Showing 3,601 - 3,620 results of 5,943 for search '"security"', query time: 0.05s Refine Results
  1. 3601

    Global sustainable development programs: Challenges to the achievement of the goals by V. P. Vasiliev

    Published 2024-09-01
    “…Meanwhile, failure to implement the SDGs is fraught with a sharp aggravation of the problems of global inequality, food security and climate migration, especially dangerous for the most vulnerable groups of the population. …”
    Get full text
    Article
  2. 3602

    SOIL COMPACTION AND ITS IMPACT ON SOIL PROPERTIES, MICROBIOME, GREENHOUSE GAS EMISSION AND PLANT ROOT GROWTH by Poonam Bhatt, Prashant Raj Giri, Balchisu Napari

    Published 2024-06-01
    “…This comprehensive review paper contributes valuable insights for designing sustainable agricultural practices prioritizing soil health, ecosystem resilience, and food security.…”
    Get full text
    Article
  3. 3603

    Regulating Working Hours in the Transition to Flexible Work by Olena Lutsenko, Anatolii P. Getman, Vladyslav S. Tkachenko, Ehor S. Nazymko

    Published 2024-12-01
    “…The findings offer recommendations for reforming Ukraine’s labor laws, aligning them with global trends, and advancing education in labor law and social security disciplines.…”
    Get full text
    Article
  4. 3604

    VALUE CHAIN IN AGRICULTURE: THE CASE OF THE EUROPEAN UNION by Sanja Franc, Vlatka Bilas, Lana Trifunić

    Published 2021-05-01
    “…Through a deduction method, certain conclusions were made about the state of the EU food system as well as demand and supply trends in order to provide a broader understanding of the food security and the significance of agricultural sector in general. …”
    Get full text
    Article
  5. 3605
  6. 3606

    ABOUT DATA MODELING SUBJECT DOMAINS PRACTICE-ORIENTED DIRECTION FOR UNIVERSAL SYSTEM OF STORAGE AND PROCESSING DATA by L. V. Rudikova, E. V. Zhavnerko

    Published 2017-11-01
    “…Offered appropriate data models, considered relationship between them as data processing and data warehouse creation, which can be built on information data storage technology and which has some characteristics as extensible complex subject domain, data integration, which get from any data sources, data time invariance with required temporal marks, relatively high data stability, search necessary compromises in data redundancy, system blocks modularity, flexibility and extensibility of architecture, high requirements to data storage security. It’s proposed general approach of data collection and data storage, appropriate data models, in the future, will integrate in one database scheme and create generalized scheme of data warehouse as type «constellation of facts». …”
    Get full text
    Article
  7. 3607

    Covert Network Analysis for Key Player Detection and Event Prediction Using a Hybrid Classifier by Wasi Haider Butt, M. Usman Akram, Shoab A. Khan, Muhammad Younus Javed

    Published 2014-01-01
    “…National security has gained vital importance due to increasing number of suspicious and terrorist events across the globe. …”
    Get full text
    Article
  8. 3608

    FARMERS-HERDERS CONFLICTS AND FOOD INSECURITY IN NIGERIA by DAUPAMOWEI HENRY ASANEBI

    Published 2024-05-01
    “…Furthermore, given the rise in tensions between farmers and herdsmen and the significant implications for the nation, the study recommends the Nigerian government enact stringent agricultural policies that support agricultural activities in order to ensure food security while also providing grazing lands for herders in their area. …”
    Get full text
    Article
  9. 3609

    Operational Risk Assessment of Distribution Network Equipment Based on Rough Set and D-S Evidence Theory by Cunbin Li, Gefu Qing, Peng Li, Tingting Yin

    Published 2013-01-01
    “…Therefore, scientific assessment of power distribution equipment operation risk is significant to the security of power distribution system. In order to get the satisfactory assessment conclusions from the complete and incomplete information and improve the assessment level, an operational risk assessment model of distribution network equipment based on rough set and D-S evidence theory was built. …”
    Get full text
    Article
  10. 3610

    How to Develop Renewable Power in China? A Cost-Effective Perspective by Rong-Gang Cong, Shaochuan Shen

    Published 2014-01-01
    “…To address the problems of climate change and energy security, Chinese government strived to develop renewable power as an important alternative of conventional electricity. …”
    Get full text
    Article
  11. 3611

