Showing 2,921 - 2,940 results of 5,943 for search '"security"', query time: 0.07s Refine Results
  1. 2921

    Modernization of tax control in the context of digitalization of the economy by E. A. Kirova, A. V. Kozhebatkina

    Published 2020-10-01
    “…It has been concluded about the need to develop legislation in the field of digitalization of the economy, state regulation of the use of big data technology, ensuring reliable database security and protection ofprivacy, as well as the creation of software for identifying transactions.…”
    Get full text
    Article
  2. 2922

    THE HISTORICAL DEVELOPMENT AND CURRENT TRENDS OF POLITICAL SCIENCE AS A FIELD OF STUDY IN NIGERIA by Toye Manuwa

    Published 2023-08-01
    “…It investigates the current challenges and opportunities for political science in Nigeria in the 21st century, such as democratization, development, security, corruption, ethnicity, and globalization. …”
    Get full text
    Article
  3. 2923

    The Israeli–Palestinian Separation Wall and the Assemblage Theory: The Case of the Weekly Rosary at the Icon of Our Lady of the Wall by Elisa Farinacci

    Published 2017-06-01
    “…Although the Wall has been widely described as a technology of occupation on one side and as a device to ensure security on the other, through Latour’s concept of assemblages I unearth its agency in developing a Christian shrine. …”
    Get full text
    Article
  4. 2924

    Some Characteristics of Employees as Risk Factors for Presenteeism by Petra Mlakar, Janez Stare

    Published 2013-06-01
    “…The characteristics considered included ambition, financial worries, job security, sick leave and the physical and mental health of employees.…”
    Get full text
    Article
  5. 2925

    Power Consumption Based Android Malware Detection by Hongyu Yang, Ruiwen Tang

    Published 2016-01-01
    “…In order to solve the problem that Android platform’s sand-box mechanism prevents security protection software from accessing effective information to detect malware, this paper proposes a malicious software detection method based on power consumption. …”
    Get full text
    Article
  6. 2926
  7. 2927

    Evaluating the Efficiency and Reliability of Fertilizer Subsidy Systems: The Role of Blockchain in Driving Enhancements in Tanzania by O. D. Mbita, M. R. Nicholaus, R. K. Twahir

    Published 2025-02-01
    “…The proposed hybrid architecture integrates well-structured algorithms to improve operational efficiency and ensure a more secure and fair distribution system. These findings underscore the urgent need for novel approaches to improve agricultural productivity and food security, advocating for the widespread adoption of blockchain technology within the agricultural sector. …”
    Get full text
    Article
  8. 2928

    CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network by Guojie Liu, Jianbiao Zhang

    Published 2020-01-01
    “…Network intrusion detection system can effectively detect network attack behaviour, which is very important to network security. In this paper, a multiclassification network intrusion detection model based on convolutional neural network is proposed, and the algorithm is optimized. …”
    Get full text
    Article
  9. 2929

    A Monitoring Approach Based on Fuzzy Stochastic P-Timed Petri Nets of a Railway Transport Network by Anis M’hala

    Published 2021-01-01
    “…The main goal of the proposed supervision approach is to allow an early detection of traffic disturbance to avoid catastrophic scenarios and preserve stability and security of the studied railway networks. Finally, to demonstrate the effectiveness and accuracy of the approach, an application to the case study of the Tunisian railway network is outlined.…”
    Get full text
    Article
  10. 2930

    MORAL-ETHICAL ASPECTS OF THE DIGITAL ECONOMY by A. A. Sychev, E. V. Zaytseva, P. S. Tolkachev

    Published 2020-03-01
    “…It is obvious, that the creation of the Russian information system will be able to increase the efficiency of our national economy (including the objectives of its state regulation) and at the same time raise the level of the country’s security. However, the effective use of the digital economy does not only depend on the level of development of the technical base of the information system. …”
    Get full text
    Article
  11. 2931

    A Latent Implementation Error Detection Method for Software Validation by Jiantao Zhou, Jing Liu, Jinzhao Wu, Guodong Zhong

