Showing 8,161 - 8,180 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 8161

    Enhancing User Differentiation in the Electronic Personal Synthesis Behavior (EPSBV01) Algorithm by Adopting the Time Series Analysis by Mohanaad Shakir

    Published 2025-02-01
    “…The progress of contemporary technology has rendered information systems essential in our everyday existence, underscoring the crucial necessity to safeguard information security and privacy. In password authentication, the Electronic Personal Synthesis Behaviour (EPSB) heightens the accuracy of authorizing an authenticated user based on three parameters: EPSBERROR, EPSBTime, and EPSBStyle. …”
    Get full text
    Article
  2. 8162

    Lethal intimate partner violence and gendered dimensions of the COVID-19 lockdown in Nigeria: evidence from a descriptive analysis of secondary data by Vitalis U Ukoji, Vitus N Ukoji

    Published 2024-04-01
    “…This research aims to shed light on the impact of the pandemic lockdown on IPV-related mortalities.Methods The study used secondary data from the Nigeria Watch database, an online resource on lethal violence and human security in Nigeria. It relied on IPV datasets extracted and analysed descriptively at the univariate level.Results Results indicate a steady increase in IPV-related mortalities, with 205 fatalities—62 in 2019, 69 in 2020 and 74 in 2021—resulting from 180 IPV incidents. …”
    Get full text
    Article
  3. 8163

    Face morphing attacks and face image quality: The effect of morphing and the unsupervised attack detection by quality by Biying Fu, Naser Damer

    Published 2022-09-01
    “…This operation, therefore, poses serious security issues related to the ability of a travel or identity document to be verified to belong to multiple persons. …”
    Get full text
    Article
  4. 8164

    Development of the national cybersecurity system of Ukraine as a necessary element of information society development by S. H. Petrov

    Published 2021-12-01
    “…Attention is drawn to the unconditional fulfillment of the tasks of the new Cyber Security Strategy of Ukraine, especially those related to cyber protection of critical infrastructure. …”
    Get full text
    Article
  5. 8165
  6. 8166

    Features of democratic reforms in Jordan by A. V. Krilov

    Published 2013-04-01
    “…In seeking to preserve the existing status quo Jordanian authorities would deliberately put the country in a state of dependency on the political interests of the U.S. and Saudi Arabia, in return for all kinds of preferences, including military aid if a threat to the security of the Kingdom is expected.…”
    Get full text
    Article
  7. 8167

    Maturity of Employment Data Interoperability in supporting One Employment Data at the Ministry and Regional Government Level by Herpita Wahyuni, Dyah Mutiarin, Wahyudi Kumorotomo, Ulung Pribadi, Nur Syakiran Akmal Ismail

    Published 2023-12-01
    “…Ethos (27.00%) by carrying out the revitalization of One Employment Data's network and data security devices and hashtags in the data interoperability process which indicates that information related to work, training and the labor market can be better integrated for analysis and decision making purposes which is more effective.…”
    Get full text
    Article
  8. 8168

    Development of methodology of accounting and control processes in the digital economy by A. V. Bodiako

    Published 2020-04-01
    “…A technology for the formation of information-security mission of accounting and control processes in the digital conomy and the changed requirements for the formation of information for management decisions, combining in a single information-digital “shell” accounting, control, analytical and other iterations, which should contribute to a better compilation of different reporting formats, has been presented. …”
    Get full text
    Article
  9. 8169
  10. 8170

    Evaluation of Emergency Assembly Areas with the AHP Method from the Perspective of Occupational Safety Experts by Onur Doğan

    Published 2023-01-01
    “…Accordingly, as a result of the comparison made between the criteria, the criterion with the highest weight was 0.4294 assembly area security, followed by 0.3602 assembly area access and 0.2104 assembly area characteristics, respectively…”
    Get full text
    Article
  11. 8171

    From fitness trackers to medical devices: wearable technologies by Zhi Zhou

    Published 2023-06-01
    “…As wearable technology is being proposed for critical applications, it must be vetted for its reliability and security properties. Applications based on Wireless Sensor Networks (WSN) for Internet of Things (IoTs) scenarios are rising. …”
    Get full text
    Article
  12. 8172

    Efficacy Perceived by Patients of Post-infarction Cardiovascular Rehabilitation Strategies by María Gabriela Balarezo García, Carlos Antonio Escobar Suárez, Becker Neto Mullo

    Published 2024-01-01
    “…The study population was made up of 90 patients who participated in post-infarction cardiac rehabilitation programs implemented in the medical facilities of the Ecuadorian Institute of Social Security in the Sierra region of Ecuador. The technique for data collection was the survey. …”
    Get full text
    Article
  13. 8173

    Elevated few-shot network intrusion detection via self-attention mechanisms and iterative refinement. by Congyuan Xu, Yong Zhan, Guanghui Chen, Zhiqiang Wang, Siqing Liu, Weichen Hu

