Showing 8,781 - 8,800 results of 9,720 for search '"security"', query time: 0.07s Refine Results
  1. 8781

    Mesures de compensation écologique : risques ou opportunités pour le foncier agricole en France ? by Claire Etrillard, Michel Pech

    Published 2015-10-01
    “…The second focuses on offering compensation : in this approach the service provider secures land through acquisition or long term contracts. …”
    Get full text
    Article
  2. 8782

    Consumer Debt and Over-Indebtedness in Times of COVID-19 by Überblick

    Published 2022-03-01
    “…Eighty participants from academia, consumer protection, social associations, business and ministries discussed three topics on 16 December, 2021 at the invitation of the German Council of Consumer Experts: 1) concepts, developments, causes of consumer indebtedness and over-indebtedness; 2) their social context; and 3) measures to secure economic self-determination.…”
    Get full text
    Article
  3. 8783

    Keeping a Household Inventory and Protecting Valuable Records by Carol Fountain, Michael T. Olexa, Jana Caracciolo, Lauren Grant

    Published 2019-12-01
    “…You will, if you do both of the following: • Keep an up-to-date household inventory • Keep the inventory and other valuable documents in a secure location This 4-page publication provides details about these two tasks. …”
    Get full text
    Article
  4. 8784

    PERSPECTIVES OF USING OF HIGH-SPEED STEELS FOR PRODUCTION OF CAST METAL-CUTTING INSTRUMENT. THE WAYS OF THE STRUCTURE AND CHARACTERISTICS IMPROVEMENT by A. S. Chaus, M. Legerska, F. I. Rudnitskij, A. N. Konstantjuk, K. F. Rudnitskij

    Published 2004-05-01
    “…On the basis of industrial tests it is shown that at correct nomenclature choice for embedding there are being created the backgrounds for secure work of cast instrument, resistance of which can be even higher as compared to the traditional instrument due to higher endurance of cast-steel…”
    Get full text
    Article
  5. 8785

    Research on attribute-based encryption with keyword search for cloud storage by Zhi-qiang ZHU, Hang SU, Lei SUN, Zuo-hui LI

    Published 2017-11-01
    “…To safeguard the sensitive data stored on the cloud and promote the efficiency of data sharing simulta-neously,a secure flexible and efficient attribute-based encryption scheme with keyword search is proposed,which designs an index generation mechanism that requires the private key of data owner to resist the keyword guessing attack,supports one-to-many application scenarios based on the linear secret shared access structure,introduces the conjunctive subset keyword search technique and online/offline technique to improve search flexibility and efficien-cy.Theoretical analysis and experimental evaluation show that the proposed scheme enjoys high efficiency.…”
    Get full text
    Article
  6. 8786

    CONTROLLING AS A CORPORATE GOVERNANCE TOOL by T. Rogulenko

    Published 2018-09-01
    “…According to the results of the research it is concluded that con-trolling is one of the modern algorithmic and automated tools of the corporate governance system of the economic development strategy in a highly competitive environment and un-predictability of the behavior of economic entities in the market of goods, works, services, currency, securities and etc., which integrates with other management systems in the mode of their parallel automation.…”
    Get full text
    Article
  7. 8787

    Effect of Employees’ Values on Employee Satisfaction in Japanese Retail and Service Industries by Tomonori Matsuki, Jun Nakamura

    Published 2019-01-01
    “…For most companies, recruitment is difficult, and employees change jobs often, making securing staff an important business issue. Nonregular and regular employees are treated differently; the problem is thus partly social in nature. …”
    Get full text
    Article
  8. 8788

    The European Central Bank’s Ethical Rules by Arne Hansen, Dirk Meyer

    Published 2022-10-01
    “…Abstract The study analyses the private securities transactions at the US Federal Reserve that have been made public since late 2021 and are worthy of criticism. …”
    Get full text
    Article
  9. 8789

    Keeping a Household Inventory and Protecting Valuable Records by Carol Fountain, Michael T. Olexa, Jana Caracciolo, Lauren Grant

    Published 2019-12-01
    “…You will, if you do both of the following: • Keep an up-to-date household inventory • Keep the inventory and other valuable documents in a secure location This 4-page publication provides details about these two tasks. …”
    Get full text
    Article
  10. 8790

    Thoracic Anesthesia and Cross Field Ventilation for Tracheobronchial Injuries: A Challenge for Anesthesiologists by Sankalp Sehgal, Joshua C. Chance, Matthew A. Steliga

