Showing 2,981 - 3,000 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 2981

    Design of Updating Encryption Algorithm for Privacy Big Data Based on Consortium Blockchain Technology by Lei Liu, Xue Liu, Jiahua Wan

    Published 2022-01-01
    “…The source coding sequence of privacy big data is obtained, the security of network route query and identity is verified, and the update and extraction of user data access authority are realized. …”
    Get full text
    Article
  2. 2982

    Genetic resources in Russia: from collections to bioresource centers by E. K. Khlestkina

    Published 2022-04-01
    “…Collections of bioresources and a set of technologies for their conservation, study and practical use are now the basis of bioeconomy, biosafety, and food security. It is the foundation underpinning production chains, leading from basic research to various technological areas and industries.An analysis of the current state and an assessment of the prospects for the development of bioresource collections in the Russian Federation are presented. …”
    Get full text
    Article
  3. 2983

    Audio and Video Matching Zero-Watermarking Algorithm Based on NSCT by Di Fan, Wenxue Sun, Huiyuan Zhao, Wenshuo Kang, Changzhi Lv

    Published 2022-01-01
    “…In the Internet age, information security is threatened anytime and anywhere and the copyright protection of audio and video as well as the need for matching detection is increasingly strong. …”
    Get full text
    Article
  4. 2984

    IMPACT OF THE WHISTLEBLOWING POLICY IN THE FIGHT AGAINST CORRUPTION IN NIGERIA by NIMCHAK NANSAK EMMANUEL, MOSES DANJUMA BOT

    Published 2023-12-01
    “…This work, therefore, recommends, among other things, that the whistle blowers should be given adequate legal and security protection and adequate public awareness be embarked upon to educate the people of the need to expose corrupt individuals. …”
    Get full text
    Article
  5. 2985

    Les échos de la presse dans le silence du cabinet. La posture médiatique flaubertienne à la lumière de la correspondance by Nejma Omari

    Published 2021-06-01
    “…While Flaubert’s financial security exempted him from the daily publications that contemporary writers-journalists had to produce, it did not necessarily means disinterest. …”
    Get full text
    Article
  6. 2986
  7. 2987

    ACCOUNTING TREATMENT AND LEGISLATION OF LEASING ARRANGEMENTS by Selma Novalija, Hamid Mutapčić, Elmira Kovač

    Published 2011-11-01
    “… Companies are not always able to purchase fixed assets required to start, expand or modernize their own operations, and also do not have adequate resources that could offer as security for bank loans. Leasing is the answer to such problems, as it provides the possibility of leasing recipient to obtain the necessary equipment. …”
    Get full text
    Article
  8. 2988

    Permanent pacemaker implantation. Access to the apex of the right ventricle using fluoroscopy only at the last moment by Cynthia Torres Acosta

    Published 2021-12-01
    “…Although it is not currently practiced, during the stage that it was applied in the hospital, it provided security to patients and health personnel, so its use should be resumed.…”
    Get full text
    Article
  9. 2989

    Le droit du travail et les migrants ruraux : instituer un nouveau salariat en Chine by Muriel Périsse

    Published 2014-06-01
    “…Labour law appears as a solution whose goal is to ensure the viability of this new working class with socially inclusive policies and then institutionalises its economic security. Furthermore, in a context characterised by the socialist legacy and the lack of democracy, we have to question the relations with the law and the State. …”
    Get full text
    Article
  10. 2990

    The Correlation Between External and Internal Factors of the Libyan Crisis by E. N. Koposova

    Published 2015-10-01
    “…The importance of this region is determined by its geopolitical position, concentration of large natural resources, as well as the fact that it represents the greatest threat to the international security - the bases of terrorist organizations, the strengthening role of the group "Islamic State", drug trafficking and the proliferation of weapons of mass destruction (WMD). …”
    Get full text
    Article
  11. 2991

    Disaster Tips for People with Disabilities by Carolyn S. Wilken

    Published 2005-08-01
    “…Departments of Homeland Security and the Federal Emergency Management Agency for people with disabilities. …”
    Get full text
    Article
  12. 2992

    Who calls the shots in Naomi's life? Reading the Naomi-Ruth story within the African religio-cultural context

