Showing 261 - 280 results of 318 for search '"currency"', query time: 0.05s Refine Results
  1. 261

    Refugees as a new emigration channel from Tajikistan to Western and Eastern Europe by A. Kh. Rakhmonov

    Published 2022-06-01
    “…Deportations, decline in earnings after the 2015 currency crisis, and tightening of Russia’s migration policy towards migrants from Tajikistan forced some migrants to reorient themselves in other countries, primarily in European countries, the United States and Canada. …”
    Get full text
    Article
  2. 262

    Financial and Legal Regulation of the Security of Economic Activity by O. P. Getmanets

    Published 2020-06-01
    “…It has been established that the legal provision of financial security of business entities is based on regulatory basis that defines the principles, methods, functions and powers of public authorities’ activity and activity of local self-government agencies in all components of the financial system, namely in budgetary, tax, currency, banking, investment, etc., in particular in the area of financial control, which facilitates the establishment of the legitimacy of financial activities and the rational use of finances. …”
    Get full text
    Article
  3. 263

    Adaptive algorithms for change point detection in financial time series by Alexander Musaev, Dmitry Grigoriev, Maxim Kolosov

    Published 2024-12-01
    “…By applying these methods to financial market data, particularly in monitoring currency pairs like EUR/USD, we illustrate how dynamic filtering and multiregression analysis can significantly enhance the identification of change points. …”
    Get full text
    Article
  4. 264

    Circumstances for Committing Crimes in the Banking Sector: Normative and Legal Aspect by V. V. Korniienko

    Published 2020-12-01
    “…In this regard, the development of the doctrine of forensic forecasting in conditions of instability of processes in the economy in its individual segments (lending, currency regulation), weak control over the conduct and accounting of banking transactions, etc. is of great importance. …”
    Get full text
    Article
  5. 265

    SCO and BRICS in an emerging multipolar world order by D. V. Malyshev

    Published 2024-09-01
    “…In this regard, special attention is paid to the efforts to create a BRICS currency and to cooperation within the framework of the New Development Bank. …”
    Get full text
    Article
  6. 266

    Process of effective management of the Eurasian transport system on the terms of integration by E. V. Pustynnikova

    Published 2023-12-01
    “…Transformation of international relations caused by geopolitical processes significantly affects the development trends in foreign trade activities, global restructuring of goods movement channels, changes in the conditions of currency and customs regulation, lending, and investment. …”
    Get full text
    Article
  7. 267

    The Effects of Cryptocurrency on Investment Portfolio in Tanzania: A Case of Cryptocurrency Brokers at Yellow Card Company by Diana Meela, Pastory Dickson, Faustin Ngenyuko

    Published 2024-11-01
    “…This study investigated the effects of cryptocurrency on investment portfolios through currency brokers at Yellow Card Company in Tanzania, focusing on price fluctuations, volatility metrics, and market swings. …”
    Get full text
    Article
  8. 268

    Analysis of Digital Marketing 4C in Convection MSMEs in the Era of Society 5.0 by Gian Riksa Wibawa, Arif Arif, Muhammad Irsal Muharrom, Luviany Kastury, Andra Kharuna Pratama, Sofie Aulia, Febi Ferbianti

    Published 2024-12-01
    “…This is in accordance with Currency where in this digital era prices are more dynamic. …”
    Get full text
    Article
  9. 269

    Honest Computing: achieving demonstrable data lineage and provenance for driving data and process-sensitive policies by Florian Guitton, Axel Oehmichen, Étienne Bossé, Yike Guo

    Published 2024-01-01
    “…Addressing use cases in many fields, from AI model protection and ethical layering to digital currency formation for finance and banking, trading, and healthcare, this foundational layer approach can help define new standards for appropriate data custody and processing.…”
    Get full text
    Article
  10. 270

    A Time-motion Comparison of Itemized Treatment Costs in First and Second In Vitro Fertilization Attempts: A United Kingdom Fertility Centre Experience by Christopher A. Jones, Olivia J. Carpinello, Dev Kumar, Louis G. Keith, Renju S. Raj, E. Scott Sills

