Showing 5,361 - 5,380 results of 5,943 for search '"securities"', query time: 0.11s Refine Results
  1. 5361

    Magnitude and Predictors of Dietary Diversity among HIV-Infected Adults on Antiretroviral Therapy: The Case of North-Western, Ghana by Louis Nebayeng Mornah, Mahama Saaka, Diana Pireh

    Published 2024-01-01
    “…Starchy staple foods and flesh food were the most consumed foods, while organ meats, dairy products, and eggs were eaten less. Having a secured salary paid job, not taking cotrimoxazole prophylaxis, and being a young adult were strong predictors of a high dietary diversity score. …”
    Get full text
    Article
  2. 5362

    NEW «PARASITIC CLASS»: ON THE CONCEPT OF MIKHAIL VOSLENSKY by Сергій САВЧЕНКО, Катерина ПРОКОФ’ЄВА, Оксана РЕШЕТІЛОВА

    Published 2024-12-01
    “…Particular attention is paid to the subordination of the security forces to party control through mechanisms of the Central Committee, which minimized risks to the nomenklatura system. …”
    Get full text
    Article
  3. 5363

    Combined application of vermicompost and mineral K fertilizer improves root yield of sweet potato [Ipomoea batatas (L.) Lam] in Southern Ethiopia by Alemu Degwale, Geletaw Kebede, Ashenafi Woldeselassie, Fanuel Laekemariam

    Published 2025-02-01
    “…Eventually, this has led to a decline in food security. Although the rate depends on many factors, organic inputs such as vermicomposts are suggested as alternatives or combined with mineral fertilizers. …”
    Get full text
    Article
  4. 5364

    A Cloud-Based Optimized Ensemble Model for Risk Prediction of Diabetic Progression—An Azure Machine Learning Perspective by V. K. Daliya, T. K. Ramesh

    Published 2025-01-01
    “…The experiment is performed and implemented in Microsoft’s Azure cloud, using Azure Machine Learning service, that leverages the advantages of cloud computing with respect to scalability, security and its potential integration possibilities into IoT-based smart healthcare systems.This aspect highlights its versatility and impact with respect to remote monitoring of patients as well. …”
    Get full text
    Article
  5. 5365

    Venezuela: Political Confrontation and the World Community by Z. W. Iwanowski, D. M. Rozental

    Published 2020-11-01
    “…The inability or unwillingness of external forces to reach compromise and to bring the parties to the negotiating table can pose a threat to peace and international security.As a result, Venezuela has become one of the most turbulent countries in the region. …”
    Get full text
    Article
  6. 5366

    Information: on the question as for the meaningful evolution of the term by O. S. Bakumov, M. I. Marchuk, T. I. Gudz, О. О. Venglinskyi

    Published 2021-09-01
    “…The urgency and importance of studying the issue of information in our country is emphasized given that Ukraine is in a state of constant information war with the Russian Federation, which is quite active and aggressive in using information as a weapon of mass destruction against the territorial integrity and state security of Ukraine. The basic approaches to understanding of this term taking into account branch delimitation of scientific knowledge are defined. …”
    Get full text
    Article
  7. 5367
  8. 5368

    PROBLEMS OF DIPLOMACY IN THE PROCESS OF EURASIAN INTEGRATION by A. A. Durdyyeva

    Published 2014-06-01
    “…The Union State of Russia and Belarus and Organization of the Collective Security Treaty associations played a particular role in structuring the EAU. …”
    Get full text
    Article
  9. 5369

    Electronic contracts on medical care of the population under medical guarantees program by V. A. Кroitor

    Published 2024-06-01
    “…The author has identified the principles of electronic medical deeds: information exchange takes place exclusively in electronic form; the legislation establishes the security of exchange and preservation of medical information, in particular medical confidentiality; modern access to medical care and resources is provided due to their assistance; these electronic contracts are aimed at improving the quality of service and meeting patients needs, transparency of the health care system; they are signed considering technological neutrality and independence from decisions developers; while signing such contracts, the information is recorded in the e-health system without the possibility of deleting or correcting the entered data; electronic identification and authentication of participants in medical relations with a high level of trust is used while they are being signed. …”
    Get full text
    Article
  10. 5370
  11. 5371

    Global Governance of Biogenic Threats by M. M. Lebedeva, D. A. Kuznetsov

    Published 2021-04-01
    “…The SARS-CoV-2 virus, which caused a pandemic in 2020, has posed not only a medical, economic and social threat, but also a challenge to international security and international cooperation. It is now becoming obvious that the problem of the current pandemic cannot be reduced to individual states and regions and has the potential to influence the entire political organization of the modern world. …”
    Get full text
    Article
  12. 5372

