Showing 3,021 - 3,040 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 3021

    ACCESSIBILITY OF FINANCIAL INFORMATION IN RELATION TO CHANGES IN SIZE OF ENTITIES CAUSED BY THE COVID‐19 CRISIS by Małgorzata Garstka

    Published 2020-06-01
    “…The accessibility ofinformation is connected with the level of security of engaging in business activities. Makingchanges in the criteria of an entity’s inclusion as an SME and in its obligation to audit can be onesolution for the problem of insufficient information. …”
    Get full text
    Article
  2. 3022

    Class Precarity and Solidarity in Education by Abdul Aziz Hafiz

    Published 2018-12-01
    “…These infrastructures provide important underpinnings of a universal basic security to be delivered through a social and solidarity economy. …”
    Get full text
    Article
  3. 3023

    Corneal crossed links: a new alternative in the treatment of ectasia by Maygret Alberro Hernández, Janet González Sotero, Haymy Caridad Casanueva Cabezas, Eduardo Rojas Álvarez

    Published 2009-09-01
    “…Many reviewed articles prove the security and efficacy of this treatment. The confocal microscopy techniques have shown significant swelling and resistance of corneal stroma after this procedure. …”
    Get full text
    Article
  4. 3024

    The Floor is not the Ground by George Papam Papamattheakis

    Published 2018-11-01
    “…Despite the categorical difference between transportation and logistics, narratives of quality, security and standards accompanied by specific spatial patterns, have infiltrated our everyday mobility infrastructures. …”
    Get full text
    Article
  5. 3025

    Developments in Border and Migration Management in the South East European Region by POLGÁR István

    Published 2024-12-01
    “…This extra pressure led to difficulties in terms of effectively manage the borders and address arising border security issues. The study aims to realize an inventory of the measures, proposals and activities which had an impact on transnational institution building which focuses on migration and border management. …”
    Get full text
    Article
  6. 3026

    Public Value of Using Light Rail Transit Transportation at Palembang by Rattu Nadra Syakila, Sri Suwitri, Tri Yuniningsih

    Published 2024-11-01
    “…Additionally, the LRT meets public expectations by offering a suitable route network, planning fleet capacity effectively, establishing consistent departure times, and ensuring high security across its operations. In conclusion, the Palembang LRT system enhances travel comfort with regular scheduling and adequate facilities, highlighting its potential as a key component of Palembang's sustainable urban transportation infrastructure with continued development.…”
    Get full text
    Article
  7. 3027

    Face Recognition using Deep Learning and TensorFlow framework by Makrem Beldi

    Published 2023-12-01
    “… Detecting human faces and recognizing faces and facial expressions have always been an area of interest for different applications such as games, utilities and even security. With the advancement of machine learning, the techniques of detection and recognition have become more accurate and precise than ever before. …”
    Get full text
    Article
  8. 3028

    Intentional Islanding of Active Distribution Networks by GenSets: An Analysis of Technical Constraints and Opportunities by Edoardo Daccò, Davide Falabretti, Andrea Vicario

    Published 2023-01-01
    “…The willingness to improve the security and reliability of power supply to end-users, often pushed by prescriptions of national regulatory authorities, is bringing considerable challenges for distribution system operators. …”
    Get full text
    Article
  9. 3029

    Analysis of Laboratory Videos of Science Teacher Candidates with Many-Facet Rasch Measurement Model by Ahmet Volkan Yuzuak, Sinan Erten, Yilmaz Kara

    Published 2019-07-01
    “…The simplest articles which science teacher candidates were subjected are “introducing yourself”, “using proper costume”, “appropriate time” and the articles for which the science teacher candidates are constrained mostly “sound-supporting effect”, “writing effect”, “warning for security precautions”.Jury numbered 3 or coded as J3 is “the most lenient” and scorer numbered 2 is “the severest” when juries are sequenced from the most lenient. …”
    Get full text
    Article
  10. 3030

    On Max-Plus Algebra and Its Application on Image Steganography by Kiswara Agung Santoso, Fatmawati, Herry Suprajitno

    Published 2018-01-01
    “…The proposed method has been tested on many secret images, and the results are satisfactory which have a high level of strength and a high level of security and can be used in various operating systems.…”
    Get full text
    Article
  11. 3031

