Showing 2,881 - 2,900 results of 5,943 for search '"securities"', query time: 0.11s Refine Results
  1. 2881

    Le système d’identification automatique (AIS) by Arnaud Serry, Laurent Lévêque

    Published 2015-12-01
    “…It enhances maritime safety and security. AIS’ contributions are undeniable in spite of some deficiencies and technical restrictions. …”
    Get full text
    Article
  2. 2882

    Research on reliability of pulsed electrothermal propulsion system of nanosatellite by V. N. Blinov, V. V. Kositsin, A. I. Lukyanchik, P. V. Stepen, P. S. Yachmenev

    Published 2021-12-01
    “…In the paper have been discussed nanosetellite propulsion system normalization actual themes, as well their acknowledgement by the testing results. To secure needed survival probability P≥0,995, the propulsion system bottlenecks normalized values are defined. …”
    Get full text
    Article
  3. 2883

    Synchronization for a Class of Fractional-Order Hyperchaotic System and Its Application by Wen Tan, Feng Ling Jiang, Chuang Xia Huang, Lan Zhou

    Published 2012-01-01
    “…Furthermore, this control scheme can be used in secure communication via the technology of chaotic masking using the complex nonperiodic information as trial message, and the useful information can be recovered at the receiver. …”
    Get full text
    Article
  4. 2884

    Financing Investments in the Future: Pragmatic Solutions Are Needed by Monika Schnitzer, Achim Truger

    Published 2022-01-01
    “…However, they need to be quantified in concrete terms as quickly as possible and designed to ensure legal security in order to send reliable signals for the necessary capacity building, particularly in the construction industry and public administration.…”
    Get full text
    Article
  5. 2885

    Les migrations en transit au Maroc. Attitudes et comportement de la société civile face au phénomène by Laura Feliu Martínez

    Published 2009-11-01
    “…Responsiveness and variability on the part of Moroccan authorities highlight the double dependence of a management process focused on security issues yet influenced by external pressures, including the fragile compromise with the European Union and some member countries. …”
    Get full text
    Article
  6. 2886
  7. 2887
  8. 2888
  9. 2889

    The question of Baltic states in the policy of the Great Western powers in 1943 by Ramojus Kraujelis

    Published 2003-12-01
    “…Because the Western Allies hoped that Stalin would continue the cooperation with the Western powers, USA and Britain accepted Stalin's demands for security in Tehran. Baltic states in inter-Allied relations were used as a bargaining chip. …”
    Get full text
    Article
  10. 2890
  11. 2891

    THE ANALYSIS OF THE KEY DRIVERS AND BARRIERS OF CLOUD MIGRATION IN COMPANIES IN BOSNIA AND HERZEGOVINA by Kasim Tatić, Zijad Džafić, Mahir Haračić, Merima Haračić

    Published 2020-05-01
    “…According to the research results, the most significant obstacles of cloud migration include the fo-llowing: lack of internal experts, privacy, lack of respo-nsibility of cloud providers in case of security incident, costs and complexity of migration to the cloud, etc. …”
    Get full text
    Article
  12. 2892

    STATE POLICY TO COUNTER CRIME IN BORDER REGIONS IN A DIGITAL SOCIETY by Maya G. Dieva, Dureja Z. Zijadova

    Published 2024-03-01
    “…The purpose of the scientific report is to summarize the criminal risks of digitalization for the national security of border regions and to analyze some areas of state policy in the field of combating crime in a digital society. …”
    Get full text
    Article
  13. 2893

    Quantum theory-inspired inter-sentence semantic interaction model for textual adversarial defense by Jiacheng Huang, Long Chen, Xiaoyin Yi, Ning Yu

    Published 2024-12-01
    “…Abstract Deep neural networks have a recognized susceptibility to diverse forms of adversarial attacks in the field of natural language processing and such a security issue poses substantial security risks and erodes trust in artificial intelligence applications among people who use them. …”
    Get full text
    Article
  14. 2894

    ASSESSING THE QUALITY OF MICROSERVICE AND MONOLITHIC-BASED ARCHITECTURES: A SYSTEMATIC LITERATURE REVIEW by Saad Hussein, Mariam Lahami, Mouna Torjmen

    Published 2024-06-01
    “…The outcome of the literature review brings forth the key quality attributes in addition to their sub-characteristics as follows: performance, scalability, coupling, cohesion, deployment, security, development, complexity, maintainability, and availability. …”
    Get full text
    Article
  15. 2895
  16. 2896

    Emergency nurses’ disaster preparedness competencies: A focused mapping review and synthesis by Tshepo L. Motsepe, Shelley Schmollgruber

    Published 2025-01-01
    “…Conclusion: Communication, incident management, safety and security, preparedness and planning are the most identified integral domains within other identified domains. …”
    Get full text
    Article
  17. 2897

    Migration and Residual Trapping of Immiscible Fluids during Cyclic Injection: Pore-Scale Observation and Quantitative Analysis by Haejin Ahn, Seon-Ok Kim, Minhee Lee, Sookyun Wang

    Published 2020-01-01
    “…In GCS operations, residual trapping is the most favorable form of a trapping mechanism because of its storage security and capacity. In this study, the effects of cyclic injection of CO2-water on the immiscible displacement and residual trapping in pore networks were examined. …”
    Get full text
    Article
  18. 2898

    Criminological Scenarios of Crime Situation’s Transformation in the Context of Armed Conflict on Donbass in the Midterm by O. О. Titarenko

    Published 2019-09-01
    “…The author has expertly substantiated the highest probability of developing a crime situation in the midterm in the following three scenarios: “Stagnation and slight increase” (most realistic), “Control and security” (optimistic), “Turbulent crime” (negative). …”
    Get full text
    Article
  19. 2899

    Overcrowding in prisons: Health and legal implications by Eva Nudd, Maha Aon, Kalliopi Kambanella, Marie Brasholt

    Published 2024-01-01
    “…Beyond the harm caused to persons in prisons, this may negatively impact society at large in terms of security, public health, and economy. Political will is essential in reducing prison overcrowding.…”
    Get full text
    Article
  20. 2900

    The EU Cooperation with South African Countries: Main Trends and Prospects for Development by Savchenko Maryna V., Apeniuk Anna I., Skladaniuk Darina M.

    Published 2024-06-01
    “…Stronger cooperation can contribute to economic growth, development, peace, and security.…”
    Get full text
    Article