Showing 3,381 - 3,400 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 3381

    DIGITAL TOOLS FOR MATCHING QUALIFICATIONS TO THE LEVELS OF THE NATIONAL QUALIFICATIONS FRAMEWORK by Volodymyr Kovtunets, Sergiy Londar, Serhii Melnyk, Oles Kovtunets

    Published 2024-04-01
    “…For the most general case of four NQF descriptors, Microsoft Excel macro is developed to secure achieving any level of accuracy. Corresponding API is developed by PHP programming language. …”
    Get full text
    Article
  2. 3382

    Availibilty Pada Aplikasi mobile Banking: Case Study Bank XYZ by Malvin Edward Makahanap

    Published 2024-02-01
    “…Unavailability selama periode penelitian terjadi karena aktivitas product development, aktivitas terkait security, production issue, hardware issue dan 3rd party maintenance. …”
    Get full text
    Article
  3. 3383

    Theoretical Aspects of Professional Competence of Police Officers from the Tactical and Operative Response Unit by Ye. S. Romanenko

    Published 2021-07-01
    “…That’s why on purpose of providing civil security and law-and-order guard of the public events in 2017 the new unit of patrol police of tactical-operational respond TOR was organized. …”
    Get full text
    Article
  4. 3384

    Evaluation of vegetable pigeonpea [Cajanus cajan (L.) Millsp] genotypes for yield stability by J. D. Ojwang, R. Nyankanga, N. V. P. R. G. Ganga Rao, J. Imungi

    Published 2021-10-01
    “…Abstract Background Vegetable pigeonpea is an important food security crop in the marginal dry areas of the Eastern region of Kenya. …”
    Get full text
    Article
  5. 3385

    Pengamanan Citra Digital Menggunakan Kriptografi DnaDan Modified LSB by Sabrina Adela Br Sibarani, Andreas Munthe, Ronsen Purba, Ali Akbar Lubis

    Published 2024-12-01
    “…The results indicate that the combination of DNA Cryptography, ACM, LM, and MLSB provides high security and is difficult to breach. …”
    Get full text
    Article
  6. 3386

    Records Keeping and Financial Performance in Local Government: A Case Study of Rubanda District Local Government. by Birungi, Edinah

    Published 2024
    “…Other challenges stated were lack of records retention and disposition schedule/ policy. improper security for records, lack of filing manual/finding aids and inadequate storage equipment and solutions to the challenges faced in record keeping at RDLG were, provision of retention and disposition schedule, Lack of Records management policy, Improving security for records, Employing professionally trained record Managers, provision of Filing Manual/Finding Aids and Involvement of manual operations, Training record users on modern record management practices and Installing back up facilities for ICT. …”
    Get full text
    Thesis
  7. 3387

    Records Keeping and Financial Performance in Local Government: A Case Study of Rubanda District Local Government. by Birungi, Edinah

    Published 2024
    “…Other challenges stated were lack of records retention and disposition schedule/ policy. improper security for records. lack of filing manual/finding aids and inadequate storage equipment and solutions to the challenges faced in record-keeping at RDLG were the provision of retention and disposition schedule, Lack of Records management policy, Improving security for records, Employing professionally trained record Managers, provision of Filing Manual/Finding Aids and Involvement of manual operations, Training record users on modern record management practices and Installing back up facilities for ICT. …”
    Get full text
    Thesis
  8. 3388

    Factors Associated with Stunting in Children Under Five Years of Age: A Case of Buhara Sub County, Kabale District. by Namanya, Oliver

    Published 2023
    “…The household financial security was seen to have influenced household food security, diversification, and supplementation. …”
    Get full text
    Thesis
  9. 3389
  10. 3390

    La “familizzazione” dell’impresa: alcune riflessioni sul familismo imprenditoriale in Brianza nella crisi economica attuale by Simone Ghezzi

    Published 2017-03-01
    “…The leader of a small family firm may decide to include or to exclude some kin members from the process of intergenerational succession in order to secure corporate earnings and good performance in the upcoming future. …”
    Get full text
    Article
  11. 3391

    Evacuation Model of Emotional Contagion Crowd Based on Cellular Automata by Qian Xiao, Jiayang Li

    Published 2021-01-01
    “…Crowd evacuation under emergency is an important task of world public security research and practice. In order to describe the microemotional contagion of evacuation individuals, a cellular automata-based evacuation model of emotional contagion crowd based on the classical SIS model of infectious diseases is proposed in this paper. …”
    Get full text
    Article
  12. 3392

    Concept development assessment game – suitable collecting framework in scientific military research by George-Ion TOROI

    Published 2025-01-01
    “… Scientific research is crucial for progress across all areas of society, including the military sphere. However, as the security environment becomes increasingly dynamic, unpredictable, and complex, research methods in military sciences must address contemporary challenges by providing flexible frameworks for evaluating and testing new concepts necessary for the adaptation of force structures. …”
    Get full text
    Article
  13. 3393

    No Easy Way In by Kalev Aasmäe

    Published 2025-01-01
    “…This, in turn, further erodes solidarity amongst squatters, prompting Keith to turn to new methods of securing accommodation. Keywords: squatting, community, neoliberalism, solidarity, criminalisation, housing …”
    Get full text
    Article
  14. 3394

    LEADERSHIP, GOOD GOVERNANCE AND DEVELOPMENT IN NIGERIA by ADENIYI ADEKUNLE

    Published 2023-12-01
    “…The paper recommended the use of electronic voting systems and the demonstration of material and human security as solutions to problems. Others include removing the immunity provision for those holding political office and reorienting the country. …”
    Get full text
    Article
  15. 3395

    A Privacy-Preserving Biometric Recognition System with Visual Cryptography by Lijing Ren, Denghui Zhang

    Published 2022-01-01
    “…Experimental results show that our proposed method keeps the high accuracy of the feature recognition system when providing security.…”
    Get full text
    Article
  16. 3396
  17. 3397
  18. 3398

    Hmotné (ne)zajištění evangelických kazatelů v první a druhé generaci by Gabriela Krejčová Zavadilová

    Published 2020-12-01
    “…The situation of the second-generation preachers is not known so well, however, usually a stable and secure position is attributed to them. Looking closer at both the generations, it is evident that in neither of them the financial state of preachers was definite and their material provision did not depend so much on the amount of service but on the broader economic and social aspects. …”
    Get full text
    Article
  19. 3399

    Making AI an ally for sustainable agriculture in the face of climate change by Lalit Gautam

    Published 2025-01-01
    “…These disruptions threaten food production, global food security, economic stability and community livelihoods. …”
    Get full text
    Article
  20. 3400

    EPPDC: An Efficient Privacy-Preserving Scheme for Data Collection in Smart Grid by Jie Chen, Junping Shi, Yueyu Zhang

    Published 2015-05-01
    “…In EPPDC scheme, the users' data information is transmitted to the local aggregator by building gateway with privacy preserving. In addition, the security analysis indicates that EPPDC scheme not only can resist replay attack, but also has source authentication and data integrity, confidentiality, unforgeability, nonrepudiation, and evolution of shared keys. …”
    Get full text
    Article