Showing 4,281 - 4,300 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 4281

    Advancements in genome editing tools for genetic studies and crop improvement by Asadollah Ahmadikhah, Homa Zarabizadeh, Shahnoush Nayeri, Mohammad Sadegh Abbasi

    Published 2025-02-01
    “…The rapid increase in global population poses a significant challenge to food security, compounded by the adverse effects of climate change, which limit crop productivity through both biotic and abiotic stressors. …”
    Get full text
    Article
  2. 4282
  3. 4283
  4. 4284

    A collaborative management model as an effort for the conservation of native plants of Java’s mountains in Mount Merbabu National Park by Gunawati Dewi, Sulaksono Nurpana, Ibrahim Mohd Hairy

    Published 2025-01-01
    “…Communities participate in various activities such as protected area security, plant monitoring, nursery development, planting, and environmental education. …”
    Get full text
    Article
  5. 4285
  6. 4286
  7. 4287

    Internet marketing organization with the use of intellegent and block chain technologies by U. A. Vishniakou

    Published 2020-05-01
    “…Blockchain technology is used to control and guarantee the authorship of startups and signed contracts.As IM development trend, the development of models for joint activity of intelligent agents in the cloud environment to support decision-making using blockchain technology to legally secure the authorship of innovations is proposed. …”
    Get full text
    Article
  8. 4288

    New Generation of Smart Highway: Framework and Insights by Chenglong Liu, Yuchuan Du, Yiheng Ge, Difei Wu, Cong Zhao, Yishun Li

    Published 2021-01-01
    “…Several urgent problems in the current stage are pointed out in terms of system compatibility, standard specification, and information security. This paper provides new insights for sustainable and reproducible highway reformation, drawing some implications for NGSH design.…”
    Get full text
    Article
  9. 4289

    IF-MABAC Method for Evaluating the Intelligent Transportation System with Intuitionistic Fuzzy Information by Yanping Li

    Published 2021-01-01
    “…ITS can effectively employ the existing traffic facilities and ensure the safety of traffic, urban traffic, and public security management for effective control in order to satisfy people’s travel demand. …”
    Get full text
    Article
  10. 4290

    Political ecology survey of human-chimpanzee coexistence within postwar Mabi-Yaya Nature Reserve, Côte d’Ivoire by Sasha Pruvost, Vincent Leblan

    Published 2024-11-01
    “…Given the Ivorian political context, this local support and the persistence of high canopy forest appear to be more related to a local understanding of the protected area as a land-securing device against “outsiders” in a context of strong political and identity crises than to any agreement with conservation policies. …”
    Get full text
    Article
  11. 4291

    Infiltration of Small Arms and Light Weapons into Benue Valley and Its Impact on the Conflict Between Pastoralists and Farmers by Paulina Ada Akpa, Terver Akpar, Samson Aondowase Fada

    Published 2023-07-01
    “…This problem is more pronounce in developing countries where there are porous borders and weak institutions responsible for border security like Nigeria. The proliferation and misuse of small arms and light weapons in the country is progressively complex and multifaceted phenomenon that affects people and insecurity. …”
    Get full text
    Article
  12. 4292
  13. 4293

    The European Union's Mediterranean Policy in the Context of the "Arab Spring" by V. A. Latkina

    Published 2014-04-01
    “…While the EU Foreign Policy in the Mediterranean region was historically conditioned by the security interests of the European Union, it suffered from securitization/democratization dilemma. …”
    Get full text
    Article
  14. 4294

    The influence of communication on an effective relationship marketing strategy for sport unions in the new millennium by Frikkie Herbst

    Published 2022-10-01
    “…A long-term relationship is recognised as a very important and basic ingredient of marketing, securing and keeping customers and can be regarded as a tool for the new millennium. …”
    Get full text
    Article
  15. 4295

    The Mechanism of Safety Culture Construction in Chinese Universities Based on POI Data and Gravity Model by Wu Zhao, Zhe Zhou, Haibo Jiang

    Published 2022-01-01
    “…With the development of social economy, the importance of safety culture has been recognized by the whole society. Campus security is not only related to the common interests of the campus teachers and students but also related to the fundamental interests of each individual in the campus. …”
    Get full text
    Article
  16. 4296

    Cloud Trust-Driven Hierarchical Sharing Method of Internet of Things Information Resources by Jianpeng Zhang

    Published 2021-01-01
    “…This paper sorts according to the value of the Internet information security model, obtains the optimal model to avoid human tampering, and designs the information resource acquisition process to ensure the reliability of the source data. …”
    Get full text
    Article
  17. 4297

    HUMAN RESOURCE MANAGEMENT PRACTICES AND POLICIES AND EMPLOYEE ORGANIZATIONAL COMMITMENT IN BOSNIA AND HERZEGOVINA COMPANIES by Isada Mahmutović, Adisa Delić

    Published 2022-05-01
    “…The paper aimed at examining the impact of   characteristics, organizational characteristics, and HRM practices focused on performance appraisal, job security, employee participation, and career planning on employee organizational commitment in BiH companies with more than 50 employees in four sectors. …”
    Get full text
    Article
  18. 4298

    Russia and the Issues of the Korean Peninsula by G. D. Toloraya

    Published 2014-08-01
    “…It can be solved only by multilateral efforts for comprehensive solution combining security guarantees for North Korea and its abandonment of nuclear option.…”
    Get full text
    Article
  19. 4299

    Development of a Family of Chaotic Systems with Infinite Equilibria and Its Application for Image Encryption by Xiaofeng Li, Yulong Bai, Weishuan Pan, Di Wang, Yong-Jie Ma

    Published 2022-01-01
    “…Therefore, this study not only enriched the research on infinite equilibria chaotic systems but also further expanded secure communication technology by combining chaotic synchronization control and DNA coding in image encryption.…”
    Get full text
    Article
  20. 4300

    Research on design intervention in spatial planning of traditional rural tourism: based on the perspective of tourists’ willingness to visit again by Huanchen Tang, Xiaodong Liu, Junjie Li, Hanyu Wang

    Published 2025-01-01
    “…Through scientific management and marketing strategies, traditional villages can not only enhance their competitiveness but also secure a place in the global tourism market, achieving both economic and cultural prosperity.…”
    Get full text
    Article