Showing 2,901 - 2,920 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 2901

    Records Keeping and Financial Performance in Local Government: A Case Study of Rubanda District Local Government. by Birungi, Edinah

    Published 2024
    “…Other challenges stated were lack of records retention and disposition schedule/ policy. improper security for records. lack of filing manual/finding aids and inadequate storage equipment and solutions to the challenges faced in record-keeping at RDLG were the provision of retention and disposition schedule, Lack of Records management policy, Improving security for records, Employing professionally trained record Managers, provision of Filing Manual/Finding Aids and Involvement of manual operations, Training record users on modern record management practices and Installing back up facilities for ICT. …”
    Get full text
    Thesis
  2. 2902

    Factors Associated with Stunting in Children Under Five Years of Age: A Case of Buhara Sub County, Kabale District. by Namanya, Oliver

    Published 2023
    “…The household financial security was seen to have influenced household food security, diversification, and supplementation. …”
    Get full text
    Thesis
  3. 2903

    Les salafistes marocains et la reconfiguration politico-religieuse post-2011 : fluctuation entre (dé)politisation, radicalisation et intégration by Salim Hmimnat

    Published 2020-07-01
    “…In each moment of this evolution, the regime opts for a pragmatic approach which consists in using this religious trend to meet pressing demands and priorities of a political and security nature. Ten years after breaking up with salafist groups, both quietists and jihadists, suspected to be responsible for the 2003 Casablanca attacks, the regime seeks henceforth to reconcile with salafis with the purpose to integrate them, or at least neutralise them, in the ongoing politico-religious reconfiguration process. …”
    Get full text
    Article
  4. 2904
  5. 2905

    Marketing analysis of the technological equipment market for the Russian logging industry by Yu. V. Astashova, I. Yu. Okolnishnikova, O. N. Gatilova

    Published 2021-08-01
    “…The directions of further development of forest engineering and the entire forest complex of Russia based on import substitution and ensuring the economic and technological security of Russia are substantiated.…”
    Get full text
    Article
  6. 2906

    HYGIENIC EVALUATION OF ENVIRONMENTAL INFLUENCE ON THE HEALTH OF CHILDREN FROM RURAL REGIONS OF SOUTHERN UKRAINE by V.V. Babienko, V.L. Mykhailenko

    Published 2017-03-01
    “…The program of preventive measures in areas with low environmental security should include correction of food, providing drinking water quality and regulatory measures on hygienic education of the children’s population.…”
    Get full text
    Article
  7. 2907

    Evacuation Model of Emotional Contagion Crowd Based on Cellular Automata by Qian Xiao, Jiayang Li

    Published 2021-01-01
    “…Crowd evacuation under emergency is an important task of world public security research and practice. In order to describe the microemotional contagion of evacuation individuals, a cellular automata-based evacuation model of emotional contagion crowd based on the classical SIS model of infectious diseases is proposed in this paper. …”
    Get full text
    Article
  8. 2908

    A Novel Image Encryption Algorithm Based on DNA Subsequence Operation by Qiang Zhang, Xianglian Xue, Xiaopeng Wei

    Published 2012-01-01
    “…The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.…”
    Get full text
    Article
  9. 2909

    Concept development assessment game – suitable collecting framework in scientific military research by George-Ion TOROI

    Published 2025-01-01
    “… Scientific research is crucial for progress across all areas of society, including the military sphere. However, as the security environment becomes increasingly dynamic, unpredictable, and complex, research methods in military sciences must address contemporary challenges by providing flexible frameworks for evaluating and testing new concepts necessary for the adaptation of force structures. …”
    Get full text
    Article
  10. 2910

    Qualification problems of war-related criminal offences documented on the de-occupied territories of Ukraine by Yu. V. Orlov, N. O. Pribytkova

    Published 2022-09-01
    “…Based on the analysis and synthesis of the experience of investigators from the National Police, the Security Service of Ukraine, as well as prosecutors on the de-occupied territories of Ukraine, four basic problematic subject areas with the corresponding typical situations of the law on criminal liability application have been identified: criminal legal qualification of artillery shelling, mining, causing death to a person, and other actions of physically detained representatives of the aggressor state. …”
    Get full text
    Article
  11. 2911

    LEADERSHIP, GOOD GOVERNANCE AND DEVELOPMENT IN NIGERIA by ADENIYI ADEKUNLE

    Published 2023-12-01
    “…The paper recommended the use of electronic voting systems and the demonstration of material and human security as solutions to problems. Others include removing the immunity provision for those holding political office and reorienting the country. …”
    Get full text
    Article
  12. 2912

    Random Emission and Control of Whispering Gallery Mode Using Flexible Optical Fiber by Bingyang Cao, Zhen He, Weili Zhang

    Published 2025-01-01
    “…Additionally, the application of this laser in information security encryption is demonstrated and explored.…”
    Get full text
    Article
  13. 2913

    A Privacy-Preserving Biometric Recognition System with Visual Cryptography by Lijing Ren, Denghui Zhang

    Published 2022-01-01
    “…Experimental results show that our proposed method keeps the high accuracy of the feature recognition system when providing security.…”
    Get full text
    Article
  14. 2914
  15. 2915
  16. 2916

    Automatic exchange of financial information from the perspective of tax fairness and transparency by Isnaini Isnaini, Joni Emirzon, Ridwan Ridwan

    Published 2024-11-01
    “…Challenges such as data security and compliance costs can be addressed with the development of better technology and regulatory frameworks. …”
    Get full text
    Article
  17. 2917

    Making AI an ally for sustainable agriculture in the face of climate change by Lalit Gautam

    Published 2025-01-01
    “…These disruptions threaten food production, global food security, economic stability and community livelihoods. …”
    Get full text
    Article
  18. 2918

    EPPDC: An Efficient Privacy-Preserving Scheme for Data Collection in Smart Grid by Jie Chen, Junping Shi, Yueyu Zhang

    Published 2015-05-01
    “…In EPPDC scheme, the users' data information is transmitted to the local aggregator by building gateway with privacy preserving. In addition, the security analysis indicates that EPPDC scheme not only can resist replay attack, but also has source authentication and data integrity, confidentiality, unforgeability, nonrepudiation, and evolution of shared keys. …”
    Get full text
    Article
  19. 2919

    Combating Cybercrime and Cyberterrorism in Indonesia by Cynthia Shafira Hartati, Ali Muhammad

    Published 2023-02-01
    “…Cybercrime poses a serious risk to national security in Indonesia. The pervasive nature of cybercrime calls into question the efficacy of current regulatory measures. …”
    Get full text
    Article
  20. 2920

    From Travel to Text: Reverends Wolff and Lansdell’s Missions to Bokhara by Irina Kantarbaeva-Bill

    Published 2024-03-01
    “…My paper will examine the strategies Wolff and Lansdell employed in writing their journeys to Central Asian sensitive border regions under the imperial security constraints of the moment. Their failure of self-censorship in fact erupts in concealed messages to certain sections of Victorian readership able to read between the lines, revealing the undisclosed and unsaid.…”
    Get full text
    Article