Showing 3,221 - 3,240 results of 5,943 for search '"securities"', query time: 0.07s Refine Results
  1. 3221

    Pratique des activités d’orientation-conseil et projet professionnel de l’élève au Cameroun by Rodrigue Mbwassak

    Published 2022-08-01
    “…This research poses the problem of guidance counsellors accompanying students in the co-construction of their professional projects preparing them for a secure professional integration, if we refer to the difficulties of choice of training and socio-professional integration experienced by graduates nowadays. …”
    Get full text
    Article
  2. 3222

    The National Agricultural Strike: The Paradoxes of Political Action for Social Change by Monica Arias Fernandez, Manuel Alejandro Preciado Castellanos

    Published 2016-01-01
    “…It was an event that cannot be reduced only to the actors implicated and causes but brought into focus the precarious condition of agricultural production in Colombia: the concentration of land and agricultural production, questions of local security and the model of economic development. This strike is analyzed drawing upon the thought of Gilles Deleuze and Felix Guattari, who develop a number of concepts that serve to analyze the ways in which resistance and social mobilization occupy an inherent space inside the exercise of state power. …”
    Get full text
    Article
  3. 3223

    Analysis of survival-skills among adolescents in Yogyakarta by Enik Nurkholidah, Syamsu Yusuf, Ilfiandra Ilfiandra, Ahman Ahman

    Published 2022-07-01
    “…The conclusion of this study is an affirmation of the findings of the findings as well as answers to the research questions that adolescents in Yogyakarta are generally in the potential of Survival-Safety Skills in the Medium category, meaning that conditions are sufficient to survive safely and obtain a sense of security for adolescents in living a life more prosperous. …”
    Get full text
    Article
  4. 3224

    Driver identification in advanced transportation systems using osprey and salp swarm optimized random forest model by Akshat Gaurav, Brij B. Gupta, Razaz Waheeb Attar, Ahmed Alhomoud, Varsha Arya, Kwok Tai Chui

    Published 2025-01-01
    “…Abstract Enhancement of security, personalization, and safety in advanced transportation systems depends on driver identification. …”
    Get full text
    Article
  5. 3225

    Implementing Youth Mental Health First Aid Training in Cooperative Extension Programs by Anne M. Iaccopucci, Monica M. Lobenstein, Kendra M. Lewis, Kea Norrell-Aitch

    Published 2024-12-01
    “…Experienced program leaders suggest partnering with a supportive organization, securing long-term funding, and establishing dedicated staff for program delivery.…”
    Get full text
    Article
  6. 3226

    Receivables from employment through judicial practice by Mitrović Igor

    Published 2020-01-01
    “…The paper deals with the issue of legal regulation of judicial protection of labor rights and the application of substantive law in proceedings of this kind before the courts in the Republic of Serbia. Given that legal security is one of the essential attributes of the rule of law in the legal order of a state, proper application of substantive law by acting courts of general and special jurisdiction is of crucial importance in this regard. …”
    Get full text
    Article
  7. 3227

    An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users by Keita Emura, Atsuko Miyaji, Kazumasa Omote

    Published 2014-01-01
    “…To handle this property, we newly define the security notion called anonymity with respect to the revocation which guarantees the unlinkability of revoked users.…”
    Get full text
    Article
  8. 3228

    Stratégies de partage et diffusion de données publiques environnementales by Sandra Nicolle, Maya Leroy

    Published 2013-09-01
    “…On the contrary, in French Guiana, there is a reduction of information distribution concerning gold mining impacts, linked to an increased involvement of national security state services in the monitoring process.…”
    Get full text
    Article
  9. 3229

    Slovenian Complementary Health Insurance as a Service of General Economic Interest by Bruno Nikolić

    Published 2015-03-01
    “… Slovenian legislation defines complementary health insurance as an activity of the public interest, which represents an inseparable and essential element of healthcare system and as such pursues objectives identical to those of compulsory health insurance – financial security of population against high healthcare expenses and appropriate and fair access to efficient and quality healthcare. …”
    Get full text
    Article
  10. 3230

    Optimal cash holding model based on minimization of ruin probability by Zhengyan Wang, Yan Zhang, Peibiao Zhao

