Showing 3,781 - 3,800 results of 5,943 for search '"securities"', query time: 0.09s Refine Results
  1. 3781

    Online Auction System for Guma Stocks by Tusingwire, Roseline, Ayebare, Nice

    Published 2025
    “…The system's objectives include streamlining the online trading process, fostering a sense of community engagement, and providing a user-friendly platform for secure transactions. It incorporates features such as user authentication, product listings, real-time bidding. …”
    Get full text
    Thesis
  2. 3782

    Spatiotemporal Assessment and Modelling of Roof-Harvested Rainwater Quality in Kigezi Highlands, Uganda by Philip, Tibenderana, Moses, Nduhira Twesigye-omwe, Agwe, Tobby Michael, Abdulkadir, Taofeeq S, Denis, Byamukama

    Published 2023
    “…The challenge of achieving water security in Africa is contingent upon the hydrological variability and its extremes (UN-Water, 2010). …”
    Get full text
    Other
  3. 3783

    A torch against the night : a novel / by Tahir, Sabaa

    Published 2016
    View in OPAC
    Book
  4. 3784
  5. 3785

    La relation économique et commerciale sino-marocaine : De la coopération au partenariat stratégique by Rachid Rhattat

    Published 2013-10-01
    “…Since the 1990s, Morocco has made the opening of its economy a strategic focus of its trade policy. Securely fastened to the European Union, by far its largest trading partner, the Kingdom of Morocco has stepped up trade agreements, especially with emerging powers. …”
    Get full text
    Article
  6. 3786

    The long-term and short-term effects of interest rate volatility on corporate bankruptcy risk: An industry and supply chain perspective. by Lingfei Chen, Kai Zhang, Xueying Yang

    Published 2025-01-01
    “…This mismatch of short-term debt and long-term investments undermines the sustainability of the supply chain, ultimately reducing financial security-sacrificing safety for profitability. In the long term, higher interest rates exacerbate the overcapacity problem in industries, increasing the unsustainability of the production and sales balance. …”
    Get full text
    Article
  7. 3787

    Influential Nodes in the OBOR Fossil Energy Trade Network Based on D-S Theory: Detection and Evolution Analysis by Cuixia Gao, Simin Tao, Kehu Li, Yuyang He

    Published 2022-01-01
    “…Therefore, the above aspects should be considered when ensuring national trade security. At last, the rationality and comprehensiveness of EVC are verified by comparing with some benchmark centralities.…”
    Get full text
    Article
  8. 3788

    Enhance the Probability of Detection of Cooperative Spectrum Sensing in Cognitive Radio Networks Using Blockchain Technology by D. Balakumar, Nandakumar Sendrayan

    Published 2023-01-01
    “…The sharp rise in mobile data traffic causes congestion in the licensed band for the transmission of signals. Handling this security issue in real time, on top of spectrum sharing, is a challenge in such networks. …”
    Get full text
    Article
  9. 3789

    Application of machine learning tools and immersive technologies in management by A. V. Sosnilo

    Published 2022-04-01
    “…It has been concluded that most of the technologies described in the study are able to significantly improve the organisation’s efficiency, identify hidden relationships, more productively manage employees in the field of hiring, selection, personnel training, motivation and development of talents, improving corporate culture, to ensure the organisation’s security, etc. It has been also noted that the application of individual technologies can be used for pressure on employees, invasion of privacy, administrative pressure due to a political position, personal medical information, etc. and requires a balanced policy with the involvement of all interested parties.…”
    Get full text
    Article
  10. 3790

    Al di qua e al di là del muro: movimenti sociali in Israele e Palestina by Sabina Leoncini

    Published 2016-05-01
    “… In 2007, I conducted research in the area of Bethlehem(OPT) to understand the changes caused by the construction of the security barrier on the daily life of this community. …”
    Get full text
    Article
  11. 3791

    Demand and consumption patterns of banana in Tanzania by William George

    Published 2025-02-01
    “…It offers policy recommendations to strengthen the banana value chain and improve food security in Tanzania.…”
    Get full text
    Article
  12. 3792
  13. 3793
  14. 3794

    The Important Step for European Integration: “Council of Europe” and the Matter of Turkey’s Membership to Council by Ali Servet Öncü

    Published 2013-12-01
    “…This organization which stipulates cooperation in such areas human rights, social affairs, education, culture, sports, youth, public health, environmental, architectural heritage, urban planning, local and regional authorities, and law as well as defence and security was founded on 5 May 1949 by ten European states. …”
    Get full text
    Article
  15. 3795

    Opportunity to change the future or “institutional trap” by E. V. Rozhkov

    Published 2022-09-01
    “…Such a rapid integration of digital technologies may indicate, on the one hand, the desire to develop the economy and society, and on the other hand, the need to control each person, while speaking about the security of the state and its values.…”
    Get full text
    Article
  16. 3796

    Assisting Laboratory Management Based on Network Big Data Mining Technology by Yonghua Xu

    Published 2022-01-01
    “…In today’s big data context, the composition of virtual networks is becoming increasingly complex, so it is neither easy nor difficult to strengthen the control of network security issues. This paper studies the important content of network big data mining-assisted laboratory management. …”
    Get full text
    Article
  17. 3797
  18. 3798

    ECONOMIC AND INSTITUTIONAL DETERMINANTS OF INTERNATIONAL TOURISM DEMAND IN THE ECOWAS REGION by Sodiq Olaiwola Jimoh, Nusirat Ojuolape Gold

    Published 2023-11-01
    “…The study recommends government, authorities in charge of crime prevention (security agencies) and other key players (both private and public) to team up and map out plans to tackle terrorism and insecurity in the West African region; the region should consider adopting single currency to stabilize prices; and ensure effective communication is maintained so that tourists are adequately informed about dangerous zones. …”
    Get full text
    Article
  19. 3799

    Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding by Jen-Yeu Chen, Yi-Ying Tseng

    Published 2012-12-01
    “…Recent research efforts have shown that NC can be combined with classical error control codes and cryptography for secure communications or misbehavior detections. Nevertheless, when it comes to Byzantine attacks, these results have limited effects. …”
    Get full text
    Article
  20. 3800

    Collaborative Governance of Rural Relative Poverty under Blockchain and Back Propagation Neural Network by Xin-Jie Tian, Zhi-Jun Ge

    Published 2022-01-01
    “…Therefore, the constructed poverty data visualization governance model can achieve good data transmission security performance while ensuring high classification accuracy. …”
    Get full text
    Article