Showing 501 - 520 results of 43,439 for search '"nationalization"', query time: 0.10s Refine Results
  1. 501

    AN ASSESSMENT OF CIVIL-MILITARY RELATIONS AND ITS IMPLICATIONS ON NIGERIA'S NATIONAL SECURITY by Uti Harrison Onyeka, Ubong Ituen Ituen

    Published 2022-05-01
    “…This has continued to contribute to the present level of national insecurity in Nigeria, further exposing and affecting the security architecture of the Nigerian state. …”
    Get full text
    Article
  2. 502
  3. 503

    Lithuanian Conceptual Colour–Emotion Associations in the Global Context of 37 Nations by Domicelė Jonauskaitė

    Published 2024-05-01
    “…When compared to each other nation individually, colour–emotion association pattern similarities ranged between .65 and .89. …”
    Get full text
    Article
  4. 504

    Applying Pesticides in Compliance with the National Pollutant Discharge Elimination System (NPDES) by Frederick M. Fishel

    Published 2012-01-01
    “…PI239/PI239: Applying Pesticides in Compliance with the National Pollutant Discharge Elimination System (NPDES) (ufl.edu) …”
    Get full text
    Article
  5. 505

    Presenting the evaluation model of financial technology policies in National Bank of Iran by Vahid moradi, changiz mohammadi zadeh, ali farhadi mahali

    Published 2024-09-01
    “…Theoretical Framework fintech Fintech or financial technology refers to a set of businesses that use software and hardware to provide innovative financial services. The National Center for Digital Research in Dublin, Ireland defines fintech as innovation in financial services (Owzaei & Sohrabi, 2017).   …”
    Get full text
    Article
  6. 506
  7. 507
  8. 508
  9. 509

    The Development of the US National Missile Defense and its Impact on the International Security by J. Yu. Parshkova

    Published 2015-02-01
    “…The article reflects the US officials' point of view on the development of its national missile defense. The major threat to international security is the proliferation of ballistic missiles and weapons of mass destruction. …”
    Get full text
    Article
  10. 510
  11. 511

    Roman stamped bricks from the Tussla-collection in the Hungarian National Museum by Linda Dobosi, Tamás Szabadváry

    Published 2025-01-01
    “… The so-called Tussla-collection of the Hungarian National Museum is a substantial collection of Roman artefacts collected by Mr. and Mrs. …”
    Get full text
    Article
  12. 512

    Development of blood transfusion external quality assessment program at national scale by Chuong Van Le, Nguyen Nhat Tran, Van Thi Kim Nguyen, Nhu Le Thao Bui, Thu Thi Thanh Do, Phuc Thi Diem Huynh

    Published 2023-12-01
    “…Conclusion: The procedure of production of proficiency testing items has been successfully developed, and its application at the national level is suggested to improve the quality of blood transfusion laboratories.…”
    Get full text
    Article
  13. 513
  14. 514

    Automotive ethernet controller authentication method based on national cryptographic algorithms by Hui GUO, Yong LUO, Xiaolu GUO

    Published 2022-12-01
    “…With the development of intelligent and connected cars, cyber security of automotive ethernet becomes the focus of automotive industry.Authentication is one of the key technologies for automotive ethernet security.The existing authentication methods have shortcomings to meet the requirements of both safety and electronic controllers’ performance.Besides, national cryptographic algorithms are becoming a trend for automotive network security, while the related research in automotive ethernet area is still in starting phase.In order to balance the limited computing performance of electronic controllers and high security requirements of automotive ethernet, a two-stage trust chain authentication method based on national cryptographic algorithms was proposed.The method can be used in different automotive ethernet topologies.A trust chain was built up based on authentication credentials, which linked the two authentication stages, namely the initial stage and the vehicle using stage.The initial stage was triggered by diagnosis instrument at end of line or controller replacement.It deployed complete authentication based on SM2 algorithm and certificates in the initial stage.The vehicle using stage was triggered by ethernet gateway at vehicle power-on or network wakeup.In this stage, the method deployed fast authentication based on SM4 algorithm and authentication credential trust chain.The authentication credentials for trust chain were generated by credential functions.In order to ensure security, each credential was generated based on last successful authentication parameters dynamically.The test results on automotive ethernet controllers show that the method has lower computing cost and higher security level, and it can guarantee both performance and security.…”
    Get full text
    Article
  15. 515

    The Dark Knight’s Dystopian Vision: Batman, Risk, and American National Identity by Jeanne Cortiel, Laura Oehme

    Published 2015-08-01
    “…Our focus on risk is based on Ulrich Beck’s articulation of “reflexive modernity” and reveals the specific ways in which Miller’s Dark Knight series signals a transition in American national, racial and gender identities since the 1980s. …”
    Get full text
    Article
  16. 516
  17. 517
  18. 518
  19. 519
  20. 520