Showing 5,601 - 5,620 results of 5,943 for search '"security"', query time: 0.05s Refine Results
  1. 5601

    Analysis of Annual Total Revenues of the Iraqi National Insurance Company by Ghadhanfer A. Hussein, Ameen Al Htibat

    Published 2024-03-01
    “…This is necessary to secure their development and reliability. The current study intends to analyse the annual total data of different types revenues of Iraqi National Insurance company besides investigating the elements that influence the insurance income during 2010–2015. …”
    Get full text
    Article
  2. 5602

    Bonds, Bondholders Protection and Asset Allocation of Multimarket Funds by Thayse Machado Guimarães, Rodrigo Fernandes Malaquias

    Published 2020-01-01
    “…This research comprised 926 debentures series issued in Brazil from 2009 to 2017, and 1,753 multimarket funds, which allocated some portfolios’ percentage in these securities. In creating the BPI, we contemplated 15 restrictive clauses, which the most common correspond to negligent business performance, liquidation, dissolution and bankruptcy, and restrictions related to company structure. …”
    Get full text
    Article
  3. 5603

    RELATIVE EFFICACY OF THE CAPITAL MARKET OVER THE MONEY MARKET IN A GROWTH-FINANCING ECONOMY by Adedeji Daniel Gbadebo

    Published 2023-10-01
    “…The study uses data from the Central Bank of Nigerian and Securities and Exchange Commission Bulletins between from 1981 and 2020. …”
    Get full text
    Article
  4. 5604

    Hierarchical Factor Analysis Methodology for Intelligent Manufacturing by Hyun Sik Sim

    Published 2021-01-01
    “…Because the micromanufacturing process involves manufacturing products through multiple steps, it is difficult to determine the process or equipment that has encountered failure, which can lead to difficulty in securing high yields. This study presents a structural model for building a factory integration system to analyze big data at manufacturing sites and a hierarchical factor analysis methodology to increase product yield and quality in an intelligent manufacturing environment. …”
    Get full text
    Article
  5. 5605

    Development and Testing of Road Signs Alert System Using a Smart Mobile Phone by Eric M. Masatu, Ramadhani Sinde, Anael Sam

    Published 2022-01-01
    “…Furthermore, the system application was secured by limiting access to the application program interface key to avoid unauthorized access to sensitive information.…”
    Get full text
    Article
  6. 5606

    Utilizing Diagnostic Musculoskeletal Ultrasound for Assessment of the Infraspinatus Muscle and Tendon: Implications for Rehabilitation Professionals by Robert C Manske, Michael Voight, Chris Wolfe, Phil Page

    Published 2024-07-01
    “…The rotator cuff, comprising the subscapularis, supraspinatus, infraspinatus, and teres minor muscles, plays a crucial role in stabilizing the glenohumeral joint by securing the head of the humerus within the glenoid cavity of the scapula. …”
    Get full text
    Article
  7. 5607

    A case series on the basic concept and design of removable partial dentures: support and bracing considerations by Jun Takebe

    Published 2025-01-01
    “…Therefore, it is essential to emphasize the importance of providing patients with appropriate, safe, and secure removable partial dentures and have clinicians rerecognize the concept and importance of support and bracing. …”
    Get full text
    Article
  8. 5608

    Internet marketing organization with the use of intellegent and block chain technologies by U. A. Vishniakou

    Published 2020-05-01
    “…Blockchain technology is used to control and guarantee the authorship of startups and signed contracts.As IM development trend, the development of models for joint activity of intelligent agents in the cloud environment to support decision-making using blockchain technology to legally secure the authorship of innovations is proposed. …”
    Get full text
    Article
  9. 5609

    Political ecology survey of human-chimpanzee coexistence within postwar Mabi-Yaya Nature Reserve, Côte d’Ivoire by Sasha Pruvost, Vincent Leblan

    Published 2024-11-01
    “…Given the Ivorian political context, this local support and the persistence of high canopy forest appear to be more related to a local understanding of the protected area as a land-securing device against “outsiders” in a context of strong political and identity crises than to any agreement with conservation policies. …”
    Get full text
    Article
  10. 5610

    The influence of communication on an effective relationship marketing strategy for sport unions in the new millennium by Frikkie Herbst

    Published 2022-10-01
    “…A long-term relationship is recognised as a very important and basic ingredient of marketing, securing and keeping customers and can be regarded as a tool for the new millennium. …”
    Get full text
    Article
  11. 5611

    Development of a Family of Chaotic Systems with Infinite Equilibria and Its Application for Image Encryption by Xiaofeng Li, Yulong Bai, Weishuan Pan, Di Wang, Yong-Jie Ma

