Showing 3,141 - 3,160 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 3141

    Effect of Household Income on Household Welfare in Kitumba Sub-County Kabale District. by Kakuru, Richard

    Published 2024
    “…The objectives of the study were; to find out the effect of household income on the level of education in Kitumba sub-county Kabale District, to investigate the effect of household income on health accessibility in Kitumba sub-county Kabale District and to establish the effect of household income on food security in Kitumba sub-county Kabale District. A cross-sectional study design was used and data was collected using interviews and questionnaires. …”
    Get full text
    Thesis
  2. 3142

    The global energy challenge: second-generation feedstocks on marginal lands for a sustainable biofuel production by Claudio Russo, Valerio Cirillo, Nausicaa Pollaro, Fabio Terribile, Andrea Chiodini, Albino Maggio

    Published 2025-01-01
    “…Biofuels represent a renewable source of energy, but their production has raised concerns regarding their possible impacts on food security. Indeed, the current biofuel production primarily relies on food crops and arable lands. …”
    Get full text
    Article
  3. 3143

    Design a Robust DDoS Attack Detection and Mitigation Scheme in SDN-Edge-IoT by Leveraging Machine Learning by Habtamu Molla Belachew, Mulatu Yirga Beyene, Abinet Bizuayehu Desta, Behaylu Tadele Alemu, Salahadin Seid Musa, Alemu Jorgi Muhammed

    Published 2025-01-01
    “…However, the complexity of IoT networks, with their resource-constrained devices, presents substantial security challenges, particularly Distributed Denial of Service (DDoS) attacks. …”
    Get full text
    Article
  4. 3144

    Marketing analysis of the technological equipment market for the Russian logging industry by Yu. V. Astashova, I. Yu. Okolnishnikova, O. N. Gatilova

    Published 2021-08-01
    “…The directions of further development of forest engineering and the entire forest complex of Russia based on import substitution and ensuring the economic and technological security of Russia are substantiated.…”
    Get full text
    Article
  5. 3145

    HYGIENIC EVALUATION OF ENVIRONMENTAL INFLUENCE ON THE HEALTH OF CHILDREN FROM RURAL REGIONS OF SOUTHERN UKRAINE by V.V. Babienko, V.L. Mykhailenko

    Published 2017-03-01
    “…The program of preventive measures in areas with low environmental security should include correction of food, providing drinking water quality and regulatory measures on hygienic education of the children’s population.…”
    Get full text
    Article
  6. 3146

    FACTORS INFLUENCING ENTREPRENEURIAL INTENTIONS OF STUDENTS SPECIALIZING IN THE TOURISM INDUSTRY by Francisco Dias, Antonina N. Tret'yakova, Tamer Atef, Joanna Kosmaczewska, Regina Navickiene

    Published 2016-12-01
    “…On the tendency to create new business positively affect entrepreneurial values of significant groups, the belief in the ability to provide their personal (psychological) and social security, as well as entrepreneurship education.…”
    Get full text
    Article
  7. 3147

    The Performance of LBP and NSVC Combination Applied to Face Classification by Mohammed Ngadi, Aouatif Amine, Bouchra Nassih, Hanaa Hachimi, Adnane El-Attar

    Published 2016-01-01
    “…The growing demand in the field of security led to the development of interesting approaches in face classification. …”
    Get full text
    Article
  8. 3148

    Decision-Making under Pillars Two and Three by Petr Jeřábek

    Published 2009-12-01
    “…The second pillar is connected with Common Foreign and Security Policy, while the third pillar contributes with Justice and Home Affairs. …”
    Get full text
    Article
  9. 3149

    THE EVOLVING DYNAMICS OF NATIONAL SOVEREIGNTY AND POLITICS IN THE ERA OF GLOBALIZATION IN NIGERIA by Toye Manuwa

    Published 2022-05-01
    “…The paper analyzes the challenges and opportunities that globalization poses for Nigeria's sovereignty, democracy, security, and regional integration. It also explores the strategies and policies that the Nigerian government and civil society have adopted to cope with the effects of globalization and to enhance their participation in the global arena. …”
    Get full text
    Article
  10. 3150

    International cooperation in the sphere of peaceful uses of nuclear energy as a resolution of energy supply and nuclear proliferation problems by M. V. Zharkih

