Showing 3,201 - 3,220 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 3201

    Cooperation in border areas among some Southeast Asian mainland countries: a case study of the Cambodia-Laos-Vietnam Development Triangle by Nguyen Dinh Co, Le Ba Vuong, Tong Thi Tan, Nguyen Tuan Binh

    Published 2025-12-01
    “…Border cooperation in mainland Southeast Asia has received attention from the countries of Myanmar, Thailand, Cambodia, Laos and Vietnam to both strengthen cooperation to promote the economy and improve people’s lives in the region border, ensuring national security and preventing crime. Typical of the border cooperation mechanism of mainland Southeast Asia is the Cambodia-Laos-Vietnam Development Triangle (CLVDT) which established in 1999.…”
    Get full text
    Article
  2. 3202

    Floridians’ Perceptions of GMOs: GMOs and Florida Citrus by Nicole M. W. Dodds, Laura M. Gorham, Joy N. Rumble

    Published 2014-10-01
    “… Worldwide and in Florida, food-related issues such as food safety, food security, and use of new food technologies continue to be top concerns. …”
    Get full text
    Article
  3. 3203
  4. 3204

    Chaotic Puma Optimizer Algorithm for controlling wheeled mobile robots by Mohamed Kmich, Nawal El Ghouate, Ahmed Bencharqui, Hicham Karmouni, Mhamed Sayyouri, S.S. Askar, Mohamed Abouhawwash

    Published 2025-03-01
    “…The control of wheeled mobile robots plays a crucial role in many fields, including automation, logistics, security, and even space exploration. This paper presents a significant improvement in the control of wheeled mobile robots based on an enhanced version of the Puma optimization algorithm by integrating chaotic maps in both optimization phases, exploration and exploitation. …”
    Get full text
    Article
  5. 3205

    A Survey of Artificial Immune System Based Intrusion Detection by Hua Yang, Tao Li, Xinlei Hu, Feng Wang, Yang Zou

    Published 2014-01-01
    “…In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. …”
    Get full text
    Article
  6. 3206

    Československá vojenská mise v Kanadě: Činnost a výsledky by Tomáš Jiránek

    Published 2012-01-01
    “… The Czechoslovak military mission in Canada (1941–1943) aimed to secure the enlistment of local Czechs to Czechoslovak units in Great Britain. …”
    Get full text
    Article
  7. 3207

    Legal Trust and Social Development: Chosen Aspects of the Relationship by Duszka-Jakimko Hanna Beata

    Published 2024-10-01
    “…Taken together, the fulfilment of these requirements determines the stability of the state of law, the predictability of its application, legality, durability, and, consequently, the ontological security of individuals and social development.…”
    Get full text
    Article
  8. 3208

    Cuban economically active population: a new battle? by Olga Lourdes Vila Pérez

    Published 2009-03-01
    “…This category includes persons with appropriate working capacity between 17 years and the retirement age, which is stated in the act No. 24 of Cuban Social Security. Since we support the idea of increasing production and productivity of goods worldwide, and we hold up any initiative to enhance human satisfaction or happiness, it is unprofitable for us not to be able to have millions of persons on condition that they spend their physical and mental capacity in the creation of our wealth. …”
    Get full text
    Article
  9. 3209

    SOLUTIONS FOR AUTO-TESTING AND AUTO-WARNING WEBSITE ERRORS BASED ON THE RESULTS OF THE WEBSITE ERROR SCANNING TOOLS by Phạm Duy Lộc, Phan Thị Thanh Nga

    Published 2016-06-01
    “…Nowadays, there are commercial and free tools to automatically test websites’ security which is considered to be the positive point for pen-tester. …”
    Get full text
    Article
  10. 3210

    A Monitoring Approach Based on Fuzzy Stochastic P-Timed Petri Nets of a Railway Transport Network by Anis M’hala

    Published 2021-01-01
    “…The main goal of the proposed supervision approach is to allow an early detection of traffic disturbance to avoid catastrophic scenarios and preserve stability and security of the studied railway networks. Finally, to demonstrate the effectiveness and accuracy of the approach, an application to the case study of the Tunisian railway network is outlined.…”
    Get full text
    Article
  11. 3211