    Published 2024-01-01
    “…It is assumed that the objective of optimal cash holding is to minimize the probability of bankruptcy and the security area of cash holding is the constraint condition. …”
    Get full text
    Article
  11. 3231

    « Qu’avez-vous fait de vos vingt ans ? » Militantismes marocains du 23-mars (1965) au 20 février (2011) by Frédéric Vairel

    Published 2012-10-01
    “…The institutionalization of the Moroccan protest space from which the February 20 movement emerged, and the effects of learning for protesters and security forces alike were the reason for extremely cautions behaviors in an effort to avoid escalation. …”
    Get full text
    Article
  12. 3232

    Homomorphic Signature With Designated Evaluator by Kazuma Shiraishi, Keisuke Hara, Toi Tomita, Kyosuke Yamashita, Junji Shikata

    Published 2025-01-01
    “…Additionally, we achieve a post-quantum variant of this homomorphic signature scheme with a designated evaluator, provided that the underlying building blocks are post-quantum secure. This represents the first post-quantum realization of such a scheme.…”
    Get full text
    Article
  13. 3233

    ACCOUNTING TREATMENT AND LEGISLATION OF LEASING ARRANGEMENTS by Selma Novalija, Hamid Mutapčić, Elmira Kovač

    Published 2011-11-01
    “… Companies are not always able to purchase fixed assets required to start, expand or modernize their own operations, and also do not have adequate resources that could offer as security for bank loans. Leasing is the answer to such problems, as it provides the possibility of leasing recipient to obtain the necessary equipment. …”
    Get full text
    Article
  14. 3234

    Analysis of the state of the gas market in the context of the aggravation of the Ukrainian crisis by E. A. Rechkina, A. M. Terekhov

    Published 2023-05-01
    “…The main requirement for the model is its stability to the dynamics of macroeconomic indicators, exchange rates, as well as financial instruments that affect energy and environmental security in the world. Special attention is paid to the study of approaches to assessing the indicators of the gas market.…”
    Get full text
    Article
  15. 3235

    Mathematical Modelling and Optimal Control Strategies of a Multistrain COVID-19 Spread by Bouchaib Khajji, Lahoucine Boujallal, Omar Balatif, Mostafa Rachik

    Published 2022-01-01
    “…Secondly, three controls are considered in our model to minimize the multistrain spread of the disease, namely, vaccination, security campaigns, social distancing measures, and diagnosis. …”
    Get full text
    Article
  16. 3236

    The algorithm of interaction of the enterprises of fuel and energy complex in implementation with the use of alternative means of payment by O V. Baikova, D. A. Kulakov

    Published 2019-04-01
    “…The possibilities of activation and development of resource trade as one of the main factors of increasing the security of the fuel and energy complex and the Russian economy as a whole have been discovered.…”
    Get full text
    Article
  17. 3237

    Cross-chain medical data sharing scheme based on elliptic curve signcryption by YU Huifang, LI Lei

    Published 2024-12-01
    “…To address the requester identity authentication and shared data security in cross-chain medical data sharing, a cross- chain medical data sharing scheme based on elliptic curve signcryption was devised in this article. …”
    Get full text
    Article
  18. 3238

    Mutual Authentication Scheme Based on Lattice for NFC-PCM Payment Service Environment by Sung-Wook Park, Im-Yeong Lee

    Published 2016-07-01
    “…In addition, related groups from the Republic of Korea have enhanced safety in communication by using standard techniques for activating NFC services. However, various security threats are still present in electronic payment methods that use NFC. …”
    Get full text
    Article
  19. 3239

    Managing the industrial enterprises development in ecosystem interaction by O. E. Astafyeva

    Published 2022-01-01
    “…The benefits and limitations of sustainable development management, and the specific of data analysis in the digital ecosystem of the industrial enterprise as a component of sustainability and security of actors, have been defined. The components of a sustainable development framework have been identified and the effects obtained at the ecosystem level of interaction have been highlighted. …”
    Get full text
    Article
  20. 3240

    SCondi: A Smart Context Distribution Framework Based on a Messaging Service for the Internet of Things by Jongmoon Park, Myung-Joon Lee

    Published 2014-01-01
    “…The context channel provides a pluggable filter mechanism that supports effective extraction, tailoring, authentication, and security of information.…”
    Get full text
    Article