Showing 5,261 - 5,280 results of 5,943 for search '"security"', query time: 0.05s Refine Results
  1. 5261

    The Effect of the Russian Subnational Debt on the Socio-economic Development of the Region by O. I. Larina, N. V. Moryzhenkova

    Published 2017-12-01
    “…Used methods of system analysis, comparison and clustering.The result is proved in the article that on the one hand the issue of securities does not stimulate socio-economic development of the region, on the other hand in the current situation, the desired reduction provide budget loans should pay attention of regions in the possible form of borrowing. …”
    Get full text
    Article
  2. 5262

    SYSTEMATIC RISK ASSESMENT USING OLS METHOD - THE CASE OF THE CAPITAL MARKET OF BOSNIA AND HERZEGOVINA by Azra Zaimović

    Published 2012-05-01
    “…This capital market is new and underdeveloped, with a modest supply of securities and with a small number of marketable securities. …”
    Get full text
    Article
  3. 5263

    An Analysis of Indonesia’s Free and Active COVID-19 Vaccine Diplomacy by Raden Mas Try Ananto Djoko Wicaksono, Fajar Bambang Hirawan, Safendrri Komara Ragamustari

    Published 2022-04-01
    “…Amid a global rush for vaccines, Indonesia has had to compete with other countries to secure vaccines to protect its people from the infection of COVID-19. …”
    Get full text
    Article
  4. 5264

    Co-producing a safe mobility and falls informatics platform to drive meaningful quality improvement in the hospital setting: a mixed-methods protocol for the insightFall study by Ben Glampson, Clare Leon-Villapalos, Erik Mayer, Rachael Lear, Phoebe Averill, Catalina Carenzo, Rachel Tao, Robert Latchford

    Published 2025-02-01
    “…The data to be included in the informatics platform will be curated from electronic health records and incident reports within an existing secure data environment, with appropriate data access approvals and controls. …”
    Get full text
    Article
  5. 5265

    The Subjective Vitality of Female Students: The Role of Attachment Styles and Alienation from Parents with the Mediation of Basic Psychological Needs by parvaneh alaie, Ladan Vaghef, fatemeh Nadimi

    Published 2024-11-01
    “…A positive relationship was found between secure style and basic psychological needs with the Subjective vitality of female students; this relationship between avoidant and ambivalent styles and alienation from parents was negative (P < 0.01). …”
    Get full text
    Article
  6. 5266

    Defend Against Property Inference Attack for Flight Operations Data Sharing in FedMeta Framework by Jin Lei, Weiyun Li, Meng Yue, Zhijun Wu

    Published 2025-01-01
    “…Our contribution lies in the development of a secure and efficient data-sharing solution for flight operations data, which has the potential to revolutionize the aviation industry.…”
    Get full text
    Article
  7. 5267

    Effect of friction on levelling of the maxillary canine with NiTi superelastic wire - an in silico experiment using a finite element method by Rikou Miyawaki, Yukiko Yokoi

    Published 2024-10-01
    “…When the wire is ligated securely to the bracket, additional friction is generated, hindering the levelling process.…”
    Get full text
    Article
  8. 5268

    Iterative algorithms with seminorm-induced oblique projections by Yair Censor, Tommy Elfving

    Published 2003-01-01
    “…Existence and uniqueness of such projections are secured via directional affinity of the sets with respect to the diagonal matrices involved. …”
    Get full text
    Article
  9. 5269

    Research on reliability of pulsed electrothermal propulsion system of nanosatellite by V. N. Blinov, V. V. Kositsin, A. I. Lukyanchik, P. V. Stepen, P. S. Yachmenev

    Published 2021-12-01
    “…In the paper have been discussed nanosetellite propulsion system normalization actual themes, as well their acknowledgement by the testing results. To secure needed survival probability P≥0,995, the propulsion system bottlenecks normalized values are defined. …”
    Get full text
    Article
  10. 5270

