Showing 4,701 - 4,720 results of 5,943 for search '"securities"', query time: 0.08s Refine Results
  1. 4701

    Acceptability of improved cook stoves-a scoping review of the literature. by Bipin Adhikari, Sophie Suh Young Kang, Aaryan Dahal, Salum Mshamu, Jacqueline Deen, Christopher Pell, Lorenz von Seidlein, Jakob Knudsen, Thomas Chevalier Bøjstrup

    Published 2025-01-01
    “…Sustained use of ICS depended on fuel supply, fuel security and policies promoting its use. Policies offering subsidies in support of supply-chain garnered institutional trust among community members and resulted in the sustained use of ICS. …”
    Get full text
    Article
  2. 4702

    SHADOW GLOBALIZATION by L. M. Kapitsa

    Published 2014-06-01
    “…Some of the world development trends been observed over the past years raise serious concerns about the security and welfare of the peoples of the world. One of such trends has been the globalization of shadow economic activities. …”
    Get full text
    Article
  3. 4703

    Organizing the spatial space of the urban rivers\' margin of tourism development (case study of Poldokhtar city) by jahan tigh mond, Yassin Zeini Vand, Seyyed Moein Moosavi Nadoshan

    Published 2023-03-01
    “…The range of results showed that the most important strategy for creating urban river tourism in Poldokhtar is the attempt to create a social and secure environment with facilities and ease of access and special emphasis on environmental and ecological issues. …”
    Get full text
    Article
  4. 4704

    Detection of network intelligence features with the decision tree model by N. P. Sharaev, S. N. Petrov

    Published 2022-03-01
    “…Early detection of network intelligence allows to reduce the risks of information security of organizations. The study was carried out to develop software module for detecting the features of network intelligence by machine learning methods.M e t h o d s . …”
    Get full text
    Article
  5. 4705

    Soviet Diplomatic Efforts to Prevent Hungary’s Alignment with Germany in World War II (1939– 1941) by V. F. Pryakhin

    Published 2024-01-01
    “…Hungary, as strategized by Budapest, hoped to secure a position among these observers, avoiding direct conflict participation, and to later engage in territorial reconfiguration post-World War II. …”
    Get full text
    Article
  6. 4706
  7. 4707

    The Everyday Commoning Practices in Urbanising Localities by Bhuvaneswari Raman, Eric Denis

    Published 2025-01-01
    “…Negotiating Rights to Inhabit Common Lands for Housing in Two Cities of South India This paper presents a framework for understanding the everyday political dynamics of commoning initiated by residents to secure their claims to ‘common land’ in urbanising localities. …”
    Get full text
    Article
  8. 4708

    Leveraging Social Engineering Techniques for Ethical Purposes:  An Approach to Develop Fake Android App for Collecting Valuable Data Discreetly by Hussein Abdulkhaleq Saleh alsharya

    Published 2024-09-01
    “…However, these techniques can also be utilized ethically, as many cybersecurity professionals do, particularly when evaluating vulnerabilities and testing security defenses. This paper presents EDC (Ethical Data Collector), an Android application that utilizes social engineering techniques to discreetly collect valuable data from an Android device for ethical purposes. …”
    Get full text
    Article
  9. 4709

    The interplay of perceived benefit, perceived risk, and trust in Fintech adoption: Insights from Sub-Saharan Africa by Thomas Appiah, Veronica Venyo Agblewornu

    Published 2025-01-01
    “…Conversely, perceived legal risk, security risk, and privacy concerns act as significant inhibitors of Fintech adoption. …”
    Get full text
    Article
  10. 4710

    Operating Thermal Power Plants Efficiency Improvement under Current Conditions by V. V. Yanchuk, V. N. Romaniuk

    Published 2022-12-01
    “…In the limit, the share of natural gas in the incoming part of the energy balance should be reduced to values not exceeding 50 %, in accordance with the requirements of energy security. The article considers examples of utilization of low-temperature secondary energy flows occurring at thermal power plants: the heat of the cooling processes of the generator, lubrication systems, as well as the heat of condensation of turbine exhaust steam and deeper cooling of flue gases. …”
    Get full text
    Article
  11. 4711

