Showing 41 - 60 results of 209 for search 'conclusion secure code', query time: 0.10s Refine Results
  1. 41

    Investigation of The Perceptions of Safety and Confidence Against Violence of Healthcare Professionals by Burak Yural, Deniz Acuner, Güneş Çevik Akkuş

    Published 2024-04-01
    “…It has been determined that the perceptions of security and trust differ statistically according to gender, age, education level, unit of work, working experience, exposure to violence and white code. …”
    Get full text
    Article
  2. 42

    Key elements and practical logic of non-directive counselling intervention in perinatal women's depression: based on grounded theory analysis by Ling Ya, Siti Roshaidai Mohd Arifin, Lee Siew Pien, Siti Hajar Mohamed Zain

    Published 2024-09-01
    “…As a psychological intervention method that focuses on client-led treatment and emphasises emotional support, the role of non-directive counselling in depression intervention in perinatal women deserves in-depth discussion.Objective To explore the application methods and mechanisms of non-directive counselling intervention in alleviating depression in perinatal women, and to construct its key elements and practical logic models.Methods The key elements and logical models of non-directive counselling intervention are refined and constructed using the grounded theoretical research method to carry out open coding, axial coding and selective coding of data.Results Selective coding-based results show that building a sense of security, attachment, and self-worth is the foundation of the intervention and helps promote trust and engagement. …”
    Get full text
    Article
  3. 43

    International Migration and Its Consequences Affecting Population Management in Isfahan Province: A Grounded Theory Study by Mohammad Hosain Ghanbari Jahromi, Javad Esteki, Hamid Nazari

    Published 2025-06-01
    “…The migration process yielded various consequences identified as economic security, socio-cultural security, and environmental security issues. …”
    Get full text
    Article
  4. 44
  5. 45
  6. 46

    Safety of Systems Integrating Fire Protection Equipment – Risks, Gaps, Recommendations by Wojciech Wróblewski, Dorota Seliga

    Published 2024-12-01
    “…There is a lack of relevant legal regulations that directly address the issue of the network and cyber security of these systems. Conclusions: It is necessary to urgently develop and implement comprehensive legal regulations that would take into account the specificity of the cyber security of fire protection systems in Poland. …”
    Get full text
    Article
  7. 47

    On the Credibility and Novelty of Some Results in Modern Research on the Development of Scientific Concepts of Administrative Discretion and Police Law by Yu. P. Solovey

    Published 2025-04-01
    “…As for police law, the current stagnation in this area could be overcome by drafting a new codified federal legislative act – the Police Code of the Russian Federation or the Code of the Russian Federation on Security (the latter title currently appears more suitable). …”
    Get full text
    Article
  8. 48

    The challenges of replication: A worked example of methods reproducibility using electronic health record data. by Richard Williams, Thomas Bolton, David Jenkins, Mehrdad A Mizani, Matthew Sperrin, Cathie Sudlow, Angela Wood, Adrian Heald, Niels Peek, CVD-COVID-UK/COVID-IMPACT Consortium

    Published 2025-01-01
    “…We also propose a new theme for research, "data reproducibility", as the ability to prepare, extract and clean data from a different database for a replication study.<h4>Conclusion</h4>Even with perfect code sharing, data reproducibility remains a challenge. …”
    Get full text
    Article
  9. 49
  10. 50
  11. 51

    HARDWARE SUPPORT PROCEDURES FOR ASYMMETRIC AUTHENTICATION OF THE INTERNET OF THINGS by Петро Сергійович Клімушин, Тетяна Миколаївна Соляник, Олександр Олександрович Можаєв, Віталій Вікторович Носов, Тетяна Петрівна Колісник, Василь Вікторович Янов

    Published 2021-12-01
    “…Subject of research: procedures of asymmetric authentication of Internet of Things nodes to ensure the highest level of security using cryptographic chips. The aim of the article is to study the ways of potential use of cryptographic chips to ensure secure authentication of Internet of Things sites using asymmetric cryptography procedures. …”
    Get full text
    Article
  12. 52

    Data Resource Profile: A Guide for Constructing School-to-work Sequence Analysis Trajectories Using the Longitudinal Education Outcomes (LEO) Data by Shivani Sickotra

