Showing 3,561 - 3,580 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 3561

    Armenia Towards a "New Economy": Defense Industry by A. B. Harutyunyan

    Published 2021-04-01
    “…As a small country, Armenia needs an economy-army coalesced “intelligent” system that will respond adequately to any, even the slightest threat to the country's security. This approach requires the development of indigenous defense industry. …”
    Get full text
    Article
  2. 3562

    EMPIRICAL ANALYSIS OF THE PROFITABILITY AND INDEBTEDNESS IN LISTED COMPANIES – EVIDENCE FROM THE FEDERATION OF BIH by Dragan Gabrić

    Published 2015-11-01
    “… Research on relationship between profitability and indebtedness is an interesting scientific and professional question because it is the basic criterion of performance and security in business. The aim of this paper is to examine the and determine the level of correlation between profitability and indebtedness, and to research the differences in the level of regarding company's profitability. …”
    Get full text
    Article
  3. 3563

    Marketing strategies of economic entities (on the example of persons carrying out activities in the field of customs business) by S. V. Kurikhin

    Published 2022-11-01
    “…In addition, the results can be useful in the educational process, when teaching such disciplines as Marketing and Economic security of an enterprise participating in foreign economic activity. …”
    Get full text
    Article
  4. 3564

    Condition Recognition of High-Speed Train Bogie Based on Multi-View Kernel FCM by Qi Rao, Yan Yang, Yongquan Jiang

    Published 2019-03-01
    “…Monitoring the operating status of a High-Speed Train (HST) at any moment is necessary to ensure its security. Multi-channel vibration signals are collected by sensors installed on bogies and beneficial information are extracted to determine the running condition. …”
    Get full text
    Article
  5. 3565

    Exploring the possibilities of using cryptocurrencies in production in creative industries by A. R. Akopyan, Yu. V. Vorontsova, V. V. Krysov

    Published 2024-06-01
    “…One of the advantages of applying this type of currency is the ability to conduct fast and secure financial transactions without the involvement of intermediaries. …”
    Get full text
    Article
  6. 3566

    DEVELOPMENT OF SALARY CARDS IN THE SYSTEM OF CASHLESS PAYMENTS IN CONDITIONS OF FINANCIAL INSTABILITY ON THE EXAMPLE OF SBERBANK OF RUSSIA by K. V. Ekimova, S. S. Galasova, V. V. Manuylenko

    Published 2020-09-01
    “…As a result, the main directions for the development of salary projects have been proposed, including the definition of incentive provisions for their application, ensuring security, confidence in salary projects and contactless payment, regulating the risk of occurrence of accounts payable and accounts receivable between business entities, the need to modernize individual banking service, formation of innovative salary cards.…”
    Get full text
    Article
  7. 3567

    An Enhanced Sine Cosine Algorithm for Feature Selection in Network Intrusion Detection by zahra asgari varzaneh, soodeh hosseini

    Published 2024-12-01
    “…For computer networks to remain secure, intrusion detection is essential. Analyzing network traffic data is part of this activity to spot possible cyber threats. …”
    Get full text
    Article
  8. 3568

    Binary Image Data Hiding Using Matrix Encoding Technique in Sensors by Phan Trung Huy, Cheonshik Kim

    Published 2013-11-01
    “…It is very important to protect the copyright of digital images in wireless transmission, because people often use a smart phone in their daily life. Traditional security schemes are computationally expensive, and they introduce overhead, which shortens the life of the image sensors. …”
    Get full text
    Article
  9. 3569

    The role of agriculture in Nepal's economic development: Challenges, opportunities, and pathways for modernization by Lokendra Nath Yogi, Tara Thalal, Sarada Bhandari

    Published 2025-01-01
    “…These problems prevent agriculture from realizing its full potential to advance economic development, reduce poverty, and provide food security. Modernization requires increasing productivity through mechanization, expanding infrastructure, and improving market accessibility. …”
    Get full text
    Article
  10. 3570
  11. 3571

