-
1
The Concept of Sociocultural Code in the Context of National Security Discourse
Published 2025-12-01“…The authors come to the conclusion that the concept of socio-cultural code in its scope is intermediate between mentality and public worldview. …”
Get full text
Article -
2
Normative acts in the system of national tax security provision
Published 2022-01-01“…Legislative acts (first of all, the laws on security, on tax authorities, the Tax Code of the Russian Federation) should provide for the main directions of countering threats to tax security arising in the relevant areas of regulation. …”
Get full text
Article -
3
-
4
Quality, Safety, and Security Systems in the Greek Port Industry: Over Twenty Years of Research, Empirical Evidence, and Future Perspectives
Published 2024-10-01“…Over the past decades, numerous assurance systems, codes, and regulations for quality, safety, and security have been developed and implemented in ports world-wide. …”
Get full text
Article -
5
A Novel QR Code–Based Solution for Secure Electronic Health Record Transfer in Venous Thromboembolism Home Rehabilitation Management: Algorithm Development and Validation
Published 2025-08-01“…This was 1.82 times more efficient than traditional Gzip compression (average file size: 1907 bytes; compression ratio: 3.66; PPPP ConclusionsThe QR code–based security transmission algorithm using Avro and BPE efficiently compresses and transmits data in an encrypted manner and authenticates the identity of the scanning users, ensuring the privacy and security of medical data. …”
Get full text
Article -
6
-
7
ANTI-CORRUPTION SAFEGUARDS IN COMMUNES. CONCLUSIONS FROM A SURVEY OF POLISH LOCAL GOVERNMENT OFFICIALS
Published 2025-06-01Get full text
Article -
8
Corporate Governance Code and Earnings Management
Published 2024-11-01“…Considering this issue and the new corporate governance code in the Iranian capital market, in this research, the impact of the new corporate governance code on accrual-based earnings management and real earnings management is investigated. …”
Get full text
Article -
9
Contribution of rare coding variants to microcephaly in individuals with neurodevelopmental disorders
Published 2025-08-01Get full text
Article -
10
Impact of NOTAM on security and efficiency performance of flights (overview)
Published 2022-02-01Get full text
Article -
11
Development of biometric systems for passenger identification based on noise-resistant coding means
Published 2021-04-01“…The versions to adopt the biometric passenger authentication procedures are under consideration. The conclusion is drawn that with the centralized biometric databases the issues of confidentiality and information security exist. …”
Get full text
Article -
12
Discussions of Cannabis Over Patient Portal Secure Messaging: Content Analysis
Published 2024-12-01“…Provider messages (n=80) were driven by giving assistance with medical marijuana access (27.5% of messages) and stating that they were unable to refer, prescribe or recommend medical marijuana (26.3% of messages). ConclusionsPatients showed a willingness to discuss cannabis use over patient portal secure messages and expressed interest in use after the legalization of medical marijuana. …”
Get full text
Article -
13
Research on Spread Spectrum Codes Optimized by Sparrow Search Algorithm and Extreme Gradient Boosting
Published 2024-12-01“…【Objective】Direct Sequence Spread Spectrum (DSSS) has been widely used in military and civilian communications due to its strong resistance to various common interferences, high security, and ease of implementation. It has been widely used in Code Division Multiple Access (CDMA) system. …”
Get full text
Article -
14
ANALYSIS AND MINIMIZATION OF THE RISKS OF HARMFUL DEPENDENCIES IN THE PROCESS OF CONTINUOUS INTEGRATION AND IMPLEMENTATION OF SOFTWARE CODE
Published 2024-10-01“…The authors apply theoretical research methods related to the search and analysis of information to identify connections and obtain unique conclusions. Results. The analysis of the risks of malicious dependencies in the process of continuous integration and implementation of the program code is carried out. …”
Get full text
Article -
15
Actual problems of application of labor protection rules of the Labor Code of the Russian Federation and the ways of solutions
Published 2018-04-01“…This is due to the fact that legal registration of employment in most cases is associated with a higher level of security, since an employee without clearance does not actually exist for the state control and supervisory bodies.Conclusions. …”
Get full text
Article -
16
Presenting a model for the psychological competencies of managers for selection in the social security organization
Published 2024-08-01“…Background: The selection of managers with appropriate psychological competencies is crucial for organizations like social security organizations, which have profound and far-reaching effects on society. …”
Get full text
Article -
17
Modeling the antecedents and consequences of performance evaluation based on psychological concepts in the social security organization
Published 2025-01-01“…Results: In the open coding stage, 408 codes were identified. Eventually, through axial coding, 2 overarching themes, 12 organizing themes, and 60 basic themes were developed. …”
Get full text
Article -
18
Facilitating comprehensive child health monitoring within REDCap - an open-source code for real-time Z-score assessments
Published 2024-12-01“…This article introduces an innovative open-code solution for real-time Z-score assessments directly within the electronic data capture platform, Research Electronic Data Capture, (REDCap™), aiming to streamline the monitoring of somatic development in children. …”
Get full text
Article -
19
Engineering a controllable and reversible switch for CAR-based cellular immunotherapies via a genetic code expansion system
Published 2024-12-01“…Furthermore, we verified that the BOCK-induced CAR device provided NK cells with controllable anti-tumor activity, which confirmed the universality of this device. Conclusions Our study systematically demonstrated that the BOCK-induced genetic code expansion system effectively and precisely regulates CAR protein expression and controls CAR-T cell anti-tumor effects in vitro and in vivo. …”
Get full text
Article -
20
An employee empowerment model in healthcare organizations: a case study of the Iranian social security organization
Published 2025-05-01“…In the qualitative phase, meta-synthesis of 25 purposively selected studies and thematic coding led to an initial model of employee empowerment. …”
Get full text
Article