Suggested Topics within your search.
Suggested Topics within your search.
- Security measures 6
- Computer security 4
- Computer networks 3
- Economic aspects 3
- Globalization 3
- Management 3
- Data protection 2
- Economic conditions 2
- Economic development 2
- Economic policy 2
- Handbooks, manuals, etc 2
- Prevention 2
- Technological innovations 2
- Agricultural laws and legislation 1
- Automobiles 1
- BUSINESS & ECONOMICS / Development / Economic Development 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / International / Economics 1
- Big data 1
- Biotechnology 1
- Bioterrorism 1
- Brothers and sisters 1
- Climate change mitigation 1
- Cyberterrorism 1
- Digital watermarking 1
- Education 1
- Elias (Fictitious character) 1
- Ethnoscience 1
- Family policy 1
- Fantasy 1
-
5261
The Effect of the Russian Subnational Debt on the Socio-economic Development of the Region
Published 2017-12-01“…Used methods of system analysis, comparison and clustering.The result is proved in the article that on the one hand the issue of securities does not stimulate socio-economic development of the region, on the other hand in the current situation, the desired reduction provide budget loans should pay attention of regions in the possible form of borrowing. …”
Get full text
Article -
5262
SYSTEMATIC RISK ASSESMENT USING OLS METHOD - THE CASE OF THE CAPITAL MARKET OF BOSNIA AND HERZEGOVINA
Published 2012-05-01“…This capital market is new and underdeveloped, with a modest supply of securities and with a small number of marketable securities. …”
Get full text
Article -
5263
An Analysis of Indonesia’s Free and Active COVID-19 Vaccine Diplomacy
Published 2022-04-01“…Amid a global rush for vaccines, Indonesia has had to compete with other countries to secure vaccines to protect its people from the infection of COVID-19. …”
Get full text
Article -
5264
Co-producing a safe mobility and falls informatics platform to drive meaningful quality improvement in the hospital setting: a mixed-methods protocol for the insightFall study
Published 2025-02-01“…The data to be included in the informatics platform will be curated from electronic health records and incident reports within an existing secure data environment, with appropriate data access approvals and controls. …”
Get full text
Article -
5265
The Subjective Vitality of Female Students: The Role of Attachment Styles and Alienation from Parents with the Mediation of Basic Psychological Needs
Published 2024-11-01“…A positive relationship was found between secure style and basic psychological needs with the Subjective vitality of female students; this relationship between avoidant and ambivalent styles and alienation from parents was negative (P < 0.01). …”
Get full text
Article -
5266
Defend Against Property Inference Attack for Flight Operations Data Sharing in FedMeta Framework
Published 2025-01-01“…Our contribution lies in the development of a secure and efficient data-sharing solution for flight operations data, which has the potential to revolutionize the aviation industry.…”
Get full text
Article -
5267
Effect of friction on levelling of the maxillary canine with NiTi superelastic wire - an in silico experiment using a finite element method
Published 2024-10-01“…When the wire is ligated securely to the bracket, additional friction is generated, hindering the levelling process.…”
Get full text
Article -
5268
Iterative algorithms with seminorm-induced oblique projections
Published 2003-01-01“…Existence and uniqueness of such projections are secured via directional affinity of the sets with respect to the diagonal matrices involved. …”
Get full text
Article -
5269
Research on reliability of pulsed electrothermal propulsion system of nanosatellite
Published 2021-12-01“…In the paper have been discussed nanosetellite propulsion system normalization actual themes, as well their acknowledgement by the testing results. To secure needed survival probability P≥0,995, the propulsion system bottlenecks normalized values are defined. …”
Get full text
Article -
5270
Synchronization for a Class of Fractional-Order Hyperchaotic System and Its Application
Published 2012-01-01“…Furthermore, this control scheme can be used in secure communication via the technology of chaotic masking using the complex nonperiodic information as trial message, and the useful information can be recovered at the receiver. …”
Get full text
Article -
5271
Application of Securitization of Leasing Assets
Published 2014-04-01“…These securities can be bonds, actions or bills. Thus the asset leased, acts as providing these papers. …”
Get full text
Article -
5272
Du mythe de l’efficience des marchés au krach
Published 2010-12-01“…This diagnosis naturally suggests some reforms which aim to secure market liquidity. Among them, a flagship measure considered during the last few months is to standardize asset backed securities so as to encourage increased trading in the secondary market. …”
Get full text
Article -
5273
Games and gamers: the influence of participating players on the process and outcome of regional spatial energy games
Published 2025-01-01“…Our approach assigns different attributes to individual players which secures that the game is played from various perspectives and by actual stakeholders. …”
Get full text
Article -
5274
Whole of Government: An Effective Strategy for Ensuring Child Support Post-Religious Court Rulings
Published 2024-10-01“…This research aims to evaluate how well the 'Whole of Government Response' strategy works in securing post-divorce child support.…”
Get full text
Article -
5275
Study on Chaotic Fault Tolerant Synchronization Control Based on Adaptive Observer
Published 2014-01-01“…Finally, the proposed synchronization schemes are applied to secure communication system successfully. The experimental results demonstrate that the employed observer can manage real-time fault diagnosis and parameter identification as well as states tracing of the master system, and so the synchronization of master system and slave system is achieved.…”
Get full text
Article -
5276
GENERATION OF DECELERATION PULSES OF THE TROLLEY IN CHILD RESTRAINT SYSTEMS’ DYNAMIC TESTS BASED ON SIMULATIONS AND EXPERIMENTAL VALIDATIONS
Published 2021-10-01“… As one of devices for passive safety, child restraint system remains a positive factor in securing the safety of child occupants in vehicles’ collisions. …”
Get full text
Article -
5277
MILESTONES OF PERSONNEL MANAGEMENT SCIENCE IN RUSSIA
Published 2016-02-01“…Finally, there is modern HR service function list presented. Such a list secure successful enterprises functioning for today.…”
Get full text
Article -
5278
Keeping a Household Inventory and Protecting Valuable Records
Published 2003-07-01“…You will, if you: keep an up-to-date household inventory and keep this and other valuable documents in a secure location. This publication provides details about these two tasks. …”
Get full text
Article -
5279
ACTUAL PROBLEMS OF PERSONNEL POLICY AT THE ENTERPRISES OF PASSENGER MOTOR TRANSPORT
Published 2016-06-01“…The role of the labor potential in securing and improving the competitiveness of the passenger motor transportation enterprises. …”
Get full text
Article -
5280
FARMERS AND HERDERS CONFLICT: THE CASE OF OMALA LOCAL GOVERNMENT AREA
Published 2023-08-01“…The study recommended among other things that the crisis would be averted if the government can secure appropriate ranches for the herders to graze their cattle. …”
Get full text
Article