Showing 3,561 - 3,580 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 3561

    Assessment of the living standard of elderly people and their well-being in a changing social environment by R. M. Sadykov

    Published 2024-03-01
    “…Their poverty is determined by a decline in living standards and material security, rising inflation, and the high cost of medical care along with utilities. …”
    Get full text
    Article
  2. 3562

    Anattempt to rebuild the world "in the American way" by A. D. Bogaturov

    Published 2021-11-01
    “…The UN’s reform and the Security Council, where the three great powers primarily make decisions, are still questioned. …”
    Get full text
    Article
  3. 3563

    HUMAN RESOURCE MANAGEMENT PRACTICES AND POLICIES AND EMPLOYEE ORGANIZATIONAL COMMITMENT IN BOSNIA AND HERZEGOVINA COMPANIES by Isada Mahmutović, Adisa Delić

    Published 2022-05-01
    “…The paper aimed at examining the impact of   characteristics, organizational characteristics, and HRM practices focused on performance appraisal, job security, employee participation, and career planning on employee organizational commitment in BiH companies with more than 50 employees in four sectors. …”
    Get full text
    Article
  4. 3564

    Decline of post-neoliberal regionalism in South America: Weaknesses of “pink tide” political leadership on Defense policies by Emilse Eliana Calderón

    Published 2020-09-01
    “…Finally, evidence is provided that shows that domestic variables played a crucial role in accounting for the demise of this new regional security model. Structural internal weaknesses within the regional States also played a major part in limiting the capacity of political leaders to sustain their control over Defense policies. …”
    Get full text
    Article
  5. 3565

    Consumer Protection in TikTok Shop Sale Transactions Based on Law Number 8 of 1999 by Rita Defriza

    Published 2024-12-01
    “…The law provides fundamental rights for consumers, such as the right to security, accurate information, and compensation for non-conforming products. …”
    Get full text
    Article
  6. 3566

    Anomaly Detection in IoMT Environment Based on Machine Learning: An Overview by Peyman Vafadoost Sabzevar, Hamidreza Rokhsati, Alireza Chamansara, Ahmad Hajipour

    Published 2024-12-01
    “…One of the important areas that require online monitoring is medical imaging equipment, whose functional information is transmitted through the Internet of Things. Server security and intrusion prevention, along with anomaly detection, are critical requirements for these networks. …”
    Get full text
    Article
  7. 3567

    Reconfigurable Antenna Assisted Intrusion Detection in Wireless Networks by Prathaban Mookiah, John M. Walsh, Rachel Greenstadt, Kapil R. Dandekar

    Published 2013-10-01
    “…The results show that the proposed scheme can add an additional layer of security that can significantly alleviate many vulnerabilities and threats in current fixed wireless networks.…”
    Get full text
    Article
  8. 3568
  9. 3569

    Analysing the manipulation of the youths, election violence and democratic retrogression in South Africa by Ibrahim Yusuf Didamson

    Published 2025-01-01
    “…Rather than replicating the character of the youths of the 1970s who fought for better education and life as well as the freedom of the black population during the dark days of apartheid, some youths have taken to drugs, election violence while others have become personal security to top politicians owing to difficult economic hardship. …”
    Get full text
    Article
  10. 3570

    Commissariats of Military Industry during the Great Patriotic War by Yu. V. Il’In

    Published 2015-04-01
    “…The price of enormous effort of labor, research and design teams, huge material and financial costs in the course of the prewar five-year plans in the Soviet Union was paid and incurred to create the military-industrial complex (MIC) - sector of social production, designed to provide security for the state in armed struggle. The core of the DIC were four industry: Commissariat of Aviation Industry (NCAP), the People’s Commissariat of ammunition (NBC) weapons Commissariat (IEC) and the People's Commissariat of the shipbuilding industry (NCSP), formed in accordance with the Decree of the Presidium of the Supreme Soviet on January 11, 1939 by separation of the People's Commissariat of Defense Industry of the USSR. …”
    Get full text
    Article
  11. 3571

    Digital currency of the Central bank in Russia and in the world: current status and development prospects by D. V. Baranov, P. S. Shcherbachenko

