Showing 4,041 - 4,060 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 4041

    Determinants of digital bank transformation: a systematic literature review with prisma and bibliometrics by Wahyu Avianto, Hermanto Siregar, Anny Ratnawati, Mulya E Siregar

    Published 2024-11-01
    “…The determinants in the digital bank transformation process include the level of digitalization, application user growth, IT investment, IT committee, cyber security, and ecosystem stocks. The results of this literature review will be a reference for further research related to digital banks, in line with the rapid digital transformation process in banking.…”
    Get full text
    Article
  2. 4042
  3. 4043

    Analysis of Climate Change from the Aliguodarz Region Farmers’ Viewpoint with an Emphasis on the Central District by Mohammad Tavakoli, Bohlol Alijani, Reza Borna, Hosain Mohammadi

    Published 2013-11-01
    “…Therefore, it is necessary to predict or simulate this effect using various available tools in the field of management, to ensure consumer food security and the maximum welfare of producers, with the necessary planning and policy making. …”
    Get full text
    Article
  4. 4044

    COLLATERAL DETERMINATS IN BANK RISK MANANAGEMENT: THE REGIONAL CASE by A. M. Karminsky, O. D. Khon

    Published 2018-05-01
    “…This study is based on linear regression models evaluated by the least square method. Private data of secured small and medium business loans is used.  …”
    Get full text
    Article
  5. 4045

    Amerika Birleşik Devletleri’nin NSC-68 Çerçevesinde Uyguladığı Soğuk Savaş Stratejisi ve Türkiye’ye Yansımaları by Serpil GÜDÜL

    Published 2021-12-01
    “…In order to fight with this threat, the report number 68 (NSC-68) was prepared and implemented by the American National Security Council in 1950. In this study, in addition to the analysis of the NSC-68 which was one of the most significiant documents of the Cold War, its Cold War strategy implemented against the USSR and its relations with Turkey are examined accordingly. …”
    Get full text
    Article
  6. 4046
  7. 4047
  8. 4048

    Analysis of the Mechanism of Political Cost in the Complex Environmental Governance System by Xintao Li, Tongshun Cheng, Zaisheng Zhang, Li Zhao

    Published 2022-01-01
    “…The emergence of conflicts between environmental safety incidents and protection rights generates sizeable political costs, which endangers the legitimacy of the government as well as political security and stability. This article further examines the role of political costs in environmental issues. …”
    Get full text
    Article
  9. 4049
  10. 4050

    Armenia: an Uneasy Choice Between Russia's New Initiatives and the EU Eastern Partnership by M. Y. Vardazaryan

    Published 2014-02-01
    “…Deepened strategic cooperation with Moscow, first of all, provides military and energy security of Armenia, although the economic factor shouldn't be underestimated. …”
    Get full text
    Article
  11. 4051
  12. 4052

    VALUE CHAIN IN AGRICULTURE: THE CASE OF THE EUROPEAN UNION by Sanja Franc, Vlatka Bilas, Lana Trifunić

    Published 2021-05-01
    “…Through a deduction method, certain conclusions were made about the state of the EU food system as well as demand and supply trends in order to provide a broader understanding of the food security and the significance of agricultural sector in general. …”
    Get full text
    Article
  13. 4053

    Russian Language in the Central Asia Region by K. P. Borishpolets

    Published 2014-04-01
    “…Its positions as an active communication channel is secured not only by the social tradition, but also by the competitiveness of the Russian language education, advantages of the bilingual business, requirements of the labor migrants, HR interests and by some other pragmatic thoughts, which role within the context of Eurasian economic integration will increase. …”
    Get full text
    Article
  14. 4054
  15. 4055

    SECHA: A Smart Energy-Efficient and Cost-Effective Home Automation System for Developing Countries by Abdulhafiz Ahmed Mustofa, Yohannes Alemayehu Dagnew, Prabhakar Gantela, M. Javed Idrisi

    Published 2023-01-01
    “…They simplify our lives, reduce workloads, improve home safety and security, and pave the way for newer developments. …”
    Get full text
    Article
  16. 4056
  17. 4057

    Sizing and Simulation of PV-Wind Hybrid Power System by Mustafa Engin

    Published 2013-01-01
    “…The output of the program will display the performance of the system during the year, the total cost of the system, and the best size for the PV-generator, wind generator, and battery capacity. Security lightning application is selected, whereas system performance data and environmental operating conditions are measured and stored. …”
    Get full text
    Article
  18. 4058

    Detection of Data Integrity Attack Using Model and Data-Driven-Based Approach in CPPS by G. Y. Sree Varshini, S. Latha

    Published 2023-01-01
    “…Protecting sensitive data from data integrity attacks (DIA) is essential for ensuring system security and reliability. A tragic event will occur if the attack goes unreported. …”
    Get full text
    Article
  19. 4059

    THE IMPOVERISHED AND THEIR ENTITLEMENT TO ADEQUATE HOUSING: A SYNTHETIC ANALYSIS by DAVID KUMIJE, ABUBAKAR ZUBAIRU AGUYE

    Published 2023-12-01
    “…This paper aims to explore the relationship between poverty and the challenge the poor face to secure adequate shelter in Nigeria. Shelter is a crucial key among the basic necessities of life, and it is one of the fundamental rights recognized by many constitutions worldwide. …”
    Get full text
    Article
  20. 4060

    Deep Learning Based DDoS Attack Detection by Xu Ziyi

    Published 2025-01-01
    “…Nowadays, one of the biggest risks to network security is Distributed Denial of Service (DDoS) assaults, which cause disruptions to services by flooding systems with malicious traffic. …”
    Get full text
    Article