …”
    Get full text
    Article
  2. 8062

    Models for the Design and Operation of Digital Educational Environments by A. V. Solovov, A. A. Menshikova

    Published 2021-01-01
    “…It includes a marketing subsystem, a set of technical tools, various types of security and an organizational subsystem. The main functions of these subsystems and their various components have been identified.A didactic model of a typical complex of digital educational resources has been developed. …”
    Get full text
    Article
  3. 8063

    NLP neural network copyright protection based on black box watermark by Long DAI, Jing ZHANG, Xuefeng FAN, Xiaoyi ZHOU

    Published 2023-02-01
    “…With the rapid development of natural language processing techniques, the use of language models in text classification and sentiment analysis has been increasing.However, language models are susceptible to piracy and redistribution by adversaries, posing a serious threat to the intellectual property of model owners.Therefore, researchers have been working on designing protection mechanisms to identify the copyright information of language models.However, existing watermarking of language models for text classification tasks cannot be associated with the owner’s identity, and they are not robust enough and cannot regenerate trigger sets.To solve these problems, a new model, namely black-box watermarking scheme for text classification tasks, was proposed.It was a scheme that can remotely and quickly verify model ownership.The copyright message and the key of the model owner were obtained through the Hash-based Message Authentication Code (HMAC), and the message digest obtained by HMAC can prevent forgery and had high security.A certain amount of text data was randomly selected from each category of the original training set and the digest was combined with the text data to construct the trigger set, then the watermark was embedded on the language model during the training process.To evaluate the performance of the proposed scheme, watermarks were embedded on three common language models on the IMDB’s movie reviews and CNews text classification datasets.The experimental results show that the accuracy of the proposed watermarking verification scheme can reach 100% without affecting the original model.Even under common attacks such as model fine-tuning and pruning, the proposed watermarking scheme shows strong robustness and resistance to forgery attacks.Meanwhile, the embedding of the watermark does not affect the convergence time of the model and has high embedding efficiency.…”
    Get full text
    Article
  4. 8064
  5. 8065

    Towards a unified regional surveillance system: the Gulf CDC’s first initiatives by Sami Al Mudarra, Lamis Alghamdi, Ahmed AlHatlan, Andrew Amato Gauci, Aleksandra Polkowska Kramek, Alaa Alqurashi, Nouf Alzuhayri, Sadeem AlShiban, Bushra Alghamdi, Pasi Penttinen

    Published 2025-01-01
    “…The initiative will showcase the potential benefits of regional collaboration to improve health outcomes and will ultimately also contribute to global health security efforts.…”
    Get full text
    Article
  6. 8066

    Kazakh Initiatives on Cooperation with European Union by R. S. Kurmanguzhin

    Published 2015-02-01
    “…The Strategy covered areas of cooperation such as regional integration, economic development, democratization, energy and security. In 2008 under the instructions of the President of Kazakhstan Ministry of Foreign Affairs in cooperation with other ministries developed a state programme "Path to Europe" for 2009 - 2011, which aided the priorities of cooperation between Kazakhstan and the European Union. …”
    Get full text
    Article
  7. 8067

    The Evolution of the NATO-Russia Relations by V. I. Batyuk

    Published 2020-11-01
    “…NATO’s eastward enlargement — combined with the firm position of the official Washington and Brussels on the unacceptability of Russia’s membership in the Alliance — meant a complete exclusion of Russia from the decision-making process on the European security. At the same time, for a variety of reasons, in the post-bipolar world the military-political dependence of the Western European subregion on Washington did not decrease, as many hoped, but, on the contrary, has increased, thus excluding for Moscow the very possibility to play on the contradictions between the United States and its European allies. …”
    Get full text
    Article
  8. 8068
  9. 8069

    Prospects for the creation of national and supranational cryptocurrencies in the BRICS countries by O. M. Makhalina, V. N. Makhalina

    Published 2019-06-01
    “…Cryptocurrency is not recognized as a legal means of payment; in the BRICS countries there are no own, national cryptocurrencies, and only projects of future cryptocurrencies are developed, taking into account the features of the set goalsof economic development and management of cryptocurrency activities; the countries of the Association do not abandon the use of blockchain technology in the field of economy and Finance, as it ensures the openness and security of data storage, the creation of centralized exchanges, the exchange of goods and services; the BRICS countries should be interested in a gradual shift away from dollar dependence. …”
    Get full text
    Article
  10. 8070

    THE FORMATION OF THE ENVIRONMENTAL AGENDA OF THE UNITED NATIONS GENERAL ASSEMBLY (1946-2016) by E. A. Bliznetskaya, E. P. Vasilenko

    Published 2018-11-01
    “…Also, we identified the issues underlying the formation of the environmental agenda of the General Assembly, namely international security issues related to nuclear weapons and economic development. …”
    Get full text
    Article
  11. 8071