    Published 2022-01-01
    “…Therefore, this study not only enriched the research on infinite equilibria chaotic systems but also further expanded secure communication technology by combining chaotic synchronization control and DNA coding in image encryption.…”
    Get full text
    Article
  12. 5612

    Research on design intervention in spatial planning of traditional rural tourism: based on the perspective of tourists’ willingness to visit again by Huanchen Tang, Xiaodong Liu, Junjie Li, Hanyu Wang

    Published 2025-01-01
    “…Through scientific management and marketing strategies, traditional villages can not only enhance their competitiveness but also secure a place in the global tourism market, achieving both economic and cultural prosperity.…”
    Get full text
    Article
  13. 5613

    Informal Savings Groups and Economic Empowerment of Women in Northern Division Kabale Municipality. by Atuheire, Tracy

    Published 2024
    “…Conversely, the least mentioned benefit was access to safe-keeping facilities like a secure box. Concerning the challenges faced by women’s informal savings groups, the predominant issue highlighted was the competition threatening the survival of individual groups, while the least reported challenge was the lack of capital or financial resources. …”
    Get full text
    Thesis
  14. 5614

    Financial inclusion and the growth of small medium enterprises in Uganda: empirical evidence from selected districts in Lango sub-region by Eton, Marus, Fabian, Mwosi, Constant, Okello Obura, Abanis, Turyahebwa, Gilbert, Uwonda

    Published 2021
    “…Digital financial service providers should encourage their clientele to use digitalized financial services which are cheap, secure, and risk averse. The cost of capital should also be reduced to encourage borrowing while SMEs should innovatively produce goods that can be competitive at both domestic and international markets.…”
    Get full text
    Article
  15. 5615

    Paradigms of intraoperative neuromonitoring in paediatric thyroid surgery by Yuchuan Li, Chunhai Zhang, Yi Zhang, Gianlorenzo Dionigi, Gianlorenzo Dionigi, Yishen Zhao, Hui Sun, Hui Sun, Yingying Wang

    Published 2025-01-01
    “…Intraoperative neuromonitoring (IONM) is frequently used in thyroid surgery as an effective means of securing the recurrent laryngeal nerve (RLN). Little information is available on the clinical efficacy of IONM in paediatric surgery. …”
    Get full text
    Article
  16. 5616

    Evaluation of digital competence level among educators: assessment tools by Elizaveta A. Osipovskaya, Svetlana Yu. Dmitrieva, Anastasiia A. Savelyeva

    Published 2024-12-01
    “…Digital competences encompass a combination of knowledge, skills, and attitudes related to the effective use of technology for performing tasks, problem-solving, and secure, creative, independent, and ethical communication. …”
    Get full text
    Article
  17. 5617

    DESIGN OF A PROPERTY PRODUCT RECOMMENDATION SYSTEM USING ASSOCIATION RULE METHOD BASED ON USER INTERACTION PATTERNS by Susi Wagiyati Purtiningruma, Yudi Irawan Chandrab, Dian Gustinaa, Nafisah Yuliania, Fahrul Nurzamana, Jhonny Z.Aa, Agus Wismoa

    Published 2024-07-01
    “…User data and privacy must be secured to optimize the recommendation system. Association rule and user engagement patterns can transform property recommendations. …”
    Get full text
    Article
  18. 5618

    Specialized contact sites regulate the fusion of chlamydial inclusion membranes by Christine Linton, Jordan Wesolowski, Anna Lobley, Toshiyuki Yamaji, Kentaro Hanada, Fabienne Paumet

    Published 2024-10-01
    “…As IncA concentrates within ICSs, its C-terminus likely interacts in trans with IncA on the apposing membrane, securing a high concentration of IncA at fusion sites. …”
    Get full text
    Article
  19. 5619

    Carrageenan Edible Coating Application Prolongs Cavendish Banana Shelf Life by Fenny Martha Dwivany, Ayesha Nilam Aprilyandi, Veinardi Suendo, Nisrina Sukriandi

    Published 2020-01-01
    “…Banana is very important for both food and economic securities in many tropical and subtropical countries, because of its nutritional values. …”
    Get full text
    Article
  20. 5620

    A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme by Ping Li, Shengjun Li, Hongyang Yan, Lishan Ke, Teng Huang, Alzubair Hassan

    Published 2020-01-01
    “…Our scheme is also a leakage-resilient secret-sharing scheme (LRSS) in the bounded-leakage model, which remain provably secure even if the adversary learns a bounded amount of leakage information about their secret key. …”
    Get full text
    Article