    Environmental literacy, the key to sustainable conservation of wetlands in urban areas by Cain NZVERE, Lovemore CHIRUBVU, Thebeth MASUNDA

    Published 2024-01-01
    “…The study concluded that individuals are more concerned with their primary needs of securing food and shelter, with little or no consideration of the after effects of such on the environment which include individual heath, as well as depreciation of other services and goods found in wetlands. …”
    Get full text
    Article
  12. 4712
  13. 4713

    Mineral Composition of Lentils: Physiological Functions, Antinutritional Effects, and Bioavailability Enhancement by Asmaa Benayad, Youssef Aboussaleh

    Published 2021-01-01
    “…Thus, lentils play a major role in food security, particularly among low-income countries. …”
    Get full text
    Article
  14. 4714

    Accounting Data Encryption Processing Based on Data Encryption Standard Algorithm by Meixi Chen

    Published 2021-01-01
    “…The 3DES encryption algorithm achieves one encryption process at a time to some extent, can effectively resist exhaustive search attacks, and enhance the security of the DES algorithm.…”
    Get full text
    Article
  15. 4715

    The concept of civil law incentives by Yu. I. Chalyi

    Published 2024-12-01
    “…This is especially evident in contractual relations of obligation. The regulatory (security) function of civil law incentives is associated with the legal formalisation of achieving, first and foremost, private interests. …”
    Get full text
    Article
  16. 4716

    Principles of Preventive Police Activity: Concepts, Content and Their Classification by S. O. Shatrava, H. R. Parkhanov

    Published 2019-09-01
    “…The principles of preventive activities, depending on the method of their regulatory consolidation, are classified into: 1) general legal principles that determine the principles of formation and implementation of state policy in the field of national security; 2) basic principles that characterize the purposefulness, content and limits of police activity and are enshrined in the provisions of the Law of Ukraine “On the National Police”; 3) special principles that characterize the specificity of preventive police activity. …”
    Get full text
    Article
  17. 4717

    The “Nixon China Shock” in the Mirror of Japanese Domestic Politics by V. V. Nelidov

    Published 2019-12-01
    “…Nixon about the recent trip of his National Security Advisor H. Kissinger to the PRC and about the President’s upcoming visit there) became one of the pivotal points in the history of Japanese foreign policy and contributed to Tokyo becoming more independent from Washington in its diplomatic course. …”
    Get full text
    Article
  18. 4718

    Assessment of Production and Utilization Practices of Orange-Fleshed Sweet Potatoes (Ipomoea Batatas L.) in Sidama Region, Ethiopia by Miheret Hendebo, Ali Mohammed Ibrahim, Fekadu Gurmu, Hussien Mohammed Beshir

    Published 2022-01-01
    “…Sweet potato (Ipomoea batatas L.) is an important crop which ensures food security in developing countries. It can be harvested at any stage as needed, thereby providing a flexible source of food and income for rural families that are most vulnerable to crop failures and cash income fluctuations. …”
    Get full text
    Article
  19. 4719

    Perspectives of high-risk pregnant women on home care program in high-risk pregnancies: A multicenter, qualitative study by Masoumeh Sayahi, Shahrbanoo Salehin, Mehrnoosh Zakerkish, Afsaneh Keramat, Shahrbanoo Goli

    Published 2025-01-01
    “…The themes and categories were “high-risk pregnancy and related issues (pursuing treatment and paying attention to the high-risk situation by pregnant women, psychological aspect of high-risk pregnancy on pregnant women and caregivers, emotional and physical aspects of high-risk pregnancy, the consequences of high-risk pregnancy on the people around them and empowerment of high-risk pregnant women)”, “support dimension (family and community support for high-risk pregnant women)”, and “framework of program (acculturalization, means and equipment, security, manpower and the necessary arrangements for the home care)”. …”
    Get full text
    Article
  20. 4720

    Characterizing agronomic, morphological, nutritional, and phytochemical traits of local sorghum (Sorghum bicolor L.) in Indonesia by Maisya Zahra Al Banna, Widiastini Arifuddin

    Published 2024-07-01
    “…These findings highlight the potential of local Tritiro sorghum as a valuable nutritional resource and its suitability for cultivation in the region, contributing to food security and sustainable agricultural practices. …”
    Get full text
    Article