    Published 2016-12-01
    “…Such a worldview, in which the Sacred Other, the living and the (living) dead formed an integral whole, can also be observed at critical points in Naomi’s life: when Naomi bid farewell to her daughters-in-law (Rt 1:8-9); Naomi’s confession about Yahweh’s faithfulness to both the living and the dead (Rt 2:20); Naomi’s plan to seek security for Ruth through “levirate” marriage (Rt 3:1), and when she acted as a nurse to Mahlon’s son (Rt 4:5, 16). …”
    Get full text
    Article
  13. 2993

    Method for the hystopathological analysis of the cervix specimen, obtained through radio surgery by Alfredo B. Quiñones Ceballos, Martha María Chávez Valdivia, Caridad Socorro Castro, Ileana Franco Zunda

    Published 2006-08-01
    “…It has been evaluated and vouched as satisfactory for its usefulness, easy application, low expense, security, and diagnostic and forecasting confidence.…”
    Get full text
    Article
  14. 2994

    Machine Learning Applications based on SVM Classification A Review by Dakhaz Mustafa Abdullah, Adnan Mohsin Abdulazeez

    Published 2021-04-01
    “…Classification based on SVM has been used in many fields like face recognition, diseases diagnostics, text recognition, sentiment analysis, plant disease identification and intrusion detection system for network security application. Based on this study, it can be concluded that SVM classifier has obtained high accuracy results in most of the applications, specifically, for face recognition and diseases identification applications. …”
    Get full text
    Article
  15. 2995

    EXAMINING THE CAUSAL NEXUS BETWEEN TOURIST ARRIVALS AND TERRORISM IN EMERGING COUNTRIES by Sinem Eyüboğlu, Kemal Eyuboglu

    Published 2018-12-01
    “…Results suggest that emergingcountry authorities should increase security precautions to ensure thattourists feel safe and in order to attract more tourists, ceteris paribus.…”
    Get full text
    Article
  16. 2996

    Main street retail districts or shopping centers? comparing the preferences of low-income consumers by Juracy Parente, Marcelo Moll Brandão, Ana Paula Miotto, Flávia Plutarco

    Published 2012-01-01
    “…While shopping malls received better evaluation on environment, infrastructure, variety of stores and security, the street districts were judged to be better regarding access and value. …”
    Get full text
    Article
  17. 2997

    Asymptotic analysis of American call options by Ghada Alobaidi, Roland Mallier

    Published 2001-01-01
    “…American call options are financial derivatives that give the holder the right but not the obligation to buy an underlying security at a pre-determined price. They differ from European options in that they may be exercised at any time prior to their expiration, rather than only at expiration. …”
    Get full text
    Article
  18. 2998

    Multiplicatively weighted Voronoi-based sensor collaborative redeployment in software-defined wireless sensor networks by Minghua Wang, Ran Ou, Yan Wang

    Published 2022-03-01
    “…Large-scale deployment of mobile wireless sensor networks has been widely used in some dangerous and hostile urban security surveillance scenarios. As a new network architecture, software-defined networks was introduced into wireless sensor networks to form a new software-defined wireless sensor networks to solve the problem of balanced large-scale deployment of sensor networks and simplify the complexity of network management. …”
    Get full text
    Article
  19. 2999

    Legal Protection for Female workers in Indonesia (Study on the Rights of Female Workers in Tolitoli) by Mulyadi Mulyadi, Sutarman Yodo, Sulbana Sulbana

    Published 2025-01-01
    “…The lack of guarantees for female workers' rights remains a significant issue in Tolitoli Regency, encompassing concerns such as equal pay, decent work, maternity leave, childbirth and breastfeeding rights, social security, and protection against discrimination. This study, using a socio-legal approach with both qualitative and quantitative methods, finds that labor laws protecting female workers have not been fully implemented. …”
    Get full text
    Article
  20. 3000

    Characteristics of Professional Formation’s Indicators of Managers of the System of the Ministry of Internal Affairs of Ukraine by Yu. Yu. Boiko-Buzyl

    Published 2021-07-01
    “…The problem of professional and personal formation of managers of the security and defense sector of Ukraine has been studied. …”
    Get full text
    Article