Showing 3,061 - 3,080 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 3061

    Design of knowledge transaction protection mechanism in the open innovation community based on blockchain technology by Dongshan Yang, Ling Zhao, Feng Leng, Zujun Shi

    Published 2025-03-01
    “…This paper proposes an approach that combines blockchain technology and an OIC, as blockchain technology provides a direction for solving trust and security problems in community platform transactions. …”
    Get full text
    Article
  2. 3062

    THE ETHICAL AND LEGAL ASPECTS OF HEALTH POLICY ON ELECTRONIC MEDICAL RECORDS IN INDONESIA by Ta Larasati, Ahmad Irzal Fardiansyah, Dwi Saketi, Azelia Nusa Dewiarti

    Published 2024-10-01
    “…The use of electronic medical records raises concerns about potential data leaks, necessitating the establishment of security measures and identification of responsible parties in case of breaches. …”
    Get full text
    Article
  3. 3063

    Participation of Citizens in Pre-Trial Hearings. Review of an Experiment in the Netherlands by Barbara Brink, Albert T. Marseille

    Published 2014-10-01
    “…In 2011 the Dutch Central Appeals Tribunal, the highest Dutch court of appeal in legal areas pertaining to social security and the civil service, started consulting the parties of a dispute at an early stage in the procedure, in order to include them in the decisions about the procedural steps to be taken in the settlement of the appeal. …”
    Get full text
    Article
  4. 3064

    The Application and Analysis of Emotion Recognition Based on Modern Technology by Bi Lanxin

    Published 2025-01-01
    “…Despite the growing application of emotion recognition technology across various fields, including healthcare, traffic safety, and security, there remain significant challenges related to accuracy, robustness, and privacy. …”
    Get full text
    Article
  5. 3065

    A Method of Intrusion Detection Based on WOA-XGBoost Algorithm by Yan Song, Haowei Li, Panfeng Xu, Dan Liu

    Published 2022-01-01
    “…However, computer viruses and malicious network attacks make network security face huge challenges, and more accurate detection of attacks has become the focus of attention to current computer fields. …”
    Get full text
    Article
  6. 3066

    Armenia Towards a "New Economy": Defense Industry by A. B. Harutyunyan

    Published 2021-04-01
    “…As a small country, Armenia needs an economy-army coalesced “intelligent” system that will respond adequately to any, even the slightest threat to the country's security. This approach requires the development of indigenous defense industry. …”
    Get full text
    Article
  7. 3067

    MILITARY INTERVENTIONSAND THE NIGERIA FOURTH REPUBLIC: A REFLECTION DISCOURSE by Stella Ughulu Eghoikhunu, Ihaza Kayode

    Published 2023-08-01
    “…The study recommends that there should be a conscious effort on the part of leaders of the nation to improve the socio-economic development of the country and more funding and training of the agencies/forces responsible for internal security. …”
    Get full text
    Article
  8. 3068

    Design of Mobile Gateway for Implementation of Smart Work System by Sang-Young Oh, Bong-Hyun Kim

    Published 2015-01-01
    “…For this reason, I have developed a mobile gateway that is based on the communication server construction OPEN API development, management of mobile ID, protocol design, and design of SSL/TLS security tunnel. Also, we developed a smart work platform that you apply this, you are trying to provide information systems environment of mobile company.…”
    Get full text
    Article
  9. 3069
  10. 3070

    The Food Safety Modernization Act of 2011 – Proposed Rule for Preventive Controls for Human Food by Soohyoun Ahn, Keith R. Schneider, Michelle D. Danyluk, Renee Goodrich-Schneider

    Published 2014-09-01
    “…FSMA aims to ensure the safety and security of the US food supply by focusing on preventing food safety problems rather than responding after they occur. …”
    Get full text
    Article
  11. 3071

    EMPIRICAL ANALYSIS OF THE PROFITABILITY AND INDEBTEDNESS IN LISTED COMPANIES – EVIDENCE FROM THE FEDERATION OF BIH by Dragan Gabrić

    Published 2015-11-01
    “… Research on relationship between profitability and indebtedness is an interesting scientific and professional question because it is the basic criterion of performance and security in business. The aim of this paper is to examine the and determine the level of correlation between profitability and indebtedness, and to research the differences in the level of regarding company's profitability. …”
    Get full text
    Article
  12. 3072
  13. 3073

    Marketing strategies of economic entities (on the example of persons carrying out activities in the field of customs business) by S. V. Kurikhin

    Published 2022-11-01
    “…In addition, the results can be useful in the educational process, when teaching such disciplines as Marketing and Economic security of an enterprise participating in foreign economic activity. …”
    Get full text
    Article
  14. 3074

    RADIO FREQUENCY DATA IDENTIFICATION TECHNOLOGY: POTENTIAL FOR USE IN FASHION INDUSTRY SUPPLY CHAINS by N. Yu. Barkova, O. A. Borodina

    Published 2020-09-01
    “…The technology can be used to increase the transparency and security of supply chains, marketing research and in other areas. …”
    Get full text
    Article
  15. 3075

    Automata-Based Analysis of Stage Suspended Boom Systems by Anping He, Jinzhao Wu, Shihan Yang, Yongquan Zhou, Juan Wang

    Published 2013-01-01
    “…A stage suspended boom system is an automatic steeve system orchestrated by the PLC (programmable logic controller). Security and fault-recovering are two important properties. …”
    Get full text
    Article
  16. 3076

    Enhanced Invisibility and Robustness of Digital Image Watermarking Based on DWT-SVD by Ali Alzahrani

    Published 2022-01-01
    “…In research, a system is being developed to handle veracious types of watermarked attacks, for obtaining extreme security and an adequate level of visibility and robustness. …”
    Get full text
    Article
  17. 3077
  18. 3078

    Éclairages foucaldiens sur l’incrimination du déisme et de la libre pensée dans la jeune République américaine by Auréliane Narvaez

    Published 2022-12-01
    “…Undermining deism thus hinged on security and sanitary discourses that associated religious infidelity with anarchy, criminality, and even insanity. …”
    Get full text
    Article
  19. 3079

    Analysis of the Time Series Generated by a New High-Dimensional Discrete Chaotic System by Chuanfu Wang, Chunlei Fan, Kai Feng, Xin Huang, Qun Ding

    Published 2018-01-01
    “…In this study, a digital sequence generator based on a high-dimensional chaotic system is proposed to ensure performance and security. The proposed generator has low resource consumption, and the digital pseudo-random output sequence has a large period. …”
    Get full text
    Article
  20. 3080

    « Faire un tri dans le monde des applis » by Esteban Bopp, Johnny Douvinet, Damien Serre

    Published 2018-12-01
    “…Results obtained on 50 applications deployed in France show that most of them do no achieve the objectives of the alert, in the sense defined by civil security, due to a single-hazard approach, a unique sense of communication, and a low participation of the smartphone users. …”
    Get full text
    Article