Showing 2,801 - 2,820 results of 5,943 for search '"securities"', query time: 0.07s Refine Results
  1. 2801

    Central Bank Digital Currencies: Benefits, Risks and the Role of Blockchain Technology by Jonas Groß, Manuel Klein, Philipp Sandner

    Published 2020-07-01
    “…The main motives are higher financial stability, higher security and efficiency of payment systems and a higher degree of automation of business processes. …”
    Get full text
    Article
  2. 2802

    Biosecurity and Biological Risk Management for Livestock Enterprises by Matt Hersom, Max Irsik, Todd Thrift

    Published 2008-04-01
    “… AN-194, a 6-page fact sheet by Matt Hersom, Max Irsik, and Todd Thrift, describes biosecurity and biological risk management practices, basic biosecurity and BRM management practices, disease transmission routes, enterprise security, reasons to have a BRM plan, and biosecurity best management practices. …”
    Get full text
    Article
  3. 2803

    Machine learning models and methods for solving optimization and forecasting problems of the work of seaports by M. N. Lukashevich, M. Y. Kovalyov

    Published 2022-12-01
    “…A special attention is paid to the port planning and development a wide range of topics in port operations, including port planning and development, their safety and security, water and land port operations.…”
    Get full text
    Article
  4. 2804

    Adoption of Drone Technology for the Smart Safety Mechanism of Women by Victoria Nozick

    Published 2022-09-01
    “…These DRONES helps them to keep secure and do all the patrol or Police work during nights.…”
    Get full text
    Article
  5. 2805

    The conservation of a 19th century framed miniature portrait painted on ivory by Violeta Machado Prin

    Published 2018-05-01
    “…The object was in poor condition, with all the pieces necessary to hold the object separated and with the attempt of securing these parts with brown and clear adhesive tape. …”
    Get full text
    Article
  6. 2806

    On the optimal exercise boundary for an American put option by Ghada Alobaidi, Roland Mallier

    Published 2001-01-01
    “…An American put option is a derivative financial instrument that gives its holder the right but not the obligation to sell an underlying security at a pre-determined price. American options may be exercised at any time prior to expiry at the discretion of the holder, and the decision as to whether or not to exercise leads to a free boundary problem. …”
    Get full text
    Article
  7. 2807

    Darknesses over the Bistrica. On some unacceptable interpretations of the history of Prizren and its monuments by Vojvodić Dragan, Pirivatrić Srđan

    Published 2023-01-01
    “…It is shown that those views and opinions have no basis in the sources and are a result of unsound methodology and ignoring securely ascertained facts in a bid to reshape tendentiously the image of the past.…”
    Get full text
    Article
  8. 2808

    Korean Brinkmanship, American Provocation, and the Road to War: The Manufacturing of a Crisis by Tim Beal

    Published 2010-12-01
    “…The exchange of artillery fire between South and North Korea on 23 November, 2010 had predictable results - a great increase of tension on the peninsula, a show of force by the United States, and a torrent of uninformed media articles and pontificating from the security industry.Tim Beal probes the historical background to the recent incident that has brought the two Koreas, as well as the United States and China, to the brink of a new Korean War, and what can be done to address the issues.…”
    Get full text
    Article
  9. 2809

    Analytical and scientific support mechanism of the US foreign policy process by I. A. Istomin

    Published 2009-12-01
    “…The U.S. intellectual leadership in many spheres is rarely challenged nowadays. However it is secured not only through the ability to formulate a great amount of new ideas, including fundamental innovations, but perhaps even more due to the effective system for integration of intellectual products into practice. …”
    Get full text
    Article
  10. 2810

    Biosecurity and Biological Risk Management for Livestock Enterprises by Matt Hersom, Max Irsik, Todd Thrift

    Published 2008-04-01
    “… AN-194, a 6-page fact sheet by Matt Hersom, Max Irsik, and Todd Thrift, describes biosecurity and biological risk management practices, basic biosecurity and BRM management practices, disease transmission routes, enterprise security, reasons to have a BRM plan, and biosecurity best management practices. …”
    Get full text
    Article
  11. 2811

    Respite Care for Caregivers of Older Adults by Suzanna Smith

    Published 2012-08-01
    “…My grandmother knew she was safe, secure, and loved.” This 2-page Family Album Radio transcript was written by Suzanna Smith and published by the UF Department of Family, Youth and Community Sciences, August 2012. …”
    Get full text
    Article
  12. 2812

    ECOLOGICALLY ORIENTED MATHEMATICAL MODELS OF RISK MANAGEMENT AND SAFETY by I. Gvozdkova

    Published 2016-09-01
    “…Recommendations on the implementation and development of eco-friendly models in the interests of rational nature management, resource saving, human security and natural-anthropogenic complexes are formulated.…”
    Get full text
    Article
  13. 2813

    ANALYSING EFFICIENCY OF AGGRESSIVE ETF-COMPOSED PORTFOLIO STRATEGIES by A. Zaviyalov

    Published 2014-06-01
    “…Based on the results of the t-tests, one can conclude whether the above-mentioned market segment is inefficient or partially inefficient, which would mean one can find an "aggressive"strategy to secure stable above-market returns.…”
    Get full text
    Article
  14. 2814
  15. 2815
  16. 2816

    EPPTA: Efficient partially observable reinforcement learning agent for penetration testing applications by Zegang Li, Qian Zhang, Guangwen Yang

    Published 2025-01-01
    “…Abstract In recent years, penetration testing (pen‐testing) has emerged as a crucial process for evaluating the security level of network infrastructures by simulating real‐world cyber‐attacks. …”
    Get full text
    Article
  17. 2817
  18. 2818

    A Multi-Signature Scheme for Defending Malleability Attack on DeFi by Chen Zhang, Wenyu Liao, Xiaobin Liu, Huanrong Wu, Mohammed J. F. Alenazi

    Published 2025-01-01
    “…Signatures are crucial in blockchain-based Decentralised Finance (DeFi) protocols because they ensure the security and integrity of transactions and smart contracts. …”
    Get full text
    Article
  19. 2819

    Levels Politechnic Community Satisfaction to The Use of Lebuhraya Pantai Timur 2 by Rosmida binti Ab Ghani, Najah binti Mohd Nawi, Norhafiza binti Idris

    Published 2018-11-01
    “…Results of this analysis showed a mean value for items 'security level' in LPT2 is 2.29, i.e. at low mean score. …”
    Get full text
    Article
  20. 2820

    Examination and the State of Intoxication: Features of Legal Regulation and Observance of Human Rights and Freedoms by M. A. Sambor

    Published 2020-06-01
    “…In other circumstances, such an examination of intoxication should be considered inadmissible evidence in an administrative offense case, since it was obtained in substantial violation of human rights and freedoms, including the right to liberty and security, as well as a number of other rights, which the detained person failed to exercise. …”
    Get full text
    Article