Showing 2,601 - 2,620 results of 5,943 for search '"securities"', query time: 0.09s Refine Results
  1. 2601

    An Analysis of Chinese Transport Infrastructure Loans and Investment in ICT in Nigeria by Innocent .A. Ocholi, Nnamdi .S. Okonkwo

    Published 2022-12-01
    “…The possibility of debt insolvency has serious implications for national security and socio-economic development the future. …”
    Get full text
    Article
  2. 2602

    Sustainable Planning of Cross Border Cooperation Development (CBC): The factors and drivers that affect the stability of border regions by amin kooshki, mehrshad toulabi nejad

    Published 2020-03-01
    “…The results showed that in the area of planning for unity in Sistan and Baluchestan except for the determination of the right of the Hirmand River in the Sistan region, which was concluded with the country over a period of time, the plan was not approved or implemented, and among the five factors Economic, social, cultural-religious, institutional-structural and political security, three economic factors (0.478), political-security (0.473) and cultural-religious (0.363) have the most effect on the stability of unity of border regions in Studied area. …”
    Get full text
    Article
  3. 2603

    THE IMPACT OF INSECURITY ON THE HOSPITALITY INDUSTRY IN GUSAU METROPOLIS: A CASE STUDY OF HOTELS by APITYAN TUME

    Published 2024-09-01
    “…Hotel managers have implemented various strategies to mitigate these challenges, including enhanced security personnel, surveillance systems, and regular staff training. …”
    Get full text
    Article
  4. 2604

    Government interventions in supporting SME growth in Lira district, northern Uganda by Eton, Marus

    Published 2018
    “…The study discovered that inadequacy of collateral security and struggle for financial resources come into view to limit the use and access to financial services. …”
    Get full text
    Article
  5. 2605

    Government interventions in supporting SME growth in Lira district, northern Uganda by Eton, Marus, Charles David Ebong, Fabian, Mwosi, Benard, Patrick Ogwel

    Published 2018
    “…The study discovered that inadequacy of collateral security and struggle for financial resources come into view to limit the use and access to financial services. …”
    Get full text
    Article
  6. 2606

    Design of a GSM Based Switching and Monitoring System Using a Mobile Phone. by Bbaale Francis

    Published 2023
    “…This GSM based switching and monitoring system is recommended for implementation in homes, offices and industries to prevent appliance damage due over heating, for security purposes and to tackle the rampant energy wastage in Uganda…”
    Get full text
    Thesis
  7. 2607

    Patients’ Experiences with Specialist Care via Video Consultation in Primary Healthcare in Rural Areas by Annette M. Johansson, Inger Lindberg, Siv Söderberg

    Published 2014-01-01
    “…Additionally, good communication was essential for the patient’s perception of security during the VC encounter.…”
    Get full text
    Article
  8. 2608

    A Novel Scheme for Construction of S-Box Using Action of Power Associative Loop and Its Applications in Text Encryption by Muhammad Asif, Sayeda Wajiha, Sameh Askar, Hijaz Ahmad

    Published 2024-01-01
    “…The Avalanche Effect test is used to examine the effectiveness of our technique, and it confirmed the robustness and security of our encryption scheme.…”
    Get full text
    Article
  9. 2609

    A New Method of Image Steganography Using 7th Bit of a Pixel as Indicator by Introducing the Successive Temporary Pixel in the Gray Scale Image by Kamaldeep Joshi, Swati Gill, Rajkumar Yadav

    Published 2018-01-01
    “…As the internet has become the medium for transferring the sensitive information, the security of the transferred message has become the utmost priority. …”
    Get full text
    Article
  10. 2610

    Oil and Iran Regions Rural Economic Structure Alteration by Hassan Afrakhteh, Mohammad Hajipur, Farhad Javan

    Published 2018-03-01
    “…The oil has gradually obtained a predominant place in national economy since 1950 and nowadays, is the main important resource securing country financial needs. Two questions are the base of this research regarding contradiction of oil rent and traditional economic sectors including agriculture and livestock rearing which always have been intensified. …”
    Get full text
    Article
  11. 2611