    Published 2013-07-01
    “…While these observations were registered in 2003, an inflation adjustment using recent European Commission Eurostat data for healthcare finds the difference between initial and subsequent fresh IVF cycles in present currency to be approximately £579.14 per cycle. Time-motion analysis can identify episodes of care that can be streamlined to improve outcomes and reduce cost.…”
    Get full text
    Article
  11. 271

    Analisis Kualitatif Elemen Gamifikasi dalam Games Berbasis ICT untuk Anak Usia Dini by Bayu Rima Aditya, Aldilla Iradianty, I Nyoman Darma Kotama

    Published 2023-08-01
    “…In addition, the results also confirm that there are nine elements of gamification that are suitable to be applied to in the early childhood environment, namely points and rewards, leaderboards, badges, challenges, leveling, progress bar, avatars, currency, and surprises. The results of this study can be used as the basis for further research in relation to developing a prototype of a game-based learning system in early childhood education with a focus on interaction, rewarding, problem solving, and challenges. …”
    Get full text
    Article
  12. 272

    Des semis et des clones by Malou Delplancke, Yildiz Aumeeruddy-Thomas

    Published 2017-10-01
    “…Almond fruit, quite commonly used as currency, is a bankable standing crop; in this respect, there is a distinction between hard shell almonds (l’luz beldi), which are stored throughout the year, and soft shell almonds (l’luz snan or l’luz romi), which cannot be preserved as long. …”
    Get full text
    Article
  13. 273

    Taxation of exports and imports of services: Automation of accounting and audit of transactions by Іryna Zhurakovska, Roman Sydorenko

    Published 2023-05-01
    “…The fourth stage involves checking the date of documents under the contract, payment dates, applicable exchange rates on the date of the transaction, calculation of exchange rate differences, and compliance with currency control in the settlement. Depending on the amount of transactions, controlled transactions are also subject to review. …”
    Get full text
    Article
  14. 274

    Overview of blockchain assets theft attacks and defense technology by Beiyuan YU, Shanyao REN, Jianwei LIU

    Published 2023-02-01
    “…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
    Get full text
    Article
  15. 275

    Touch-driven advantages in reaction time but not in performance in a cross-sensory comparison of reinforcement learning by Wenhan Sun, Isabelle Ripp, Aylin Borrmann, Maximilian Moll, Merle Fairhurst

    Published 2025-01-01
    “…These findings support the ‘common currency’ hypothesis of perceptual confidence, facilitating modality-independent meta-representations for efficient decision-making. …”
    Get full text
    Article
  16. 276

    Averting War in Northeast Asia: A Proposal by Mel Gurtov

    Published 2011-01-01
    “…And China-US relations are increasingly contentious, going beyond the longstanding differences over currency valuation and human rights to include a host of security matters. …”
    Get full text
    Article
  17. 277

    Occupational health risk assessment and risk monetization based on xylene exposureMendeley Data by Fei Li, Boshen Wang, Baoli Zhu

    Published 2025-01-01
    “…Subsequently, a risk monetization method was used to convert the health risks of xylene exposure into currency. the results of the study showed that the EPA and MOM models were more reasonable and could accurately identify occupational health risks due to xylene exposure, while the ICMM model overestimated the health risks due to xylene exposure by assessing the risk level of all industries as level 4 or higher. …”
    Get full text
    Article
  18. 278

    EU fiscal governance and budget consolidation in Visegrád countries by Zh. N. Komissarova, E. A. Sergeev

    Published 2019-07-01
    “…For example, three of four Visegrád countries are not members of a currency union, which inter alia contributed to monetizing government debt. …”
    Get full text
    Article
  19. 279

    Distinct neural bases of visual art- and music-induced aesthetic experiences by Youjing Luo, Qianqian Yu, Shuyi Wu, Yue-jia Luo

    Published 2025-01-01
    “…Our findings support the domain-specific view of aesthetic appreciation and challenge the notion that there is a general “common neural currency” for aesthetic experiences across domains.…”
    Get full text
    Article
  20. 280

    Phytochemistry and pharmacological advances of Ascophyllum nodosum in the management of human diseases: A comprehensive review by Brijesh Singh Chauhan, Yash Pal Singh

    Published 2025-02-01
    “…Additionally, the search included only English-language articles published within the last decade, with an emphasis on research from the past five years to ensure currency and relevance. Older but foundational studies were also retained to provide historical context and background. …”
    Get full text
    Article