Showing 2,741 - 2,760 results of 5,943 for search '"security"', query time: 0.17s Refine Results
  1. 2741
  2. 2742

    Incertezza e cambiamento climatico nell’era dell’Antropocene by Elena Bougleux

    Published 2017-07-01
    “…Climate change appears as a major driver of identity crisis, affecting changes at local and global level in terms of spaces, security, livelihood and weather. The prevailing narration on climate change describes unfamiliar scenarios struck by exceptional events, that rarely can be connected with personal experiences. …”
    Get full text
    Article
  3. 2743

    Citizen’s Income and the Future of the Welfare State by Michael Opielka, Wolfgang Strengmann-Kuhn

    Published 2022-02-01
    “…Abstract The authors discuss the reform of basic security in the direction of a “citizen’s income” in the coalition agreement of the new “traffic light coalition” at the federal level against the background of fundamental considerations on the future of the welfare state, including those from the “Schleswig-Holstein Future Laboratory”. …”
    Get full text
    Article
  4. 2744

    Pedestrian inertial navigation: An overview of model and data-driven approaches by Itzik Klein

    Published 2025-03-01
    “…The task of indoor positioning is fundamental to several applications, including navigation, healthcare, location-based services, and security. An emerging field is inertial navigation for pedestrians, which relies only on inertial sensors for positioning. …”
    Get full text
    Article
  5. 2745
  6. 2746
  7. 2747

    Food Insecurity and Obesity by Rachel Savelle, LaToya J. O'Neal

    Published 2017-05-01
    “…It is important that the coexistence of food insecurity and obesity is well understood so that community outreach programs and interventions can continue to be implemented in order to improve food security by increasing access to affordable, healthy foods and promoting good health nationwide. …”
    Get full text
    Article
  8. 2748

    Projevy odporu proti nastupující kolektivizaci na Novobydžovsku by Jiří Urban

    Published 2012-01-01
    “…The author also puts forward a detailed analysis of the State Security (StB) provocation action, for which the setting up of informers among anti-communist leaning members of the population became a primary task. …”
    Get full text
    Article
  9. 2749

    Ballot initiatives and the national debate on immigration by Mario Menéndez

    Published 2012-01-01
    “…As of 1996 new laws related to immigration and access to welfare benefits followed the main guidelines of Proposition 187; since the 9-11 attacks national security has become the main axis of immigration laws. …”
    Get full text
    Article
  10. 2750

    HRR: a data cleaning approach preserving local differential privacy by Qilong Han, Qianqian Chen, Liguo Zhang, Kejia Zhang

    Published 2018-12-01
    “…While simplifying the data pre-processing process, we want to find a balance between data availability and security.…”
    Get full text
    Article
  11. 2751

    On Family Relationships under the Laws of Hammurabi by K. V. Karpenko

    Published 2012-10-01
    “…The family in the Hammurabi Code represents the basis not only for economic and financial power of the state, but also for its political stability and security. The rights and obligations of spouses are not equal, but they are together, though each in his own way, achieving the main goal of the marital union - the birth and upbringing of children.…”
    Get full text
    Article
  12. 2752

    Electricity Prices of the Future by Justus Haucap, Jonathan Meinhof

    Published 2022-06-01
    “…Secondly, additional instruments are needed to safeguard the security of supply. An thirdly, network charges need to account for the different role of the distribution network, which operates more and more as a platform. …”
    Get full text
    Article
  13. 2753

    THE COMINFORM EMIGRATION IN BULGARIA by Milan Milenković

    Published 2025-02-01
    “…Research is mostly based on unpublished sources from the State Security Service (UDB) that are kept in the State Archives of Serbia, and also on relevant literature.…”
    Get full text
    Article
  14. 2754

    Le manager-ingénieur face aux tensions entre innovation et organisation by Stéphane Trébucq, Youssra Hdayed, Petko Atanasov

    Published 2023-06-01
    “…The objectives of improving mobility and creativity clash with the organizational imperatives of ensuring safety and security. The manager then deals with the network of actors in place, trying to convince them and facilitate their support. …”
    Get full text
    Article
  15. 2755

    Individual Agency and the Diversity of Traditional Practice: The Iji Nla Association of Ijede by Charles K. Omotayo

    Published 2021-12-01
    “…Over time, it increasingly functioned as an institution providing traditional social control mechanisms and security. This article focuses on the origin, structure, and diversity of the Iji Nla Association as a traditional social mechanism and its continued relevance in Ijede. …”
    Get full text
    Article
  16. 2756

    Main Reasons for the Transformation of Mandatory Hungarian Private Pension Funds by Peter Novoszath

    Published 2016-06-01
    “…The main purpose of writing this paper was to provide a clear summary of the main facts and motives of restructuring the financing of Hungarian social security system which has been in process since 2010. …”
    Get full text
    Article
  17. 2757
  18. 2758

    THE EXPERIENCE OF COMBATING THE SHADOW ECONOMY IN THE EUROPEAN COUNTRIES by E. Hakopyan

    Published 2018-01-01
    “…In the first place among them is the modernization of the tax and social security systems. Long-term initiatives in the field of creating «e-government», in particular electronic payments in the public sector are one of the most important elements in changing the «old habits» of using cash.…”
    Get full text
    Article
  19. 2759

    Comparative analysis of smart home management systems by Patryk Bąk, Grzegorz Kozieł

    Published 2024-06-01
    “…The detailed analysis includes a comparison of documentation, functionality, configurability, security, architecture and user feedback. In addition, two studies were conducted. …”
    Get full text
    Article
  20. 2760