Showing 2,321 - 2,340 results of 5,943 for search '"security"', query time: 0.05s Refine Results
  1. 2321

    TAX CONTROL OF EXPORT OPERATIONS: PROBLEMS, PROSPECTS, SOLUTIONS by Konstantin V. Adolf

    Published 2024-12-01
    “…The implementation of these measures will contribute to improving economic security and the efficiency of the tax system.…”
    Get full text
    Article
  2. 2322

    LinRegDroid: Detection of Android Malware Using Multiple Linear Regression Models-Based Classifiers by Durmus Ozkan Sahin, Sedat Akleylek, Erdal Kilic

    Published 2022-01-01
    “…Application permissions, which are one of the most critical building blocks in the security of the Android operating system, are extracted through static analysis, and security analyzes of applications are carried out with machine learning techniques. …”
    Get full text
    Article
  3. 2323
  4. 2324
  5. 2325

    Modernization of the Chinese People’s Liberation Army by A. M. Belyaev, F. F. Sharipov, M. A. Dyakonova

    Published 2024-08-01
    “…Until recently, China’s national security was primarily associated with the economic development of the country and national economy systemic modernization.   …”
    Get full text
    Article
  6. 2326

    Integrated Dairy Production and Cattle Healthcare Management Using Blockchain NFTs and Smart Contracts by Saravanan Krishnan, Lakshmi Prabha Ganesan

    Published 2025-01-01
    “…Efficient cattle healthcare management is vital for ensuring productivity and welfare in dairy production, yet traditional record-keeping methods often lack transparency, security, and efficiency, leading to challenges in livestock product quality and healthcare. …”
    Get full text
    Article
  7. 2327

    Blockchain adoption factors by Carlos Bernardino, Francisco Cesário, Carlos J. Costa, Manuela Aparicio, João Tiago Aparicio

    Published 2025-01-01
    “…Trust significantly enhances this intention, underscoring the importance of confidence in the technology's reliability and security. Environmental Concerns present a barrier, suggesting sustainability perceptions can deter adoption. …”
    Get full text
    Article
  8. 2328

    An Analysis of Chinese Transport Infrastructure Loans and Investment in ICT in Nigeria by Innocent .A. Ocholi, Nnamdi .S. Okonkwo

    Published 2022-12-01
    “…The possibility of debt insolvency has serious implications for national security and socio-economic development the future. …”
    Get full text
    Article
  9. 2329

    A Dynamic Intrusion Detection System Based on Multivariate Hotelling’s T2 Statistics Approach for Network Environments by Aneetha Avalappampatty Sivasamy, Bose Sundan

    Published 2015-01-01
    “…The ever expanding communication requirements in today’s world demand extensive and efficient network systems with equally efficient and reliable security features integrated for safe, confident, and secured communication and data transfer. …”
    Get full text
    Article
  10. 2330

    Software defined network implementation of multi-node adaptive novel quantum key distribution protocol by Hardeer Kaur, Jai Sukh Paul Singh

    Published 2024-09-01
    “…Engineers have been working to create a better and more secure cryptographic system. Quantum key distribution stands at the top of this security system. …”
    Get full text
    Article
  11. 2331

    Sustainable Planning of Cross Border Cooperation Development (CBC): The factors and drivers that affect the stability of border regions by amin kooshki, mehrshad toulabi nejad

    Published 2020-03-01
    “…The results showed that in the area of planning for unity in Sistan and Baluchestan except for the determination of the right of the Hirmand River in the Sistan region, which was concluded with the country over a period of time, the plan was not approved or implemented, and among the five factors Economic, social, cultural-religious, institutional-structural and political security, three economic factors (0.478), political-security (0.473) and cultural-religious (0.363) have the most effect on the stability of unity of border regions in Studied area. …”
    Get full text
    Article
  12. 2332

    THE IMPACT OF INSECURITY ON THE HOSPITALITY INDUSTRY IN GUSAU METROPOLIS: A CASE STUDY OF HOTELS by APITYAN TUME

    Published 2024-09-01
    “…Hotel managers have implemented various strategies to mitigate these challenges, including enhanced security personnel, surveillance systems, and regular staff training. …”
    Get full text
    Article
  13. 2333

    Explaining geopolitical components affecting the strategic linkages of countries Case Study: Iran and Iraq

    Published 2018-03-01
    “…In the current disorderly world, securing benefits and achieving optimal security for countries alone is very difficult and unavoidable. …”
    Get full text
    Article
  14. 2334

    Government interventions in supporting SME growth in Lira district, northern Uganda by Eton, Marus

    Published 2018
    “…The study discovered that inadequacy of collateral security and struggle for financial resources come into view to limit the use and access to financial services. …”
    Get full text
    Article
  15. 2335

    Government interventions in supporting SME growth in Lira district, northern Uganda by Eton, Marus, Charles David Ebong, Fabian, Mwosi, Benard, Patrick Ogwel

    Published 2018
    “…The study discovered that inadequacy of collateral security and struggle for financial resources come into view to limit the use and access to financial services. …”
    Get full text
    Article
  16. 2336

    Design of a GSM Based Switching and Monitoring System Using a Mobile Phone. by Bbaale Francis

    Published 2023
    “…This GSM based switching and monitoring system is recommended for implementation in homes, offices and industries to prevent appliance damage due over heating, for security purposes and to tackle the rampant energy wastage in Uganda…”
    Get full text
    Thesis
  17. 2337
  18. 2338

    Usefulness of 3-Dimensional Flexible Endoscopy in Esophageal Endoscopic Submucosal Dissection in an Ex Vivo Animal Model by Kazutoshi Higuchi, Mitsuru Kaise, Hiroto Noda, Go Ikeda, Teppei Akimoto, Hiroshi Yamawaki, Osamu Goto, Nobue Ueki, Seiji Futagami, Katsuhiko Iwakiri

    Published 2019-01-01
    “…The degree of sense of security using 3D vision (3.67 [0.82]) was significantly higher than that using 2D vision (2.67 [0.52]) in trainees (P=.04), but was equivalent in experts. …”
    Get full text
    Article
  19. 2339
  20. 2340

    Dataset of shotgun metagenomic evaluation of Sorghum bicolor rhizosphere microbiome in soils preceded by Glycine maxNCBINCBINCBINCBI by Olubukola Oluranti Babalola, Ben Jesuorsemwen Enagbonma

    Published 2025-02-01
    “…Furthermore, the functional data and the function unknown from this dataset could enrich our understanding of microbial roles in nutrient cycling, plant growth promotion, and stress mitigation, which are critical for addressing challenges in food security and environmental sustainability.…”
    Get full text
    Article