-
261
Refugees as a new emigration channel from Tajikistan to Western and Eastern Europe
Published 2022-06-01“…Deportations, decline in earnings after the 2015 currency crisis, and tightening of Russia’s migration policy towards migrants from Tajikistan forced some migrants to reorient themselves in other countries, primarily in European countries, the United States and Canada. …”
Get full text
Article -
262
Financial and Legal Regulation of the Security of Economic Activity
Published 2020-06-01“…It has been established that the legal provision of financial security of business entities is based on regulatory basis that defines the principles, methods, functions and powers of public authorities’ activity and activity of local self-government agencies in all components of the financial system, namely in budgetary, tax, currency, banking, investment, etc., in particular in the area of financial control, which facilitates the establishment of the legitimacy of financial activities and the rational use of finances. …”
Get full text
Article -
263
Adaptive algorithms for change point detection in financial time series
Published 2024-12-01“…By applying these methods to financial market data, particularly in monitoring currency pairs like EUR/USD, we illustrate how dynamic filtering and multiregression analysis can significantly enhance the identification of change points. …”
Get full text
Article -
264
Circumstances for Committing Crimes in the Banking Sector: Normative and Legal Aspect
Published 2020-12-01“…In this regard, the development of the doctrine of forensic forecasting in conditions of instability of processes in the economy in its individual segments (lending, currency regulation), weak control over the conduct and accounting of banking transactions, etc. is of great importance. …”
Get full text
Article -
265
SCO and BRICS in an emerging multipolar world order
Published 2024-09-01“…In this regard, special attention is paid to the efforts to create a BRICS currency and to cooperation within the framework of the New Development Bank. …”
Get full text
Article -
266
Process of effective management of the Eurasian transport system on the terms of integration
Published 2023-12-01“…Transformation of international relations caused by geopolitical processes significantly affects the development trends in foreign trade activities, global restructuring of goods movement channels, changes in the conditions of currency and customs regulation, lending, and investment. …”
Get full text
Article -
267
The Effects of Cryptocurrency on Investment Portfolio in Tanzania: A Case of Cryptocurrency Brokers at Yellow Card Company
Published 2024-11-01“…This study investigated the effects of cryptocurrency on investment portfolios through currency brokers at Yellow Card Company in Tanzania, focusing on price fluctuations, volatility metrics, and market swings. …”
Get full text
Article -
268
Analysis of Digital Marketing 4C in Convection MSMEs in the Era of Society 5.0
Published 2024-12-01“…This is in accordance with Currency where in this digital era prices are more dynamic. …”
Get full text
Article -
269
Honest Computing: achieving demonstrable data lineage and provenance for driving data and process-sensitive policies
Published 2024-01-01“…Addressing use cases in many fields, from AI model protection and ethical layering to digital currency formation for finance and banking, trading, and healthcare, this foundational layer approach can help define new standards for appropriate data custody and processing.…”
Get full text
Article -
270
A Time-motion Comparison of Itemized Treatment Costs in First and Second In Vitro Fertilization Attempts: A United Kingdom Fertility Centre Experience
Published 2013-07-01“…While these observations were registered in 2003, an inflation adjustment using recent European Commission Eurostat data for healthcare finds the difference between initial and subsequent fresh IVF cycles in present currency to be approximately £579.14 per cycle. Time-motion analysis can identify episodes of care that can be streamlined to improve outcomes and reduce cost.…”
Get full text
Article -
271
Analisis Kualitatif Elemen Gamifikasi dalam Games Berbasis ICT untuk Anak Usia Dini
Published 2023-08-01“…In addition, the results also confirm that there are nine elements of gamification that are suitable to be applied to in the early childhood environment, namely points and rewards, leaderboards, badges, challenges, leveling, progress bar, avatars, currency, and surprises. The results of this study can be used as the basis for further research in relation to developing a prototype of a game-based learning system in early childhood education with a focus on interaction, rewarding, problem solving, and challenges. …”
Get full text
Article -
272
Des semis et des clones
Published 2017-10-01“…Almond fruit, quite commonly used as currency, is a bankable standing crop; in this respect, there is a distinction between hard shell almonds (l’luz beldi), which are stored throughout the year, and soft shell almonds (l’luz snan or l’luz romi), which cannot be preserved as long. …”
Get full text
Article -
273
Taxation of exports and imports of services: Automation of accounting and audit of transactions
Published 2023-05-01“…The fourth stage involves checking the date of documents under the contract, payment dates, applicable exchange rates on the date of the transaction, calculation of exchange rate differences, and compliance with currency control in the settlement. Depending on the amount of transactions, controlled transactions are also subject to review. …”
Get full text
Article -
274
Overview of blockchain assets theft attacks and defense technology
Published 2023-02-01“…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
Get full text
Article -
275
Touch-driven advantages in reaction time but not in performance in a cross-sensory comparison of reinforcement learning
Published 2025-01-01“…These findings support the ‘common currency’ hypothesis of perceptual confidence, facilitating modality-independent meta-representations for efficient decision-making. …”
Get full text
Article -
276
Averting War in Northeast Asia: A Proposal
Published 2011-01-01“…And China-US relations are increasingly contentious, going beyond the longstanding differences over currency valuation and human rights to include a host of security matters. …”
Get full text
Article -
277
Occupational health risk assessment and risk monetization based on xylene exposureMendeley Data
Published 2025-01-01“…Subsequently, a risk monetization method was used to convert the health risks of xylene exposure into currency. the results of the study showed that the EPA and MOM models were more reasonable and could accurately identify occupational health risks due to xylene exposure, while the ICMM model overestimated the health risks due to xylene exposure by assessing the risk level of all industries as level 4 or higher. …”
Get full text
Article -
278
EU fiscal governance and budget consolidation in Visegrád countries
Published 2019-07-01“…For example, three of four Visegrád countries are not members of a currency union, which inter alia contributed to monetizing government debt. …”
Get full text
Article -
279
Distinct neural bases of visual art- and music-induced aesthetic experiences
Published 2025-01-01“…Our findings support the domain-specific view of aesthetic appreciation and challenge the notion that there is a general “common neural currency” for aesthetic experiences across domains.…”
Get full text
Article -
280
Phytochemistry and pharmacological advances of Ascophyllum nodosum in the management of human diseases: A comprehensive review
Published 2025-02-01“…Additionally, the search included only English-language articles published within the last decade, with an emphasis on research from the past five years to ensure currency and relevance. Older but foundational studies were also retained to provide historical context and background. …”
Get full text
Article