    CRISIS OF TRUST IN GOVERNMENT: THE ROLE OF PUBLIC RELATIONS IN ITS RESTORATION by Larysa Samoilenko, Viacheslav Sharyi, Alina Zahrebelna

    Published 2024-12-01
    “…Overall,  it emphasizes the need for systemic changes in communication management approaches to secure political stability and promote economic development. …”
    Get full text
    Article
  13. 5373

    Women’s empowerment as a determinant of neonatal mortality in Sub-Saharan Africa: a narrative review focused on Nigeria by Joel-Medewase Victor Idowu, Wada Zechariah Ojima, Sayomi Bukola Adetutu, Adetoye Mayowa Mary, Ashaolu Joseph Oluwakayode, Olowolafe Tubosun Alex

    Published 2024-12-01
    “…By integrating women’s empowerment within a broader strategy to improve maternal and newborn health, Nigeria can advance towards securing a healthier future for its youngest population.…”
    Get full text
    Article
  14. 5374

    The die is cast: Sweden and Finland’s long road to NATO by E. V. Korunova

    Published 2024-11-01
    “…The consequences of this decision have yet to be assessed by politicians and experts, but one its immediate effect is clear — the emergence of a new security dilemma for the countries of the region.…”
    Get full text
    Article
  15. 5375

    A literature review on transformative impacts of blockchain technology on manufacturing management and industrial engineering practices by Dharmendra Hariyani, Poonam Hariyani, Sanjeev Mishra, Milind Kumar Sharma

    Published 2025-07-01
    “…Key findings reveal its effectiveness in improving data security, risk management, and intellectual property protection, alongside optimizing inventory control and customer satisfaction. …”
    Get full text
    Article
  16. 5376

    Humanitarian activity as a ‘soft power’ instrument of transnational corporations by N. O. Yudin

    Published 2023-10-01
    “…The author shows that within the framework of corporate humanitarian expansion Nestle implemented a wide range of humanitarian projects, which allowed it not only to secure a foothold in the Colombian market, but also to penetrate its political system, as well as to gain opportunities to further expand its political presence in the region. …”
    Get full text
    Article
  17. 5377

    Civil defendant representation in criminal proceedings by M. М. Kolomoitsev

    Published 2024-12-01
    “…The main areas of activity of a civil defendant’s representative are summarised as follows: 1) identifying other co-defendants if the damage was caused by the actions of more than one person; 2) checking whether the representative of the civil plaintiff has sufficient grounds to represent the interests of the state, a minor, incapacitated or partially incapacitated victim; 3) filing an objection to the claim, provided that there are sufficient grounds and the defendant is not properly identified; 4) recognising the claim in whole or in part based on a thorough study and analysis of the text of the civil claim; 5) assessing the nature and amount of claims, including material claims, set out in the claim, determining their objectivity and relevance to the circumstances of the case, the reliability and sufficiency of evidence provided in support of them in order to formulate an appropriate legal position; 6) finding out whether any person has previously compensated for the damage caused; 7) verifying the validity of actions taken by the prosecution to secure the claim, etc. Given these areas of activity of the civil defendant's representative, the author concludes that in general, this participant in criminal proceedings performs the following functions: informational, supportive and protective. …”
    Get full text
    Article
  18. 5378

    Investigating the Impacts of Road Traffic Conditions and Driver’s Characteristics on Automated Vehicle Takeover Time and Quality Using a Driving Simulator by Jaehyun Jason So, Sungho Park, Jonghwa Kim, Jejin Park, Ilsoo Yun

    Published 2021-01-01
    “…With these findings, this study emphasizes the importance of having effective countermeasures and driver interface to monitor drivers in the automated vehicle system; therefore, an early and effective alarm system to alert drivers for the vehicle takeover can secure enough time for stable recovery to manual driving and ultimately to achieve safety during the takeover.…”
    Get full text
    Article
  19. 5379

    Self-Reported Violence Experienced by Swiss Prehospital Emergency Care Providers by Simon Savoy, Pierre-Nicolas Carron, Nathalie Romain-Glassey, Nicolas Beysard

    Published 2021-01-01
    “…In order to increase their own security, they increased their protection. These results illustrate their feelings of insecurity, which may have deleterious effects on work satisfaction and motivation. …”
    Get full text
    Article
  20. 5380

    The Paradox of Indonesia Cyberspace Policy and Cooperation: Neoclassical Realism Perspective by Muhammad Abdurrohim, Indah Kumalasari, Fathur Rosy

    Published 2022-09-01
    “…Cyberspace is a new threat to state security, especially in Indonesia. The increase of internet users in Indonesia is followed by several policies Jakarta takes to adapt to the fast pace of cyberspace challenges. …”
    Get full text
    Article