    Published 2024-06-01
    “…Special attention is given to identifying such advantages of digital currencies over conventional ones as independence, security, transparency and the possibility of using smart contracts. …”
    Get full text
    Article
  12. 3572
  13. 3573

    Oath-Taking, Peacebuilding and Conflict Resolution in Traditional African Society: The Izzi Example by Kelechi Johnmary Ani, Anselm Aleke Oyon

    Published 2024-12-01
    “…Over the ages, African men have continued to search for peace and security in their immediate environment. Hence, to ensure that man lives safely and peacefully, the forefathers of different African societies invented the culture of oath-taking as a means of survival. …”
    Get full text
    Article
  14. 3574

    Assessment the Vulnerability of Infrastructures in Ardabil City in terms of passive defense by Mohammad Hasan Yazdani, saidain

    Published 2017-03-01
    “…At the moment with regard to geopolitical and geostrategic situation of Iran, the existence of countless underground resources and the formation of ideological state, unfortunately, in urban areas of the country, especially in Ardabil ,because of its proximity to the border of northern and northwestern borders with knowledge of this particular situation, economic and infrastructural projects, Infrastructures and installations have been made without observing and interference of considerations and defense and security arrangements and have become a bare and significant available target for enemy and invading countries. …”
    Get full text
    Article
  15. 3575

    Exploring In-Network Computing with Information-Centric Networking: Review and Research Opportunities by Marica Amadeo, Giuseppe Ruggeri

    Published 2025-01-01
    “…We review state-of-the-art advancements involving INC and ICN, addressing critical topics such as service naming, executor selection strategies, compute reuse, and security. Furthermore, we discuss key challenges and propose research directions for deploying INC via ICN, thereby outlining a cohesive roadmap for future investigation.…”
    Get full text
    Article
  16. 3576

    Optimizarea generării de itinerarii pentru ghizi turistici autonomi prin integrarea datelor în timp real în algoritmi genetici by Cristian SANDU, Luminița DUMITRIU, Ioan ȘUȘNEA

    Published 2024-12-01
    “…Research in the field of autonomous vehicles has made good progress in the last years, but mass adoption is unlikely to happen very soon due to, in most part, important ethical and security concerns. The authors consider that niche uses of autonomous vehicles are more likely to be researched and developed, since they can substantially make an immediate difference in specific applications. …”
    Get full text
    Article
  17. 3577

    Legal Protection of Innovations in the Regime of Commercial Secrets, Industrial Property: Comparative Analysis by L. D. Rudenko

    Published 2020-06-01
    “…The legal regime of industrial property is a legal monopoly, as it provides the receipt of a security document (patent, declaratory patent). The trade secret regime is provided by a de facto monopoly, as it is ensured by the application of certain protective measures. …”
    Get full text
    Article
  18. 3578

    Identification of bald patches in degraded alpine meadows by UAV-based remote sensing and deep learning by Lu Wang, Lulu Cui, Zihan Song, Min Zheng, Chengyi Li, Xilai Li

    Published 2024-12-01
    “…Alpine meadow patchiness is the starting point and an important feature of the formation of ‘Black Beach’ on the Tibetan Plateau, which directly threatens regional ecological security and economic development. Therefore, exploring an efficient, rapid and accurate method for identifying bald patches in degraded alpine meadows is of great significance for the dynamic monitoring and rational utilization in the grassland region. …”
    Get full text
    Article
  19. 3579

    Leveraging Deep Learning for Real-Time Coffee Leaf Disease Identification by Opeyemi Adelaja, Bernardi Pranggono

    Published 2025-01-01
    “…The findings lay the groundwork for the development of practical and efficient systems that can assist coffee growers in disease management, promoting sustainable farming practices, and food security.…”
    Get full text
    Article
  20. 3580

    Innovative strategies for pollution assessment in Northern Bangladesh: Mapping pollution areas and tracing metal(loid)s sources in various soil types. by Abdullah Al Yeamin, Md Yousuf Mia, Shahidur R Khan, M Safiur Rahman, Venkatramanan Senapathi, Abu Reza Md Towfiqul Islam, Tasrina Rabia Choudhury

    Published 2025-01-01
    “…These results emphasize the need for stringent measures to reduce industrial emissions and remediate soil contamination in order to improve soil quality and food security.…”
    Get full text
    Article