Showing 1 - 20 results of 209 for search 'conclusion secure code', query time: 0.10s Refine Results
  1. 1

    The Concept of Sociocultural Code in the Context of National Security Discourse by Alexey A. Lagunov, Svetlana Yu. Ivanova

    Published 2025-12-01
    “…The authors come to the conclusion that the concept of socio-cultural code in its scope is intermediate between mentality and public worldview. …”
    Get full text
    Article
  2. 2

    Normative acts in the system of national tax security provision by K. V. Maslov

    Published 2022-01-01
    “…Legislative acts (first of all, the laws on security, on tax authorities, the Tax Code of the Russian Federation) should provide for the main directions of countering threats to tax security arising in the relevant areas of regulation. …”
    Get full text
    Article
  3. 3
  4. 4

    Quality, Safety, and Security Systems in the Greek Port Industry: Over Twenty Years of Research, Empirical Evidence, and Future Perspectives by Constantinos Chlomoudis, Petros Kostagiolas, Petros Pallis, Charalampos Platias

    Published 2024-10-01
    “…Over the past decades, numerous assurance systems, codes, and regulations for quality, safety, and security have been developed and implemented in ports world-wide. …”
    Get full text
    Article
  5. 5

    A Novel QR Code–Based Solution for Secure Electronic Health Record Transfer in Venous Thromboembolism Home Rehabilitation Management: Algorithm Development and Validation by Changzhen Li, Zhigeng Jin, Fei Wang, Zheqi Zhang, Binbin Liu, Yutao Guo

    Published 2025-08-01
    “…This was 1.82 times more efficient than traditional Gzip compression (average file size: 1907 bytes; compression ratio: 3.66; PPPP ConclusionsThe QR code–based security transmission algorithm using Avro and BPE efficiently compresses and transmits data in an encrypted manner and authenticates the identity of the scanning users, ensuring the privacy and security of medical data. …”
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Corporate Governance Code and Earnings Management by Azam Valizadeh Iarijani, Reyhaneh Iranpour

    Published 2024-11-01
    “…Considering this issue and the new corporate governance code in the Iranian capital market, in this research, the impact of the new corporate governance code on accrual-based earnings management and real earnings management is investigated. …”
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Development of biometric systems for passenger identification based on noise-resistant coding means by A. A. Gladkikh, A. K. Volkov, T. G. Ulasyuk

    Published 2021-04-01
    “…The versions to adopt the biometric passenger authentication procedures are under consideration. The conclusion is drawn that with the centralized biometric databases the issues of confidentiality and information security exist. …”
    Get full text
    Article
  12. 12

    Discussions of Cannabis Over Patient Portal Secure Messaging: Content Analysis by Vishal A Shetty, Christina M Gregor, Lorraine D Tusing, Apoorva M Pradhan, Katrina M Romagnoli, Brian J Piper, Eric A Wright

    Published 2024-12-01
    “…Provider messages (n=80) were driven by giving assistance with medical marijuana access (27.5% of messages) and stating that they were unable to refer, prescribe or recommend medical marijuana (26.3% of messages). ConclusionsPatients showed a willingness to discuss cannabis use over patient portal secure messages and expressed interest in use after the legalization of medical marijuana. …”
    Get full text
    Article
  13. 13

    Research on Spread Spectrum Codes Optimized by Sparrow Search Algorithm and Extreme Gradient Boosting by LIANG Zhiru, BIAN Dongming, ZHANG Gengxin

    Published 2024-12-01
    “…【Objective】Direct Sequence Spread Spectrum (DSSS) has been widely used in military and civilian communications due to its strong resistance to various common interferences, high security, and ease of implementation. It has been widely used in Code Division Multiple Access (CDMA) system. …”
    Get full text
    Article
  14. 14

    ANALYSIS AND MINIMIZATION OF THE RISKS OF HARMFUL DEPENDENCIES IN THE PROCESS OF CONTINUOUS INTEGRATION AND IMPLEMENTATION OF SOFTWARE CODE by Danil N. Alekseev, Renat M. Khamitov

    Published 2024-10-01
    “…The authors apply theoretical research methods related to the search and analysis of information to identify connections and obtain unique conclusions. Results. The analysis of the risks of malicious dependencies in the process of continuous integration and implementation of the program code is carried out. …”
    Get full text
    Article
  15. 15

    Actual problems of application of labor protection rules of the Labor Code of the Russian Federation and the ways of solutions by R. V. Kirsanov

    Published 2018-04-01
    “…This is due to the fact that legal registration of employment in most cases is associated with a higher level of security, since an employee without clearance does not actually exist for the state control and supervisory bodies.Conclusions. …”
    Get full text
    Article
  16. 16

    Presenting a model for the psychological competencies of managers for selection in the social security organization by khalil khomideh, hasan rangriz

    Published 2024-08-01
    “…Background: The selection of managers with appropriate psychological competencies is crucial for organizations like social security organizations, which have profound and far-reaching effects on society. …”
    Get full text
    Article
  17. 17

    Modeling the antecedents and consequences of performance evaluation based on psychological concepts in the social security organization by Mohammad Derakhshandeh, Hamzeh Khastar, Hasan Rangriz, Mahdi Kheirandish

    Published 2025-01-01
    “…Results: In the open coding stage, 408 codes were identified. Eventually, through axial coding, 2 overarching themes, 12 organizing themes, and 60 basic themes were developed. …”
    Get full text
    Article
  18. 18

    Facilitating comprehensive child health monitoring within REDCap - an open-source code for real-time Z-score assessments by Priyanka Mendon, Michael Witsch, Marianne Becker, Aurélie Adamski, Michel Vaillant

    Published 2024-12-01
    “…This article introduces an innovative open-code solution for real-time Z-score assessments directly within the electronic data capture platform, Research Electronic Data Capture, (REDCap™), aiming to streamline the monitoring of somatic development in children. …”
    Get full text
    Article
  19. 19

    Engineering a controllable and reversible switch for CAR-based cellular immunotherapies via a genetic code expansion system by Yue Liu, Lingna An, Xiaoqi Wang, Yueyu Dai, Cheng Zhang, Qin Wen, Xi Zhang

    Published 2024-12-01
    “…Furthermore, we verified that the BOCK-induced CAR device provided NK cells with controllable anti-tumor activity, which confirmed the universality of this device. Conclusions Our study systematically demonstrated that the BOCK-induced genetic code expansion system effectively and precisely regulates CAR protein expression and controls CAR-T cell anti-tumor effects in vitro and in vivo. …”
    Get full text
    Article
  20. 20

    An employee empowerment model in healthcare organizations: a case study of the Iranian social security organization by Ali Sadeghinezhad, Hamdollah Manzari Tavakoli, Saeed Sayadi, Mahdi Mohammad Bagheri, Mohammad Jalal Kamali

    Published 2025-05-01
    “…In the qualitative phase, meta-synthesis of 25 purposively selected studies and thematic coding led to an initial model of employee empowerment. …”
    Get full text
    Article