    Published 2025-01-01
    “…The network intrusion detection system (NIDS) plays a critical role in maintaining network security. However, traditional NIDS relies on a large volume of samples for training, which exhibits insufficient adaptability in rapidly changing network environments and complex attack methods, especially when facing novel and rare attacks. …”
    Get full text
    Article
  14. 8174

    Enhancing Maternal Caregiving Capabilities Model to Prevent Childhood Stunting: A UNICEF-Inspired Model by Eka Mishbahatul Marah Has PhD, Ilya Krisnana PhD, Ferry Efendi PhD

    Published 2024-01-01
    “…Household factors, including economic level and food security, were also important. High maternal caregiving capabilities were expected to enable mothers to improve their behavior to prevent childhood stunting (6–23 months).…”
    Get full text
    Article
  15. 8175

    Modelling Customs Revenue in Ghana Using Novel Time Series Methods by Diana Ayorkor Agbenyega, John Andoh, Samuel Iddi, Louis Asiedu

    Published 2022-01-01
    “…Governments across the world rely on their Customs Administration to provide functions that include border security, intellectual property rights protection, environmental protection, and revenue mobilisation amongst others. …”
    Get full text
    Article
  16. 8176

    Decoupling Analysis of Water Resource Utilization and Economic Growth in Gansu Province Based on Water Footprint Theory by LIU Xian, YUAN Dan, HAN Yifei, TANG Jiaoyu, LU Yang

    Published 2022-01-01
    “…To explore the relationship between water resource utilization and coordinated economic development in Gansu Province,this study employs the statistical data of Gansu Province from 2008 to 2019 to analyze the trend of water footprints and evaluation indicators for water resources.Moreover,the decoupling evaluation model is used to evaluate the relationship between water resource utilization and economic growth.The results reveal that the water footprint and per capita water footprint of Gansu Province have shown an upward trend of parallel fluctuations for the past 12 years,in which the agricultural water footprint is the main component of water footprints,accounting for 86.78% on average,and the ecological water footprint increases year by year.The self-sufficiency rate of water resources remains above 90%,and the economic benefit of water resources increases from 20.11 yuan/m<sup>3</sup> (in 2008) to 43.35 yuan/m<sup>3</sup> (in 2019),with an average annual growth rate of 6.6%.The pressure index of water resources has had a downward trend in the past five years,which is in a state of water security on the whole.The relationship between GDP and water resource utilization is gradually changing from weak decoupling to strong decoupling,and that between agricultural output value and agricultural water use is changing from negative decoupling with unsatisfactory expansion to strong decoupling.On the basis of these conclusions,some suggestions on agriculture,import and export trade,and ecology are put forward to promote the high-quality coordinated development between water resource utilization and economic growth in Gansu Province.…”
    Get full text
    Article
  17. 8177

    Patriotic education of a student’s linguistic personality (on the example of the academic discipline «Lawyer’s speech culture») by Natal’ya A. Ryadovykh

    Published 2024-04-01
    “…Currently, the patriotic consciousness of young people becomes the basis of national security and acquires strategic importance in state policy. …”
    Get full text
    Article
  18. 8178

    DOMINANTS OF SELECTING FINANCIAL MECHANISM TOOLS FOR PUBLIC-PRIVATE PARTNERSHIP IN THE CONTEXT OF UKRAINE’S POST- WAR RECONSTRUCTION by Vasyl G. Demianyshyn, Bohdana S. Shuliuk

    Published 2025-01-01
    “…It is substantiated that the aforementioned tools require detailed study and scientific research today, which will contribute to the formation of effective means of restoring our country, guaranteeing its financial stability and ensuring the security of citizens. It is found that the dominant elements of the financial mechanism of partnerships between the state and business are private investment, state financial support for infrastructure projects, attracted grants, investments and soft loans from international development banks. …”
    Get full text
    Article
  19. 8179

    Prospects for the development of digital forms of political participation of generation Z in modern Russia by S. A. Grishaeva, A. A. Lebedeva

    Published 2021-01-01
    “…According to the results of the study, the authors substantiate the conclusion about the prospects of using digital forms (in particular, online voting) of political participation, primarily due to the speed and security that distinguish digital forms of political participation from traditional ones: it is very convenient to express your civic position from anywhere in the world, while simultaneously doing other things and not fearing negative consequences for participation. …”
    Get full text
    Article
  20. 8180

    Climate Change and Veterinary Medicine: A Call to Action for a Healthier Planet [version 1; peer review: 1 approved, 2 approved with reservations] by Winnifred Akello

    Published 2024-11-01
    “…Abstract Climate change is rapidly transforming ecosystems and reshaping the landscapes of animal health, with profound consequences for public health, food security, and biodiversity. Rising temperatures, shifting weather patterns, and increased frequency of natural disasters are driving the emergence and spread of infectious diseases, particularly zoonotic and vector-borne diseases. …”
    Get full text
    Article