    Published 2009-12-01
    “…The goal of such an analysis is to figure out which one has a greater potential for international security and future development of the nuclear energy sector.…”
    Get full text
    Article
  11. 3151

    Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication by Jung-oh Park, Sanggeun Kim

    Published 2015-01-01
    “…In this paper, steganography is utilized to confirm the Data Masquerading and Data Modification and, in addition, to strengthen the security; the user information is protected based on PKI (public key infrastructure), SN (serial number), and R value (random number) attributed at the time of login and the user authentication protocol to block nonauthorized access of malicious user in network CCTV environment was proposed. …”
    Get full text
    Article
  12. 3152

    Combating Cybercrime and Cyberterrorism in Indonesia by Cynthia Shafira Hartati, Ali Muhammad

    Published 2023-02-01
    “…Cybercrime poses a serious risk to national security in Indonesia. The pervasive nature of cybercrime calls into question the efficacy of current regulatory measures. …”
    Get full text
    Article
  13. 3153

    Application of Fractional Wave Packet Transform for Robust Watermarking of Mammograms by Pushpa Mala Siddaraju, Devappa Jayadevappa, Kaliyamoorthy Ezhilarasan

    Published 2015-01-01
    “…Watermarking plays an important role in protecting, sharing, and securing medical data. In this work, a robust nonblind medical image watermarking scheme is proposed. …”
    Get full text
    Article
  14. 3154

    Financial aspects of Public-Private Partnership by Livijo Sajko

    Published 2008-03-01
    “…The growth of public requests is evident in the case of Croatia, but also present in every European country, with the government’s lack of ability to secure sufficient financial income. The look for additional sources of  financing, in order to build public infrastructure, is directed therefore more and more to the private financing capital and to public-private partnerships. …”
    Get full text
    Article
  15. 3155

    Food Insecurity and Obesity by Rachel Savelle, LaToya J. O'Neal

    Published 2017-05-01
    “…It is important that the coexistence of food insecurity and obesity is well understood so that community outreach programs and interventions can continue to be implemented in order to improve food security by increasing access to affordable, healthy foods and promoting good health nationwide. …”
    Get full text
    Article
  16. 3156

    Influencing Factors Analysis on Land-Lost Farmers’ Happiness Based on the Rough DEMATEL Method by Lixia Liu, Tingting Wang, Lei Xie, Xueli Zhan

    Published 2020-01-01
    “…The government can improve the social environment policies, such as land acquisition, social security, and employment to influence other factors and improve the level of happiness of land-losing farmers. …”
    Get full text
    Article
  17. 3157

    Constructing Digitized Chaotic Time Series with a Guaranteed Enhanced Period by Chuanfu Wang, Qun Ding

    Published 2019-01-01
    “…Furthermore, experimental implementation shows that the digitized chaotic time series has great complexity, approximate entropy, and randomness, and the perturbed digitized logistic map can be used as a secure pseudorandom sequence generator for information encryption.…”
    Get full text
    Article
  18. 3158

    Design of knowledge transaction protection mechanism in the open innovation community based on blockchain technology by Dongshan Yang, Ling Zhao, Feng Leng, Zujun Shi

    Published 2025-03-01
    “…This paper proposes an approach that combines blockchain technology and an OIC, as blockchain technology provides a direction for solving trust and security problems in community platform transactions. …”
    Get full text
    Article
  19. 3159

    INFORMATION-ANALYTICAL SYSTEM OF MONITORING OF THE SHADOW OF NON-CASH FLOW: BASIC ELEMENTS, AUTHOR’S SIMULATION ALGORITHM by E. Baturina

    Published 2019-09-01
    “…The sequence of actions of users of the developed monitoring system has been revealed, which allows to calculate the minimum value of the shadow cashless cash flow, as well as quantitatively and qualitatively characterize the shadow economy, which is prospective in solving the problems of economic security of Russia.…”
    Get full text
    Article
  20. 3160

    Ballot initiatives and the national debate on immigration by Mario Menéndez

    Published 2012-01-01
    “…As of 1996 new laws related to immigration and access to welfare benefits followed the main guidelines of Proposition 187; since the 9-11 attacks national security has become the main axis of immigration laws. …”
    Get full text
    Article