    Published 2014-01-01
    “…Due to the difficult nature of these injuries and the demanding attributes of the involved surgery, the anesthesiologist faces tough challenges while securing the airway, controlling oxygenation, undertaking one-lung ventilation, maintaining anesthesia during tracheal reconstruction, and gaining adequate postoperative pain control. …”
    Get full text
    Article
  11. 8791

    Political activity of widows as an example of shaping cliental dependencies in the second half of the seventeenth and eighteenth centuries by Urszula Kicińska

    Published 2019-12-01
    “…Widows, protected by privilegesand secured with property ownership, had a solid influence on the formation of cliental ties. …”
    Get full text
    Article
  12. 8792

    Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia) by Donatas Brandišauskas

    Published 2011-05-01
    “…I suggest that hunters and herders aim to maintain their autonomy from goods and resources imported from cities, and, in spending little effort connecting with state powers in this way, securing their lives from socio-economic constraints.…”
    Get full text
    Article
  13. 8793

    Food System Study of Martin County, Florida by Yvette Goodiel, William A. Messina, Lisa House, Carol Roberts

    Published 2023-04-01
    “…Farmers often face challenges finding sizable, secure, well-paying markets, and the most consumers do not participate in local food transactions. …”
    Get full text
    Article
  14. 8794

    A solution for intelligent park based on 5G MEC by Xiaoli FENG, Chen LIU, Liwei ZHANG, Xiaoyun WANG

    Published 2022-05-01
    “…Beside the normal consumers, 5G will be applied in the industry manufacture, chemical industry, and power energy, etc.How to exploit the 5G, multi-access edge computing (MEC) and other technologies to satisfy the digital transformation of enterprise becomes a hot topic.Therefore, the 5G MEC-based intelligent park solution was proposed based on the different scenarios.Secure fixed and mobile connection with high bandwidth, and flexible computation infrastructure for applications was provided.Secondly, according to the various scenarios, the corresponding solution was presented.In addition, the detailed deployment scheme of the project was discussed for the future deployment.…”
    Get full text
    Article
  15. 8795

    A Variable Weight Privacy-Preserving Algorithm for the Mobile Crowd Sensing Network by Jiezhuo Zhong, Wei Wu, Chunjie Cao, Wenlong Feng

    Published 2017-01-01
    “…To address this problem, we proposed a variable weight privacy-preserving algorithm of secure multiparty computation. This algorithm is based on privacy-preserving utility and its effectiveness and feasibility are demonstrated through experiment.…”
    Get full text
    Article
  16. 8796

    ON THE PROSPECTS OF TAX INCENTIVES FOR INVESTMENTS IN BONDS by A. S. Solomentsev

    Published 2020-09-01
    “…Russian economy is in dire need of “long” money, the source of which may be the population’s investments in securities market instruments. Bonds seem to be a real alternative to bank deposits and an optimal investment tool from a position of risk and return. …”
    Get full text
    Article
  17. 8797

    UNIVERSITY RANKING: SOCIOLOGICAL SUPPORT by Ivan E. Zadorozhnyuk, Sergey V. Kireev

    Published 2016-12-01
    “…The authors give recommendations for more sociologically consistent provision of ranking criteria, discuss the prospect of creation and status securing of the Russian university ranking system.…”
    Get full text
    Article
  18. 8798

    Fire Safety Policy by Kabale University

    Published 2022
    “…The aim of this policy is, therefore, to provide a robust fire safety framework which will be implemented to secure the safety and wellbeing of everyone within the University Community. …”
    Get full text
    Other
  19. 8799

    Randomized controlled trials in central vascular access devices: A scoping review. by Mari Takashima, Gillian Ray-Barruel, Amanda Ullman, Samantha Keogh, Claire M Rickard

    Published 2017-01-01
    “…<h4>Conclusion</h4>More high quality randomized trials across central venous access device management are necessary, especially in dressing and securement and patency. These can be encouraged by having more studies with multidisciplinary team involvement and consumer engagement. …”
    Get full text
    Article
  20. 8800

    Enjeux de la mutation des techniques artisanales sur la formalisation de l’exploitation de l’or au Burkina Faso by Edith Sawadogo, Dapola Evariste Constant Da†

    Published 2021-12-01
    “…On the basis of documentary research and field surveys in the commune of Kampti in May 2018 and December 2019, we show that despite the willingness of actors to secure their investments through formalization, they come up against unfavorable institutional and legal realities. …”
    Get full text
    Article