    A Multilevel Analysis of Farmers’ Adoption of Water-saving Irrigation Technology: Evidence From the North China Plain by Yibei Guo, Kunpeng Zhang, Xiaohu Jia

    Published 2025-01-01
    “…Agricultural water scarcity poses a significant threat to food security and sustainable development. Farmers’ adoption of agricultural water-saving irrigation technologies (WSIT) is essential for addressing this challenge. …”
    Get full text
    Article
  12. 8072

    A Machine Learning-Based Platform for Monitoring and Prediction of Hazardous Gases in Rural and Remote Areas by Edgar F. Ladeira, Bruno M. C. Silva

    Published 2025-01-01
    “…In these areas, access to security and health services is scarce, and real-time monitoring of citizens and the conditions in which they live is very difficult. …”
    Get full text
    Article
  13. 8073

    Socialisation scenes in the health behaviour of teacher students at different levels of teacher training by Marianna Moravecz, Karolina Eszter Kovács, Bettina Kozma

    Published 2025-01-01
    “…The students participating in our study hailed from the underprivileged Northern Great Plain region, which contributes to an increased search for security. The research indicates that family emerged as a significant example of values, and the objective is to foster positive health behaviours in both areas equally.…”
    Get full text
    Article
  14. 8074

    Service Quality Analysis of BPR XYZ by Ulfa Chusnia Wahyunita, Dwi Sukma Donoriyanto

    Published 2025-01-01
    “…The results show that 12 attributes exceed customer expectations, including strategic location, availability of queue numbers, appropriate operating hours, clear and easy-to-understand information, assistance from officers when customers face issues, trustworthiness, the bank’s ability to ensure customer data security, confidentiality of customer data, non-discrimination, and understanding of customer needs. …”
    Get full text
    Article
  15. 8075

    Investigative genetic genealogy practices warranting policy attention: Results of a modified policy Delphi. by Christi J Guerrini, Louiza Kalokairinou, Jill O Robinson, Whitney Bash Brooks, Stephanie M Fullerton, Sara Huston, Jacklyn Dahlquist, Diana Madden, Norah Crossnohere, Nicola Campoamor, John F P Bridges, Amy L McGuire

    Published 2025-01-01
    “…These top priority practices relate to: consent and notification; case eligibility and criteria; data management, privacy, and security; and governance and accountability. Participants expressed a range of opinions, some strongly held, and did not reach complete consensus with respect to any of the practices. …”
    Get full text
    Article
  16. 8076

    IoT-based home control system using NodeMCU and Firebase by Paul Oluwatobiloba Ayeni, Olayiwola Charles Adesoba

    Published 2024-11-01
    “…In addition, a PIR motion sensor was integrated into the system to enhance the home's security by detecting intrusion. The system's hardware functionality is based on a written Arduino code, which establishes Wi-Fi connectivity to a predefined network, communicates with the Firebase database, handles appliance control and manages sensor data. …”
    Get full text
    Article
  17. 8077

    PERGULATAN MAHASISWI BERCADAR DI PERGURUAN TINGGI KEAGAMAAN ISLAM NEGERI DI JAWA TIMUR by Za'imatil Ashfiya

    Published 2022-04-01
    “…Hasil penelitian ini adalah motivasi mahasiswi memakai cadar karena kebutuhan akan rasa aman (need for self-security) dari laki-laki dan kebutuhan untuk dihargai atau dihormati (need for self-esteem). …”
    Get full text
    Article
  18. 8078

    The Role of Urban Spaces in Improving the Life Quality (A Case Study of Malayer) by Robabeh Rajabi Amirabad, Bijan Rahmani

    Published 2020-09-01
    “…In this regard, the purpose of this study was to investigate the role of Malayer urban spaces in improving the citizen’s life quality including variables such as the quality of facilities in the city, social environmental, economic quality and environmental quality, , security and relaxation, and so on. The method used in this study was a combination of analytical and case-oriented methods. …”
    Get full text
    Article
  19. 8079

    The Debate on the Aesthetics of Business Brand Innovation Among the Millennial Generation for the Issuance of Halal Certification by Haryati Haryati, Heri Junaidi, Sheikh Mohammed Rateb

    Published 2024-12-01
    “…From the same side, the obligation of halal certification is carried out as a form of state effort in providing security for its citizens in consuming food. Between the two understandings, literacy is needed for the millennial generation where certification and labeling of halal products based on protection, fair value, definite legal value, responsibility and openness, effective and efficient, and competent have implications for public comfort in consuming food for food that is proven to be halal. …”
    Get full text
    Article
  20. 8080

    North American Integration after 20 Years by G. M. Kostyunina

    Published 2015-04-01
    “…So, in 2000, there was put forward the concept of creating the North American community as an economic and security community by 2010, and in 2005 proposed the idea of a common currency called the Amero. …”
    Get full text
    Article