    Synchronization for a Class of Fractional-Order Hyperchaotic System and Its Application by Wen Tan, Feng Ling Jiang, Chuang Xia Huang, Lan Zhou

    Published 2012-01-01
    “…Furthermore, this control scheme can be used in secure communication via the technology of chaotic masking using the complex nonperiodic information as trial message, and the useful information can be recovered at the receiver. …”
    Get full text
    Article
  11. 5271

    Application of Securitization of Leasing Assets by I. V. Linev

    Published 2014-04-01
    “…These securities can be bonds, actions or bills. Thus the asset leased, acts as providing these papers. …”
    Get full text
    Article
  12. 5272

    Du mythe de l’efficience des marchés au krach by David Bourghelle, Pauline Hyme

    Published 2010-12-01
    “…This diagnosis naturally suggests some reforms which aim to secure market liquidity. Among them, a flagship measure considered during the last few months is to standardize asset backed securities so as to encourage increased trading in the secondary market. …”
    Get full text
    Article
  13. 5273

    Games and gamers: the influence of participating players on the process and outcome of regional spatial energy games by Hartmut Dumke, Pia Nabielek

    Published 2025-01-01
    “…Our approach assigns different attributes to individual players which secures that the game is played from various perspectives and by actual stakeholders. …”
    Get full text
    Article
  14. 5274

    Whole of Government: An Effective Strategy for Ensuring Child Support Post-Religious Court Rulings by Istiqomah Sinaga, Asmuni Asmuni, Dhiauddin Tanjung

    Published 2024-10-01
    “…This research aims to evaluate how well the 'Whole of Government Response' strategy works in securing post-divorce child support.…”
    Get full text
    Article
  15. 5275

    Study on Chaotic Fault Tolerant Synchronization Control Based on Adaptive Observer by Dongming Chen, Xinyu Huang, Tao Ren

    Published 2014-01-01
    “…Finally, the proposed synchronization schemes are applied to secure communication system successfully. The experimental results demonstrate that the employed observer can manage real-time fault diagnosis and parameter identification as well as states tracing of the master system, and so the synchronization of master system and slave system is achieved.…”
    Get full text
    Article
  16. 5276

    GENERATION OF DECELERATION PULSES OF THE TROLLEY IN CHILD RESTRAINT SYSTEMS’ DYNAMIC TESTS BASED ON SIMULATIONS AND EXPERIMENTAL VALIDATIONS by ZHE WEI

    Published 2021-10-01
    “… As one of devices for passive safety, child restraint system remains a positive factor in securing the safety of child occupants in vehicles’ collisions. …”
    Get full text
    Article
  17. 5277

    MILESTONES OF PERSONNEL MANAGEMENT SCIENCE IN RUSSIA by Y. Proshina

    Published 2016-02-01
    “…Finally, there is modern HR service function list presented. Such a list secure successful enterprises functioning for today.…”
    Get full text
    Article
  18. 5278

    Keeping a Household Inventory and Protecting Valuable Records by Regina Fegan, Michael T. Olexa

    Published 2003-07-01
    “…You will, if you: keep an up-to-date household inventory and keep this and other valuable documents in a secure location. This publication provides details about these two tasks. …”
    Get full text
    Article
  19. 5279

    ACTUAL PROBLEMS OF PERSONNEL POLICY AT THE ENTERPRISES OF PASSENGER MOTOR TRANSPORT by Y. Proshina

    Published 2016-06-01
    “…The role of the labor potential in securing and improving the competitiveness of the passenger motor transportation enterprises. …”
    Get full text
    Article
  20. 5280

    FARMERS AND HERDERS CONFLICT: THE CASE OF OMALA LOCAL GOVERNMENT AREA by Fidelis Achoba, Mercy Ura Abraham

    Published 2023-08-01
    “…The study recommended among other things that the crisis would be averted if the government can secure appropriate ranches for the herders to graze their cattle. …”
    Get full text
    Article