    Trust-Centric and Economically Optimized Resource Management for 6G-Enabled Internet of Things Environment by Osama Z. Aletri, Kamran Ahmad Awan, Abdullah M. Alqahtani

    Published 2024-12-01
    “…TEO-IoT presents an end-to-end solution for security management and network traffic optimization, utilizing advanced algorithms for trust score estimation and anomaly detection. …”
    Get full text
    Article
  12. 2612

    An Efficient Cluster Authentication Scheme Based on VANET Environment in M2M Application by You-Boo Jeon, Keun-Ho Lee, Doo-Soon Park, Chang-Sung Jeong

    Published 2013-11-01
    “…We have successfully included the establishment of secure channels, the detection of replay attacks, mutual cluster authentication, prevention of vehicle identity fabrication, and secure distribution of provisional session key.…”
    Get full text
    Article
  13. 2613

    Armies of War Without Uniforms: Mercenaries and Private Military Companies in Russia’s Interventions in Syria and Ukraine by Çağla Mavruk, Ali Gök

    Published 2023-04-01
    “…The changing perception of security is the main reason for the resurgence of mercenary activities. …”
    Get full text
    Article
  14. 2614

    Transformation of the currency regulation regime and foreign economic relations of Russia in the context of expanding anti-Russian sanctions by O. B. Anikin, O. M. Fedin

    Published 2024-11-01
    “…The article discusses the features of currency regulation and foreign economic relations of the Russian Federation (hereinafter referred to as RF, Russia) in the context of the introduction and growth of anti-Russian sanctions by the United States of America, European Union countries and other unfriendly countries, issues related to ensuring the sustainability of the Russian economy and its ability to withstand negative internal and external influences, issues of financial security, which is an important component of the country’s economic security, issues of the current state of the state’s banking system and the Russian economy as a whole. …”
    Get full text
    Article
  15. 2615

    Antecedents of smart tourism destination perceived attractiveness and behavioral intention for digital natives by Andar Danova Lastaripar Goeltom, Ratih Hurriyati, Vanessa Gaffar, Lili Adi Wibowo

    Published 2024-11-01
    “…The study has found that digital natives view of interactivity and digital security can influence their assessment of STD attractiveness. …”
    Get full text
    Article
  16. 2616

    Detection and diagnosis of unknown threats in power equipment using machine learning and Spark technology by Li Di, Cen Chen, Zhuo Lv, Mingyan Li, Nuannuan Li, Hao Chang

    Published 2025-01-01
    “…This approach allows for more efficient and accurate detection of unknown threat attacks on power grid equipment, providing robust network security for power systems. Our findings offer a new theoretical perspective for the evolving field of network security.…”
    Get full text
    Article
  17. 2617

    Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method by Udaya Suriya Raj Kumar Dhamodharan, Rajamani Vayanaperumal

    Published 2015-01-01
    “…Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. …”
    Get full text
    Article
  18. 2618

    Explaining The Territoriality Of Fundamentalist Organizations in Fragile States(Case Study: ISIS in Libya) by Morad Kaviani Rad, Hadi Aazami, Majid Rasouli, Ahmad Bakhshi

    Published 2018-03-01
    “…Fundamentalism is one of the security issues of today's world, and the Territorialize and , Territoriality of  fundamentalist terrorist groups has attracted a large part of the world's security literature.  …”
    Get full text
    Article
  19. 2619

    Performance Improvement Based Authentication Protocol for Intervessel Traffic Service Data Exchange Format Protocol Based on U-Navigation System in WoT Environment by Byunggil Lee, Namje Park

    Published 2014-01-01
    “…And the vessel traffic information requires high security since it is highly protected by the countries. …”
    Get full text
    Article
  20. 2620

    ORGANIZATIONAL AND LEGAL ASPECTS OF THE REGULATION OF LABOR RELATIONS OF AN EDUCATIONAL ORGANIZATION AND AN ADVISER TO THE DIRECTOR OF EDUCATION by Elena V. Bezvikonnaya, Andrey A. Savkin

    Published 2024-07-01
    “…Law enforcement practice demonstrates problems in the field of concluding an employment contract and its essential conditions, securing a list of labor functions, securing a position in the staffing table, calculating wages, etc. …”
    Get full text
    Article