    Analisis faktor produksi terhadap kepuasan petani dalam mendorong ketahanan pangan di Sulawesi Selatan by Andi Arifuddin Iskandar

    Published 2024-07-01
    “…The aim of this study is to determine whether farmers' satisfaction with the use of production factors contributes to the success of the Food Security System (SKP) and to identify which production factors most significantly influence farmers' satisfaction in supporting SKP. …”
    Get full text
    Article
  12. 3032

    Financial Data Anomaly Detection Method Based on Decision Tree and Random Forest Algorithm by Qingyang Zhang

    Published 2022-01-01
    “…The fast-developing computer network not only brings convenience to people but also brings security problems to people due to the appearance of various abnormal flows. …”
    Get full text
    Article
  13. 3033

    PREVENTING VIOLENCE CRIMES (KIDNAPPING, ARMED ROBBERY, BRIGANDAGE OR COMMUNITY MASSACRE) WITH DRONES: AN EFFECTIVE ALTERNATIVE TO VEHICULAR PATROLS IN NIGERIA by BABALOLA SUNDAY EMMANUEL

    Published 2024-06-01
    “…Recommendations proffered include the need for strategic deployment of drones in all security formation in the country, adequate budgetary provision .training of manpower, comprehensive monitoring and adequate assessment and action on information and intelligence received from drones. …”
    Get full text
    Article
  14. 3034

    Digital Technology Adoption in the Agriculture Sector: Challenges and Complexities in Africa by David Mhlanga, Emmanuel Ndhlovu

    Published 2023-01-01
    “…These include resource scarcity, limited expertise and training, a lack of digital infrastructure, data privacy and security concerns, and resistance by farmers. In spite of this, the agricultural sector in Africa has the potential to adopt technology and not only boost farm productivity but also engender sustainable and environmentally friendly farming. …”
    Get full text
    Article
  15. 3035

    Comparison Between Domestic and Hostile Applications of Wireless Sensor Networks by Salwa El-Morsy

    Published 2022-03-01
    “…This idea has boosted the success rate of different experiments in the fields of health, Finance, Security, etc. where simple factors like temperature, motion, smoke, pressure etc. are used to muster the required data. …”
    Get full text
    Article
  16. 3036

    Stability of password authentication in infocommunication networks by M. N. Bobov, A. V. Kurylovich

    Published 2020-09-01
    “…It is shown that for social networks with a large number of users, widely used assessment of the security of password systems based on the calculation of the determination probability is not sufficient. …”
    Get full text
    Article
  17. 3037

    Artificial intelligence-based video monitoring of movement disorders in the elderly: a review on current and future landscapes by Kye Won Park, Maryam S Mirian, Martin J McKeown

    Published 2024-03-01
    “…This progression must incorporate data security, ethical considerations and adherence to regulatory standards.…”
    Get full text
    Article
  18. 3038

    Role of electric transport in urban transportation system by T. N. Sakulyeva, V. V. Sotnikova

    Published 2022-07-01
    “…Urban transport should solve the following tasks: equal access to the population to vehicles, the possibility of planning the time of traveling inside the city, ensuring environmental safety from the use of vehicles, creating the conditions for the availability of transport services at their cost, security and comfort, as well as ensure transport services for the business subjects at minimal economic costs. …”
    Get full text
    Article
  19. 3039

    BIBLICAL PERSPECTIVE OF THE RUSSIAN INVASION OF UKRAINE IN 2022 by Lawrence Olabode Ekundayo

    Published 2022-12-01
    “…As a result of these findings, the paper recommended that there must be an immediate demilitarization of Ukraine, NATO's equipment installations on the borders of Russia should be relocated; there must be a restoration of the natural status of Ukraine for the sake of peace, the continuous eastward expansion of NATO must be stopped; and Russian legitimate security interest must be unconditionally taken into consideration by the Western countries to avoid third world war …”
    Get full text
    Article
  20. 3040

    Cloud-Based Service for Fingerprint Image Matching by Ethar Abdul Wahhab Hachim

    Published 2024-09-01
    “… Fingerprint matching is one of the most important services that related to the issue of identifying individuals, as it can be used to verify the validity of contracts, documents or in other security fields such as criminal investigations. Fingerprints are also one of the most common and accurate forms, as they are easy to obtain, it also has a unique features and cannot be identical to any individuals. …”
    Get full text
    Article