Showing 2,701 - 2,720 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 2701

    The Learning Continuum: A Model for Sustained Participation with Hard-to-Serve Clients by Elizabeth B. Bolton

    Published 2002-11-01
    “… This report, The Learning Continuum: A Model for Sustained Participation with Hard-to-Serve Clients, is part of the UF/IFAS Welfare-to-Work Initiative (Grant #A6218) funded by the Florida Agency for Workforce Innovation (formerly Florida Department of Labor and Employment Security). The Principal Investigator is Elizabeth B. …”
    Get full text
    Article
  2. 2702
  3. 2703

    ASSESSMENT OF THE REGION'S INVESTMENT ENVIRONMENT AND POLICY INSTRUMENTS FOR THE IMPLEMENTATION OF ITS INVESTMENT POTENTIAL IN WARTIME by Ruslan Boiko, Roman Martsenyuk, Arsen Protsykevych

    Published 2024-12-01
    “…It is substantiated that effective instruments of regional investment policy in the context of critical instability are: military risk insurance and diversification; use of concession agreements; private and public investments in the defence industry and critical infrastructure industries/sectors (energy, transport and logistics, medicine and pharmaceuticals, natural resources); support for innovative and technological startups in the areas of security, the real economy and infrastructure; stimulation of investments in human resources; support for investments in business projects of demobilised persons, war veterans and other combatants; encouragement of investments in the development of export potential to maintain the country's financial security.…”
    Get full text
    Article
  4. 2704
  5. 2705
  6. 2706
  7. 2707

    Implementasi Algoritme Clefia 128-Bit untuk Pengamanan Modul Komunikasi Lora by Muhammad Fadhli Iman, Ari Kusyanti, Rakhmadhanny Primananda

    Published 2022-12-01
    “…One way to secure the LoRa communication module is to implement a security system that can prevent irresponsible parties from reading the messages sent, by using the encryption method. …”
    Get full text
    Article
  8. 2708

    Minimum Dietary Diversity and Associated Factors among Lactating Mothers in Ataye District, North Shoa Zone, Central Ethiopia: A Community-Based Cross-Sectional Study by Lemma Getacher, Gudina Egata, Tadesse Alemayehu, Agegnehu Bante, Abebaw Molla

    Published 2020-01-01
    “…Therefore, efforts should be made to improve the mother’s decision-making autonomy, nutrition knowledge, household food security, and wealth status.…”
    Get full text
    Article
  9. 2709

    Detention of a person under suspicion of committing a criminal offence and the possibility to appeal in criminal proceedings by V. M. Fedchenko

    Published 2023-12-01
    “…It is emphasized that in addition to the inquirer, investigator, prosecutor, bodies authorized to carry out a pre-trial investigation, subjects who also have the right to detain a person under suspicion of having committed a criminal offense include all policemen, all military personnel serving in the National Guard of Ukraine, all employees of the special law enforcement military formation of the law enforcement service, employees of the State Security Department, military personnel performing duties for the protection of the state border, employees of the special law enforcement body of the Security Service of Ukraine, employees of the state law enforcement agency (NABU), employees of the customs service, officials involved in the anti-terrorist operation, officials and officials of enforcement agencies prisons and detention centers, captains of sea or river vessels of Ukraine located outside its borders, employees of the Department of Economic Security. …”
    Get full text
    Article
  10. 2710
  11. 2711

    BCSE: Blockchain-Based Trusted Service Evaluation Model over Big Data by Fengyin Li, Xinying Yu, Rui Ge, Yanli Wang, Yang Cui, Huiyu Zhou

    Published 2022-03-01
    “…The registration and authentication records of users’ identity and the reviews for service vendors are all stored in the blockchain network. The security analysis shows that this model can ensure the credibility of users’ reviews for service vendors, and other users can obtain credible reviews of service vendors via the review publicity module. …”
    Get full text
    Article
  12. 2712

    Value Added Tax and Economic Development: Focus on Human Capital Development by Kuyebi Favour Orejesuoluwapo, Omodero Cordelia Onyinyechi

    Published 2025-03-01
    “…The recommendations outlined in the study emphasize the importance of training, oversight, exchange rate stabilization, investment in education, and financial security in promoting Economic Development and Human Capital Development in Nigeria. …”
    Get full text
    Article
  13. 2713

    XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System by Maiada M. Mahmoud, Yasser Omar Youssef, Ayman A. Abdel-Hamid

    Published 2025-01-01
    “…By leveraging SHAP values, XI2S-IDS enhances transparency in decision-making, allowing security analysts to gain clear insights into feature importance and the model’s rationale. …”
    Get full text
    Article
  14. 2714

    Protecting Florida Panthers by Protecting Domestic Animals: Building a "Panther-Proof" Pen by Phillip D. Rodgers, Elizabeth F. Pienaar, Mark Lotz, Darrell Land

    Published 2016-11-01
    “…To maintain support for panther conservation, it is paramount that rural residents protect and secure their pets and livestock. This 3-page fact sheet explains how to make a locking, secure enclosure to protect livestock from panther predation—and protect the fragile panther, as well. …”
    Get full text
    Article
  15. 2715

    Optimizing Data Interoperability for System Efficiency: One Data Standard in the Government Environment by Herpita Wahyuni, Dyah Mutiarin, Ulung Pribadi, Wahyudi Kumorotomo, Herdin Arie Saputra

    Published 2024-10-01
    “…Technical challenges relate to differences in communication protocols, data formats, and security. The results of the implementation show that with a careful and collaborative approach, these technical challenges can be overcome, as seen from the network revitalization and increased data security at the Ministry of Manpower with the help of BSSN. …”
    Get full text
    Article
  16. 2716

    A Survey of Post-Quantum Cryptography Migration in Vehicles by Nils Lohmiller, Sabrina Kaniewski, Michael Menth, Tobias Heer

    Published 2025-01-01
    “…A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography (PQC) algorithms. …”
    Get full text
    Article
  17. 2717

    Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks by Madiha Khalid, Umar Mujahid, Muhammad Najam-ul-Islam

    Published 2018-08-01
    “…Since Internet of Things involve wireless channel for communication that is open for all types of malicious adversaries, therefore many security protocols have been proposed to ensure encryption over wireless channel. …”
    Get full text
    Article
  18. 2718

    Exploring Diet Quality, Food Insecurity, and Health Status among Utah Residents by Palak Gupta, Lendel Narine

    Published 2024-12-01
    “…The findings revealed an association between very low food security and poor diet quality, particularly for individuals with reduced fruit and vegetable intake. …”
    Get full text
    Article
  19. 2719

    Cooperative Behaviors and Multienergy Coupling Through Distributed Energy Storage in the Peer-to-Peer Market Mechanism by Zeynep Tanis, Ali Durusu

    Published 2025-01-01
    “…A consortium blockchain-based framework ensures secure and private registration. A peer-to-peer network facilitates multienergy trading, enabling efficient energy generation and storage. …”
    Get full text
    Article
  20. 2720

    Flexibility matters: Impact assessment of small and medium enterprises flexibility on the German energy transition by Anas Abuzayed, Mario Liebensteiner, Niklas Hartmann

    Published 2025-01-01
    “…By 2045, wind power becomes vital for supply security and is operated as a dispatchable ramping-up technology. …”
    Get full text
    Article