Showing 8,941 - 8,960 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 8941

    INNOVATIVE TRANSFORMATIONS OF THE NATIONAL LEGAL SYSTEM OF UKRAINE AS A CONDITION FOR PARTICIPATION IN EUROPEAN POLICIES by Oleksandr Perederii

    Published 2024-05-01
    “…The author reveals the main clusters of EU law provisions which are currently most implemented in the legal system of Ukraine (customs, food security, veterinary and phytosanitary policy, consumer protection and healthcare, statistics, foreign relations, transport policy, freedom of entrepreneurship and provision of services, financial services, freedom of movement of goods). …”
    Get full text
    Article
  2. 8942

    Mechanisms of Stress Alleviation after Lime and Biochar Applications for Brassica napus L. in Cadmium-Contaminated Soil by Ming Lei, Zhuoqing Li, Beibei Zhang, Xinqi Wang, Boqing Tie, Tehreem Ayaz, Xia Lu

    Published 2022-01-01
    “…Lime and biochar amendments are widely used to immobilize cadmium (Cd) in agricultural soils and to ensure food security. However, the effects of these two soil amendments on the mechanisms of Cd stress alleviation in crops are unclear. …”
    Get full text
    Article
  3. 8943

    Inheritance of signs of «many-flowered» common wheat and evaluation of productivity of the spike of F2 hybrids by V. S. Arbuzova, O. B. Dobrovolskaya, P. Martinek, E. V. Chumanova, T. T. Efremova

    Published 2016-08-01
    “…The seeds of these plants will be used to secure «flowering». Two-factor analysis of variance showed that the number of grains per spike knotted depends on growing conditions, genotype and their interaction. …”
    Get full text
    Article
  4. 8944
  5. 8945

    Economic aspects of conflicts in the global economy in the conditions of the New Cold War by Оlena Baula, Оksana Urban

    Published 2023-03-01
    “…It is assumed that in order to ensure the strength of the EU's own governance system, it is advisable to implement priorities related to overcoming inequality by guaranteeing the sustainable development of the region, as well as the revival of the Western European security order to guarantee peace and stability in its countries and Ukraine. …”
    Get full text
    Article
  6. 8946

    New Architecture of Foreign Direct Investment Regulation in the European Union by D. E. Moiseeva, A. D. Kulinich

    Published 2024-11-01
    “…The article also identifies key events that acted as catalysts for the EU’s geopolitical reassessment of foreign investment—from a stance of openness to recognizing potential threats to collective security and public order. It draws a parallel with the Commission’s use of securitization discourse in the energy sector, which contributed to the partial communitarization of energy policy through multi-level governance.…”
    Get full text
    Article
  7. 8947

    Cluster analysis of potential autonomous vehicle (AV) adopters in Indonesia’s new capital by Eko Agus Prasetio, Dita Novizayanti, Aghnia Nadhira Aliya Putri

    Published 2025-01-01
    “…However, uncertainties about AV safety and security remain, shaped by cultural, educational, and personal contexts. …”
    Get full text
    Article
  8. 8948

    Synergy of Occupational Safety and Work Environment to Support Productivity and Sustainable Well-Being in the Port Sector by Hengki Firmansyah, Muji Gunarto, Andriyansah Andriyansah

    Published 2024-12-01
    “…These findings underscore the importance of a conducive work environment, supported by employee security and comfort, in boosting motivation and operational efficiency. …”
    Get full text
    Article
  9. 8949
  10. 8950

    Implementation of the Project “Community Police Officer”: Real Actions to Bring Police Service Closer to People (on the example of Kharkiv oblast) by M. V. Holub

    Published 2020-12-01
    “…Special attention has been paid to the important role of the National Police in the process of implementing the decentralization, taking measures to ensure public order and security in the territories of united communities, taking into account the views, positions and recommendations of residents of united territorial communities, the importance of interaction between community police officers and the population. …”
    Get full text
    Article
  11. 8951

    Comparison of the Effects of Desflurane, Sevoflurane, and Propofol on the Glottic Opening Area during Remifentanil-Based General Anesthesia Using a Supraglottic Airway Device by Takashi Kondo, Hiromichi Izumi, Makiko Kitagawa

    Published 2020-01-01
    “…Clinicians should be aware of the possibility of glottic stenosis during desflurane-remifentanil anesthesia when the airway is secured by a supraglottic airway device without the use of neuromuscular blockade.…”
    Get full text
    Article
  12. 8952

    USER ACCEPTANCE OF MOBILE-JKN: INSIGHTS FROM THE TECHNOLOGY ACCEPTANCE MODEL by Ferina Septiani Damanik, Anna Wahyuni Widayanti, Chairun Wiedyaningsih

    Published 2024-12-01
    “…Despite its potential benefits, the implementation of this application faces various challenges, such as application errors, differing levels of digital literacy, and data security issues, necessitating an evaluation of its adoption and acceptance. …”
    Get full text
    Article
  13. 8953

    Cultural dimensions of safe cities by Ćurčić Slađana

    Published 2024-01-01
    “…Namely, cultural differences determine the different functioning of states in many fields, so academic literature on urban security often investigates whether and in what way cultural variables reflect on the resilience of cities, urban planning, urban development, etc. …”
    Get full text
    Article
  14. 8954

