Showing 4,741 - 4,760 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 4741

    Lethal intimate partner violence and gendered dimensions of the COVID-19 lockdown in Nigeria: evidence from a descriptive analysis of secondary data by Vitalis U Ukoji, Vitus N Ukoji

    Published 2024-04-01
    “…This research aims to shed light on the impact of the pandemic lockdown on IPV-related mortalities.Methods The study used secondary data from the Nigeria Watch database, an online resource on lethal violence and human security in Nigeria. It relied on IPV datasets extracted and analysed descriptively at the univariate level.Results Results indicate a steady increase in IPV-related mortalities, with 205 fatalities—62 in 2019, 69 in 2020 and 74 in 2021—resulting from 180 IPV incidents. …”
    Get full text
    Article
  2. 4742

    Face morphing attacks and face image quality: The effect of morphing and the unsupervised attack detection by quality by Biying Fu, Naser Damer

    Published 2022-09-01
    “…This operation, therefore, poses serious security issues related to the ability of a travel or identity document to be verified to belong to multiple persons. …”
    Get full text
    Article
  3. 4743

    Development of the national cybersecurity system of Ukraine as a necessary element of information society development by S. H. Petrov

    Published 2021-12-01
    “…Attention is drawn to the unconditional fulfillment of the tasks of the new Cyber Security Strategy of Ukraine, especially those related to cyber protection of critical infrastructure. …”
    Get full text
    Article
  4. 4744
  5. 4745

    Features of democratic reforms in Jordan by A. V. Krilov

    Published 2013-04-01
    “…In seeking to preserve the existing status quo Jordanian authorities would deliberately put the country in a state of dependency on the political interests of the U.S. and Saudi Arabia, in return for all kinds of preferences, including military aid if a threat to the security of the Kingdom is expected.…”
    Get full text
    Article
  6. 4746

    Maturity of Employment Data Interoperability in supporting One Employment Data at the Ministry and Regional Government Level by Herpita Wahyuni, Dyah Mutiarin, Wahyudi Kumorotomo, Ulung Pribadi, Nur Syakiran Akmal Ismail

    Published 2023-12-01
    “…Ethos (27.00%) by carrying out the revitalization of One Employment Data's network and data security devices and hashtags in the data interoperability process which indicates that information related to work, training and the labor market can be better integrated for analysis and decision making purposes which is more effective.…”
    Get full text
    Article
  7. 4747

    Development of methodology of accounting and control processes in the digital economy by A. V. Bodiako

    Published 2020-04-01
    “…A technology for the formation of information-security mission of accounting and control processes in the digital conomy and the changed requirements for the formation of information for management decisions, combining in a single information-digital “shell” accounting, control, analytical and other iterations, which should contribute to a better compilation of different reporting formats, has been presented. …”
    Get full text
    Article
  8. 4748
  9. 4749

    Evaluation of Emergency Assembly Areas with the AHP Method from the Perspective of Occupational Safety Experts by Onur Doğan

    Published 2023-01-01
    “…Accordingly, as a result of the comparison made between the criteria, the criterion with the highest weight was 0.4294 assembly area security, followed by 0.3602 assembly area access and 0.2104 assembly area characteristics, respectively…”
    Get full text
    Article
  10. 4750

    From fitness trackers to medical devices: wearable technologies by Zhi Zhou

    Published 2023-06-01
    “…As wearable technology is being proposed for critical applications, it must be vetted for its reliability and security properties. Applications based on Wireless Sensor Networks (WSN) for Internet of Things (IoTs) scenarios are rising. …”
    Get full text
    Article
  11. 4751

    Efficacy Perceived by Patients of Post-infarction Cardiovascular Rehabilitation Strategies by María Gabriela Balarezo García, Carlos Antonio Escobar Suárez, Becker Neto Mullo