    The Milk Income Loss Contract Program for Dairy Producers by Albert de Vries

    Published 2005-02-01
    “…The program is authorized by the 2002 Farm Security and Rural Investment Act and has no set funding level. …”
    Get full text
    Article
  12. 3212

    MORAL-ETHICAL ASPECTS OF THE DIGITAL ECONOMY by A. A. Sychev, E. V. Zaytseva, P. S. Tolkachev

    Published 2020-03-01
    “…It is obvious, that the creation of the Russian information system will be able to increase the efficiency of our national economy (including the objectives of its state regulation) and at the same time raise the level of the country’s security. However, the effective use of the digital economy does not only depend on the level of development of the technical base of the information system. …”
    Get full text
    Article
  13. 3213

    Evaluation of the fulfillment grade and clinical management of the treatment with immunotherapy in allergic patients. by Marisela L. Pérez Pacaréu, Andrea Ortega Cabrera, Ania Sabina Díaz, Rafael Zamora Puerta

    Published 2006-08-01
    “…Authorized personnel checked out the level of fulfilment of the security rules, clinical betterment was evaluated with a daily control of symptoms correlated with clinical history of allergy, and satisfaction was evaluated through a questionaire.…”
    Get full text
    Article
  14. 3214

    Market Structure and Competition During Economic Transformation by David Benček, Hannah Rosenbaum, John P. Weche

    Published 2022-11-01
    “…The re-nationalization of production processes contributes to greater security of supply, but sometimes at the price of higher production costs. …”
    Get full text
    Article
  15. 3215

    IMPROVEMENT OF CUCKOO ALGORITHM FOR ASSOCIATION RULE HIDING PROBLEM by Đoàn Minh Khuê, Lê Hoài Bắc

    Published 2018-07-01
    “…Nowadays, the problem of data security in the process of data mining receives more attention. …”
    Get full text
    Article
  16. 3216

    Pupils’ approach to teachers’ role as motivating factor in foreign language classes by Virginija Jurate Pukeviciute, Migle Antaneliene

    Published 2017-02-01
    “…Moreover, it turned out that the schoolchildren feel less secure talking of interaction with teachers: they usually turn to the teachers only for subject matters; they do not always feel free in the classroom. …”
    Get full text
    Article
  17. 3217

    Az európai kormányzás új lehetősége - az Európai Területi Együttműködés jogi keretei az új európai kohéziós politikában (New Opportunity of the European Governance – The Legal Fram... by Zsuzsanna Fejes

    Published 2014-09-01
    “…The study summarizes the advantages of EGTC, how to response a new alternative to increase the efficiency, legitimacy and transparency of the activities of territorial cooperation, and at the same time secures legal certainty. The revised EGTC Regulation (1302/2013/EU) contains the most important pieces of legislation related to the cohesion policy and most of the programmes funded by the EU in the period 2014-2020.…”
    Get full text
    Article
  18. 3218

    Mental health in the hadith spotlight: enlightenment for a healthy soul by Yuliharti Yuliharti, Agustiar Agustiar, M. Ridwan Hasbi, Syafi'ah Syafi'ah, Usman Usman, M. Fahli Zatrahadi

    Published 2024-09-01
    “…The research results show that mental health in the hadith includes principles such as feelings of security, independence, responsibility, and physical and spiritual balance. …”
    Get full text
    Article
  19. 3219

    The Milk Income Loss Contract Program for Dairy Producers by Albert de Vries

    Published 2005-02-01
    “…The program is authorized by the 2002 Farm Security and Rural Investment Act and has no set funding level. …”
    Get full text
    Article
  20. 3220

    Extended Perturbed Mixed Variational-Like Inequalities for Fuzzy Mappings by Muhammad Bilal Khan, Muhammad Aslam Noor, Khalida Inayat Noor, Ahmad Termimi Ab Ghani, Lazim Abdullah

    Published 2021-01-01
    “…In the end, some new and previously known existence results and algorithms are also studied. Results secured in this paper can be regarded as purification and development of previously familiar results.…”
    Get full text
    Article