    Optimizing Credit Card Fraud Detection: A Genetic Algorithm Approach with Multiple Feature Selection Methods by Sunil Kumar Patel, Devina Panday

    Published 2024-12-01
    “…To protect our financial security, it is crucial to develop robust and accurate fraud detection systems that stay one step ahead of the fraudsters. …”
    Get full text
    Article
  12. 3572

    Challenges and opportunities of artificial intelligence in African health space by Muslim A. Alaran, Salim Kamaludeen Lawal, Mustapha Husseini Jiya, Salihu Alhassan Egya, Mohamed Mustaf Ahmed, Abdullateef Abdulsalam, Usman Abubakar Haruna, Muhammad Kabir Musa, Don Eliseo Lucero-Prisno

    Published 2025-01-01
    “…Ethical guidelines are needed to ensure AI decisions align with medical standards and patient autonomy. Strict privacy and security controls are crucial to protecting sensitive health data. …”
    Get full text
    Article
  13. 3573

    Identifying barriers in the field of electronic payments based on blockchain technology: A multi-criteria decision-making approach by Amir Mohammad Yektaei Rudsari, Naser Safaei, Majid Mirzaei Ghazani

    Published 2024-08-01
    “…Some of these obstacles include technical, technological, organizational, financial and security problems. To identify and prioritize these obstacles and solve them, multi-criteria decision-making methods can be useful.In this research, in order to identify and rank the factors of obstacles related to electronic payments based on blockchain technology, the Delphi method has been used. …”
    Get full text
    Article
  14. 3574

    The effect of using Naive Bayes to detect spam email by Sun Zehui

    Published 2025-01-01
    “…This high level of accuracy underscores the effectiveness of the Bayesian approach in identifying and filtering out spam, thereby enhancing the overall efficiency and security of email communication.…”
    Get full text
    Article
  15. 3575

    İnönü Muharebelerinin İç Kamuoyuna Yansımaları by İbrahim TAVUKÇU

    Published 2021-12-01
    “…In this battle, as a result of the stubborn struggle put forward by the regular army units, the Greek Army had to withdraw, the Circassian Ethem rebellion, which ached Ankara's head with this morale and motivation, was suppressed, the TBMM government strengthened its power and secured its future. The Greeks, who could not get the result they hoped for in the First Battle of İnönü, attempted a major attack for the second time in order to impose the Treaty of Sevres, which they could not have accepted at the London Conference on March 23, 1921, by force of arms, but II. …”
    Get full text
    Article
  16. 3576

    Digital Sociability: Implications of the COVID-19 Pandemic among Young Adults by Gledson Martins de Jesus, Eduardo Name Risk

    Published 2025-01-01
    “…The results suggest that young people live ambiguously with the sense of security provided by social networks while feeling anxious about the judgment of others regarding their posts.…”
    Get full text
    Article
  17. 3577

    Constitution is not identity: On equivalence relations in translation of performance and translation for performance by Sarah Maitland

    Published 2025-01-01
    “… In the race to secure the sub-rights to Amanda Gorman’s ground-breaking performance at the 2021 United States presidential inauguration, a high-profile case emerged in which the translator appointed by Dutch publisher Meulenhoff returned the commission, following criticism of the appointment. …”
    Get full text
    Article
  18. 3578

    The potential of the municipality of Trstenik for the development of the wine tourism by Stojković Jelena, Milićević Snežana

    Published 2024-01-01
    “…The results of the research are significant as they can assist tourism organization as well as municipal officials to make up a strategy for the development of wine tourism which would secure a significant position on the Serbian wine tourism map for the Trstenik wine district.…”
    Get full text
    Article
  19. 3579
  20. 3580

    The usability and technology acceptance of immersive virtual reality simulation for critical infrastructure workers by Andrzej Grabowski

    Published 2024-09-01
    “…Training is crucial for ensuring the safety, security, and efficiency of critical infrastructure systems and their employees. …”
    Get full text
    Article