    Published 2013-01-01
    “…The method complements the incompleteness of security properties for software model checking. More accurate models are characterized to leverage the effectiveness of the model-based software verification and testing combined method.…”
    Get full text
    Article
  12. 2932

    Evaluation of the fulfillment grade and clinical management of the treatment with immunotherapy in allergic patients. by Marisela L. Pérez Pacaréu, Andrea Ortega Cabrera, Ania Sabina Díaz, Rafael Zamora Puerta

    Published 2006-08-01
    “…Authorized personnel checked out the level of fulfilment of the security rules, clinical betterment was evaluated with a daily control of symptoms correlated with clinical history of allergy, and satisfaction was evaluated through a questionaire.…”
    Get full text
    Article
  13. 2933

    Identity, imaginary and tourism in the tuareg region, in Niger by Emmanuel Grégoire, Marko Scholze

    Published 2012-12-01
    “…Finally, the authors consider the decline of tourism, as a result of the 2007-2009 rebellion, and the presence in the neighboring Northern Mali of the Salafist brigade Al Qaeda in the Islamic Maghreb (AQIM), which prohibits access to the region to foreigners for security reasons.The brutal halt in the tourist activity came with the decline of the Tuareg subculture that had been forged through their entrepreneurial dedication to tourism.…”
    Get full text
    Article
  14. 2934

    Neural Linguistic Steganalysis via Multi-Head Self-Attention by Sai-Mei Jiao, Hai-feng Wang, Kun Zhang, Ya-qi Hu

    Published 2021-01-01
    “…Precise linguistic steganalysis on suspicious carrier is critical for multimedia security. In this paper, we introduced a neural linguistic steganalysis approach based on multi-head self-attention. …”
    Get full text
    Article
  15. 2935

    Le nouveau Xinjiang : intégration et recompositions territoriales d’une périphérie chinoise by Alain Cariou

    Published 2009-06-01
    “…That’s the reason why central government take active measures for an acceleration of the economic development in the region with the aim of promoting regional security, cultural and économic integration. Nowadays, an unprecedent change taken place in Xinjiang with the improvements in transportation infrastructure. …”
    Get full text
    Article
  16. 2936

    Le mythe de l’émergence. Réalités des dynamiques externes et internes des processus d’accumulation brésilien et chinois by Mylène Gaulard

    Published 2020-06-01
    “…Finally, the solutions proposed to face the current crisis of emergence, such as the reshaping of social security systems, the reorientation of these economies towards their internal market and a better international integration enabled by the development of renewable energies, are more widely criticized in my latest work.…”
    Get full text
    Article
  17. 2937

    Big Data with Cloud Computing: Discussions and Challenges by Amanpreet Kaur Sandhu

    Published 2022-03-01
    “…Various research challenges are defined in terms of distributed database storage, data security, heterogeneity, and data visualization.…”
    Get full text
    Article
  18. 2938

    Southern Madagascar, polycrisis and project failures: A scoping review. by Léo Delpy, Claire Gondard Delcroix, Maxime Galon, Benoît Lallau, Isabelle Droy

    Published 2024-01-01
    “…The southern region of Madagascar experiences a series of crises related to agro-climatic, nutritional, security, institutional, and political conditions despite the presence of numerous development aid projects over several decades. …”
    Get full text
    Article
  19. 2939

    Population Ageing in Ghana: Research Gaps and the Way Forward by Chuks J. Mba

    Published 2010-01-01
    “…With increasing urbanization and modernization, it is important to know something about intergenerational transfers from adult children to their elderly parents, and characterize the elderly persons' food security strategies. Training of researchers will be important in terms of strengthening Ghana's capacity to monitor trends, as well as to conduct research and explore new directions in population ageing research.…”
    Get full text
    Article
  20. 2940

    Methodological foundations of political-geographical studies of borders using the example of Hungary by Mađar Ede

    Published 2024-01-01
    “…Border management involves control of movement, security, and cross-border cooperation, which is critical for regional stability and development. …”
    Get full text
    Article