    Published 2025-03-01
    “…By offering step-by-step instructions and shared code, it empowers users to recreate or adapt the dataset for their specific research needs. …”
    Get full text
    Article
  13. 53

    Human infection with an infectious disease agent: analysis of constructive objective features of criminal offences by O. V. Shamsutdinov

    Published 2024-09-01
    “…The view is supported that the indication of a virus as an instrument of criminal offences (Articles 130, 131 of the Criminal Code of Ukraine) significantly limits the criminalisation of encroachments on biological security in the form of spread of infectious diseases. …”
    Get full text
    Article
  14. 54

    Combating crime in the sphere of justice: effectiveness of punishment by Mikhail P. Kleymenov, Evgeniy S. Ivanov

    Published 2019-04-01
    “…The criminal‐legal impact is punitive in relation to the insult of public officer (art. 319 of the Russian Criminal Code). Criminal liability for insulting a public officer is anachronism in the context of full or partial decriminalization of insults in general (art. 130 of the Russian Criminal Code) and beatings (art. 116 of the Russian Criminal Code).Conclusion. …”
    Get full text
    Article
  15. 55

    Effectiveness of medicines authentication technology to detect counterfeit, recalled and expired medicines: a two-stage quantitative secondary care study by David Brindley, Stephen Chapman, Lindsey Roberts, Bernard Naughton, Sue Dopson

    Published 2016-12-01
    “…Medicines were authenticated using secure external database cross-checking, triggered by the scanning of a two-dimensional data matrix with a unit specific 12-digit serial code. 4% of medicines included were preprogrammed with a message to identify the product as either expired, pack recalled, product recalled or counterfeit.Setting A site within a large UK National Health Service teaching hospital trust.Participants Accredited checking staff, pharmacists and dispensers in a pharmacy department.Primary outcome measures Authentication and detection rate of counterfeit expired and recalled medicines.Results The operational detection rate of counterfeit, recalled and expired medicines scanned as a combined group was 81.4% (stage 1 (S1)) and 87% (stage 2 (S2)). …”
    Get full text
    Article
  16. 56

    On Family Relationships under the Laws of Hammurabi by K. V. Karpenko

    Published 2012-10-01
    “…The family in the Hammurabi Code represents the basis not only for economic and financial power of the state, but also for its political stability and security. …”
    Get full text
    Article
  17. 57

    Intersectoral problems of qualification of labor law violations as administrative offences in Russia by M. A. Drachuk, G. N. Obukhova

    Published 2025-06-01
    “…The subject of the branch of labor law is very mobile, it already partially affects issues of employment, education, and certain aspects of ensuring national security. Consequently, the application of administra- tive responsibility for violations of these norms should be organized by extending it to both obvious violations and complex cases of intersectoral regulation affecting the world of work or certain aspects of its functioning.The purpose of this work is a comprehensive analysis of a number of norms of the Russian Code of Administrative Offences concerning violations of workers' labor rights, based on the study, analysis and generalization of the scientific base, current legislation and practice of its application. …”
    Get full text
    Article
  18. 58

    Legal problems of use of compulsory psychiatric treatment in Russia and Belarus by A. L. Santashov, M. Yu. Kashinskiy, L. N. Tarabuev

    Published 2022-01-01
    “…Based on the results of the study, a number of problems were identified in the legislative regulation of psychiatric compulsory measures in the criminal codes of both states, the authors propose directions for further improvement of the current criminal legislation.Conclusions. …”
    Get full text
    Article
  19. 59

    A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments by Maryam Abbasi, Filipe Cardoso, Paulo Váz, José Silva, Pedro Martins

    Published 2025-05-01
    “…This practical roadmap enables organizations to strategically prioritize systems for quantum-resistant upgrades based on data sensitivity, resource constraints, and technical feasibility. Our results conclusively demonstrate that PQC is deployment-ready for most applications, provided that implementations are carefully optimized for the specific performance characteristics and security requirements of target environments. …”
    Get full text
    Article
  20. 60

    Algorithms, allyship, and advice: A qualitative analysis of fertility tracker marketing by Kate Sheridan Clay, Sue Ziebland, John Powell

    Published 2025-08-01
    “…Conclusion We demonstrate how company marketing encourages users to centre digital tracking technologies in their fertility journeys. …”
    Get full text
    Article