    Opportunities for promoting open data in the Caribbean through biobanks by Sushant Saluja, Simon G. Anderson

    Published 2025-02-01
    “…This article highlights the challenges of developing biobanks, including ensuring sufficient sample storage and data security, and the need for strong governance. It recommends solutions that involve regional collaboration, stakeholder engagement and increased investment in infrastructure. …”
    Get full text
    Article
  15. 8955

    The learning curve for hood‐sparing robotic‐assisted radical prostatectomy: A single‐surgeon experience by Keith R. S. Simpson, Jamie Krishnan, Linda Taylor, Alan McNeill, Daniel W. Good

    Published 2025-01-01
    “…Early continence was defined by patients reporting being ‘dry’ and with 0 pad or 1 confidence/security pad. Data was collected in an Excel spreadsheet, and SPSS was used to assess distribution with non‐parametric data being analysed using a Mann Whitney U test and parametric data with an unpaired t‐test. …”
    Get full text
    Article
  16. 8956

    Genome assembly and population analysis of tetraploid marama bean reveal two distinct genome types by Jin Li, Christopher Cullis

    Published 2025-01-01
    “…Abstract Tylosema esculentum (marama bean), an underutilized orphan legume native to southern Africa, holds significant potential for domestication as a rescue crop to enhance local food security. Well-adapted to harsh desert environments, it offers valuable insights into plant resilience to extreme drought and high temperatures. …”
    Get full text
    Article
  17. 8957

    Detection of SSL/TLS protocol attacks based on flow spectrum theory by Shize GUO, Fan ZHANG, Zhuoxue SONG, Ziming ZHAO, Xinjie ZHAO, Xiaojuan WANG, Xiangyang LUO

    Published 2022-02-01
    “…Network attack detection plays a vital role in network security.Existing detection approaches focus on typical attack behaviors, such as Botnets and SQL injection.The widespread use of the SSL/TLS encryption protocol arises some emerging attack strategies against the SSL/TLS protocol.With the network traffic collection environment that built upon the implements of popular SSL/TLS attacks, a network traffic dataset including four SSL/TLS attacks, as well as benign flows was controlled.Considering the problems that limited observability of existing detection and limited separation of the original-flow spatiotemporal domains, a flow spectrum theory was proposed to map the threat behavior in the cyberspace from the original spatiotemporal domain to the transformed domain through the process of “potential change” and obtain the “potential variation spectrum”.The flow spectrum theory is based on a set of separable and observable feature representations to achieve efficient analysis of network flows.The key to the application of flow spectrum theory in actual cyberspace threat behavior detection is to find the potential basis matrix for a specific threat network flow under the condition of a given transformation operator.Since the SSL/TLS protocol has a strong timing relationship and state transition process in the handshake phase, and there are similarities between some SSL/TLS attacks, the detection of SSL/TLS attacks not only needs to consider timing context information, but also needs to consider the high-separation representation of TLS network flows.Based on the flow spectrum theory, the threat template idea was used to extract the potential basis matrix, and the potential basis mapping based on the long-short-term memory unit was used to map the SSL/TLS attack network flow to the flow spectrum domain space.On the self-built SSL/TLS attack network flow data set, the validity of the flow spectrum theory is verified by means of classification performance comparison, potential variation spectrum dimensionality reduction visualization, threat behavior feature weight evaluation, threat behavior spectrum division assessment, and potential variation base matrix heatmap visualization.…”
    Get full text
    Article
  18. 8958

    The European Union’s Policies Towards Iraq (2014–2020) by L. D. Oganisyan

    Published 2020-11-01
    “…The paper consists of three sections: the first one outlines the evolution of the EU strategic priorities in Iraq during 2014–2019, the second covers the major assistance programmes implemented by the European Union, both bilaterally and multilaterally, in Iraq; the third examines the EU reaction to the rising tensions in Iraq at the turn of 2019–2020.The author concludes that the EU’s growing interest in Iraq in recent years stems not only from concerns about transformation of this country into a source of cross-border challenges and threats, but also from the conviction of the EU officials that Iraq might potentially become the cornerstone of a new regional security architecture. On the basis of these considerations, the EU provides a comprehensive support to Iraq, including both humanitarian aid and development assistance aimed primarily at eliminating the fundamental causes of instability and radicalization. …”
    Get full text
    Article
  19. 8959

    Total Vitamin C, Ascorbic Acid, Dehydroascorbic Acid, Antioxidant Properties, and Iron Content of Underutilized and Commonly Consumed Fruits in Sri Lanka by Hashini I. Abeysuriya, Vajira P. Bulugahapitiya, Jayatissa Loku Pulukkuttige

    Published 2020-01-01
    “…These results indicate that underutilized fruits in Sri Lanka can be recommended as high quality and low-cost alternatives for securing nutritional requirements. Hence, underutilized fruits can be promoted as healthy additional fruits in Sri Lanka.…”
    Get full text
    Article
  20. 8960

    The first Lithuanian Archaeological expedition in Afghanistan by Aleksiejus Luchtanas, Ramunė Butrimaitė

    Published 2008-08-01
    “…With the creation of the International Security Assistance Force (ISAF) in Afghanistan and the establishment of the provincial reconstruction team in Ghor province, conducted by Lithuania, civilian projects related to culture, education, and health services are being carried on. …”
    Get full text
    Article