    Status of Biomass Derived Carbon Materials for Supercapacitor Application by Talam Kibona Enock, Cecil K. King’ondu, Alexander Pogrebnoi, Yusufu Abeid Chande Jande

    Published 2017-01-01
    “…Environmental concerns and energy security uncertainties associated with fossil fuels have driven the world to shift to renewable energy sources. …”
    Get full text
    Article
  12. 3612

    A systematised review and evidence synthesis on the broader societal impact of vaccines against Salmonella by Ezgi Dilek Demirtas, Rosanna Barnard, Jungseok Lee, Mark Jit

    Published 2025-02-01
    “…Despite variations in study design, methodology, and study quality, salmonellae infections were largely associated with negative broader societal impacts, including detriments in childhood physical development (very weak association), childhood educational development (strong to very strong association), household security (moderate association), public health spending (moderate association), and national income (moderate to strong association). …”
    Get full text
    Article
  13. 3613

    FOREIGN AID TO UKRAINE AFTER 2014: VOLUMES, PROJECTS AND DONORS’ MOTIVATION by O. V. Shishkina

    Published 2018-11-01
    “…While multilateral institutions tend to address the needs of Ukrainian economy by funding the reforms and infrastructure, donor states pay more attention to their long-term strategic and economic interests. They fund nuclear security and non-proliferation, support defense, law enforcement and border control agencies, encourage civil society and media development, consult agricultural sector and bilateral trade. …”
    Get full text
    Article
  14. 3614

    Missed, but Momentous: A Comprehensive Review of Neglected Tropical Skin Diseases in Southern India and their Global Impact by Ramesha M Bhat, N Swathi

    Published 2025-01-01
    “…By prioritizing NTD control in South India, we can collectively alleviate local suffering and contribute to global health security and equity, charting a course toward a healthier, more resilient world.…”
    Get full text
    Article
  15. 3615

    Optimal SES Selection Based on SVD and Its Application to Incipient Bearing Fault Diagnosis by Longlong Li, Yahui Cui, Runlin Chen, Xiaolin Liu

    Published 2018-01-01
    “…To distinguish the incipient fault of bearing before it steps into serious failure is the main task of condition monitoring and fault diagnosis technology which could guarantee the reliability and security of rotating machinery. The early defect occurring in the REB is too weak and manifests itself in heavy surrounding noise, thus leading to the inefficiency of the fault detection techniques. …”
    Get full text
    Article
  16. 3616

    Religious Investor Sentiment, Shariah Compliance Impact, and Theological Risk: Evidence from Bursa Malaysia by Murat Yaş, Mohamed Eskandar Shah Mohd Rasid, Ahmet Faruk Aysan, Saad Azmat

    Published 2024-08-01
    “…Employing the market model in an event study approach and using data from Malaysian firms between 2000 and 2016, the study focuses on 30 announcements from the Security Commission Malaysia’s List of Shariah Compliant Securities (LSCS), resulting in 370 additions and 284 deletions from the compliance list. …”
    Get full text
    Article
  17. 3617

    Exploring Age and Gender Differences in ICT Cybersecurity Behaviour by Dawn Branley-Bell, Lynne Coventry, Matt Dixon, Adam Joinson, Pam Briggs

    Published 2022-01-01
    “…Older users appear less likely to secure their devices compared to younger users; however, the reverse was found for the other behaviours, with older users appearing more likely to generate secure passwords and show proactive risk awareness and regularly install updates. …”
    Get full text
    Article
  18. 3618
  19. 3619

    Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version by M. Rajesh Babu, S. Moses Dian, Siva Chelladurai, Mathiyalagan Palaniappan

    Published 2015-01-01
    “…Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. …”
    Get full text
    Article
  20. 3620

    Evaluation of Blockchain Technology for Supply Chains using an Integrated Fuzzy Cognitive Map-QFD Methodology by Emre Alptekin, Ayça Maden

    Published 2024-06-01
    “…The results of this study show that the top priorities for blockchain characteristics in a supply chain are smart contract functionality, privacy, transaction per second, tokenization, security, permissioned network, scalability, cost, modularity, and licensing, in order of importance.…”
    Get full text
    Article