Showing 321 - 340 results of 21,483 for search 'issues processing', query time: 0.18s Refine Results
  1. 321
  2. 322
  3. 323

    Unification of documents in pre-revolutionary Russia: historical and legal issues by O. V. Marchenko

    Published 2021-01-01
    “…The study of the history of documentation practice in Russia allows us to conclude that the issues of document flow rationalization were of great importance since the XVII century. …”
    Get full text
    Article
  4. 324
  5. 325

    Impact evaluation of technical notes issued by NATJUS on healthcare judicialization by Lucas Reis Correia, Luís Gustavo Nascimento de Paula, Julio Trecenti, Bruno Daleffi da Silva

    Published 2025-06-01
    “…Furthermore, we examined the technical notes issued by Hospital Israelita Albert Einstein, which manages the national NATJUS. …”
    Get full text
    Article
  6. 326
  7. 327

    Unresolved and Suppressed Scientific Issues Left by the COVID-19 Pandemic by M. V. Supotnitskiy

    Published 2025-07-01
    “…Purpose of the study is to identify unresolved and suppressed scientific issues left by the COVID-19 pandemic. Study base sources. …”
    Get full text
    Article
  8. 328

    Investigation of the processes of dust processing gas cleaning of steelmaking industries by S. L. Rimoshevsky, D. A. Prokopchuk, D. M. Golub

    Published 2021-03-01
    “…The article deals with the issues of processing of dust from electric steelmaking production by the method of thermodynamic extraction of iron, zinc and lead in order to reduce the environmental impact and increase the resource base of the industry. …”
    Get full text
    Article
  9. 329

    System process documentation of processing of moringa leaves into moringa powder by Medina Melissa R.

    Published 2025-01-01
    “…As a result of the study, one of the major issues for moringa processing is its high investment costs, with a total equipment cost of Php 1,398,355.00, and its labor intensiveness, particularly in the destemming procedure (5 kg per hour). …”
    Get full text
    Article
  10. 330
  11. 331
  12. 332
  13. 333

    Combining Process Mining and Process Simulation in Healthcare: A Literature Review by Evelyn Salas, Michael Arias, Santiago Aguirre, Eric Rojas

    Published 2024-01-01
    “…This includes the adoption of process mining (PM) and process simulation (PS), which have been used separately or in combination with one another in the healthcare field to assist decision-makers in process optimization. …”
    Get full text
    Article
  14. 334
  15. 335

    Multimodal Issues and Key Technologies in Ocean Observation Data: A Review by Jie Nie, Zijie Zuo, Xinyue Liang, Min Ye, Ning Song, Xiaofeng Li

    Published 2025-01-01
    “…This article is the first to identify and define three core multimodal issues in ocean observation data: multistructure, multielement, and multisource. …”
    Get full text
    Article
  16. 336
  17. 337

    The heterogeneous distribution of critical metal mineral resources: An impending geopolitical issue by David I. Groves, D. Müller, M. Santosh, Cheng-Xue Yang

    Published 2025-02-01
    “…However, exploration is hampered by increasing environmental, and human rights issues and sovereign risks that are becoming ever more challenging for most major mining and exploration companies in western countries. …”
    Get full text
    Article
  18. 338

    Data Confidentiality in Artificial Intelligence-Assisted Medicine: The Main Ethical Issue by Raluca DUMACHE, Camelia MURESAN, Marina Adriana MERCIONI, Alin IONESCU, Nina IVANOVIC, Alexandra ENACHE

    Published 2025-05-01
    “…Concerns regarding data confidentiality are the main ethical issues raised by the use of AI in medicine. Processing enormous volumes of private patient data is part of the use of AI in healthcare, which raises questions about data breaches, misuse, and illegal access. …”
    Get full text
    Article
  19. 339
  20. 340

    Issues of identity verification of typical applications over mobile terminal platform by Xiaolin ZHANG, Dawu GU, Chi ZHANG

    Published 2020-12-01
    “…Recent studies have shown that attacks against USIM card are increasing,and an attacker can use the cloned USIM card to bypass the identity verification process in some applications and thereby get the unauthorized access.Considering the USIM card being cloned easily even under 5G network,the identity verification process of the popular mobile applications over mobile platform was analyzed.The application behaviors were profiled while users were logging in,resetting password,and performing sensitive operations,thereby the tree model of application authentication was summarized.On this basis,58 popular applications in 7 categories were tested including social communication,healthcare,etc.It found that 29 of them only need SMS verification codes to get authenticated and obtain permissions.To address this issue,two-step authentication was suggested and USIM anti-counterfeiting was applied to assist the authentication process.…”
    Get full text
    Article