    Published 2024-01-01
    “…The study population was made up of 90 patients who participated in post-infarction cardiac rehabilitation programs implemented in the medical facilities of the Ecuadorian Institute of Social Security in the Sierra region of Ecuador. The technique for data collection was the survey. …”
    Get full text
    Article
  12. 4752

    Elevated few-shot network intrusion detection via self-attention mechanisms and iterative refinement. by Congyuan Xu, Yong Zhan, Guanghui Chen, Zhiqiang Wang, Siqing Liu, Weichen Hu

    Published 2025-01-01
    “…The network intrusion detection system (NIDS) plays a critical role in maintaining network security. However, traditional NIDS relies on a large volume of samples for training, which exhibits insufficient adaptability in rapidly changing network environments and complex attack methods, especially when facing novel and rare attacks. …”
    Get full text
    Article
  13. 4753

    Enhancing Maternal Caregiving Capabilities Model to Prevent Childhood Stunting: A UNICEF-Inspired Model by Eka Mishbahatul Marah Has PhD, Ilya Krisnana PhD, Ferry Efendi PhD

    Published 2024-01-01
    “…Household factors, including economic level and food security, were also important. High maternal caregiving capabilities were expected to enable mothers to improve their behavior to prevent childhood stunting (6–23 months).…”
    Get full text
    Article
  14. 4754

    Modelling Customs Revenue in Ghana Using Novel Time Series Methods by Diana Ayorkor Agbenyega, John Andoh, Samuel Iddi, Louis Asiedu

    Published 2022-01-01
    “…Governments across the world rely on their Customs Administration to provide functions that include border security, intellectual property rights protection, environmental protection, and revenue mobilisation amongst others. …”
    Get full text
    Article
  15. 4755

    Prospects for the development of digital forms of political participation of generation Z in modern Russia by S. A. Grishaeva, A. A. Lebedeva

    Published 2021-01-01
    “…According to the results of the study, the authors substantiate the conclusion about the prospects of using digital forms (in particular, online voting) of political participation, primarily due to the speed and security that distinguish digital forms of political participation from traditional ones: it is very convenient to express your civic position from anywhere in the world, while simultaneously doing other things and not fearing negative consequences for participation. …”
    Get full text
    Article
  16. 4756

    Pengaruh Pelatihan Berprilaku Caring Terhadap Kemampuan Caring Mahasiswa Praktek Profesi Fakultas Keperawatan Unand di RSUP Dr.M.Djamil Padang by Reni Prima Gusty

    Published 2013-10-01
    “…Instruments is queationer that measure eight capability caring consist of hear clients with caring attentive, giving a sense of security, a touch, build trusting relationships, responsibility, information, sensitive to the client, and respecting the client . …”
    Get full text
    Article
  17. 4757
  18. 4758

    Hidden Markov Model-Based Video Recognition for Sports by Zhiyuan Wang, Chongyuan Bi, Songhui You, Junjie Yao

    Published 2021-01-01
    “…The combination of the two modules forms the overall technology of this paper, which can be applied to many scenarios, including some special scenarios with high-security levels that require real-time feedback and some public indoor scenarios, which can achieve different prevention and services for different age groups. …”
    Get full text
    Article
  19. 4759

    Prioritization of Inside Urban Space Indicators Using Delphi Method (Case study: Gorgan City) by Fateme Hajizade, Seyed Hamed Mirkarimi, Abdorassuol Salman Mahini, Marjan Mohammadzade

    Published 2024-09-01
    “…Results showed that the most important indicator is feeling of security followed by the noise pollution and environmental pollution. …”
    Get full text
    Article
  20. 4760

    History of the origin and development of the institute of operational service of economic sectors, lines of work, fixed objects and territories by criminal police divisions by S. A. Chyzh

    Published 2021-12-01
    “…It is emphasized that each of the considered periods is characterized by a radical change in the system, structure, tasks, functions and competencies of economic security units. The necessity of improving the institute of operative service, revision of its basic concepts, taking into account the specifics of operative service for different subjects of operational and investigative activities is proved.…”
    Get full text
    Article