-
1161
Low-carbon optimization planning method for integrated energy system based on DG uncertainty affine model
Published 2024-08-01“…Aiming at the problem that the output of distributed generators (DG) of new energy sources such as wind power and photovoltaic is uncertain due to changes in environmental factors, and the transaction price of the existing carbon trading model is fixed, resulting in increased carbon reduction costs, an integrated energy system optimization planning method that takes into account dynamic carbon emission constraints and DG uncertainty was proposed. …”
Get full text
Article -
1162
The Impact of Economic Growth and Foreign Investment on the Advancement of E-commerce
Published 2024-11-01“…It is recommended to prioritize policies that attract foreign investment, particularly in ICT, financial services, and trade sectors to stimulate e-commerce growth; develop targeted strategies to improve digital infrastructure and increase internet accessibility nationwide; implement regulations that facilitate secure online transactions and protect consumer rights in e-commerce; invest in digital literacy programs to increase e-commerce adoption among the population; create incentives for businesses to develop online platforms and integrate e-commerce into their operations; foster partnerships between foreign investors and local businesses to transfer knowledge and technology in e-commerce. …”
Get full text
Article -
1163
Jurisprudential Analysis of the Nature of Money Creation with an Emphasis on Mudaraba on Debt in the Banking System
Published 2024-10-01“…Finally, after the investigations, this research confirms the validity of such a transaction with the money created by the banking system, emphasizing the famous ruling on the inadmissibility of mudarabah on debt.…”
Get full text
Article -
1164
A Fast and Efficient Markov Chain Monte Carlo Method for Market Microstructure Model
Published 2021-01-01“…Through this method, one can use the estimated market liquidity and surplus demand which is much smoother than the strong stochastic return process to assist the transaction decision making in the financial market.…”
Get full text
Article -
1165
The Impact of Land Development Rights Transfer on Urban–Rural Spatial Justice: A Case Study of Chongqing’s Land Quota Trading
Published 2025-01-01“…The results show that LDR transfer promotes urban–rural spatial resources equity in the short term, particularly through the marketization of land transactions. Over the long term, it significantly enhances urban–rural spatial economic and social equity, evidenced by the narrowing of the income gap, the growth of the primary industry, and improved connectivity between urban and rural areas. …”
Get full text
Article -
1166
Global support at the click of a button: How digital remittances help Ukraine during crises
Published 2025-01-01“…Poland is the main supplier of money in Ukraine. The average transaction value has also decreased from USD 3,540 thousand in 2017 to USD 1,750 thousand by 2024, which is due to the increase in the number of platforms that allow small transfers. …”
Get full text
Article -
1167
Security access permission authentication simulation of multi-source network big data based on blockchain
Published 2024-02-01“…The frequent interaction and storage of big data in multi-source networks have broken traditional data silos, enabling cross regional and cross organizational data access, posing significant challenges to data security and privacy protection.As one of the technologies to protect data and resource security, access authentication faces enormous communication loads while obtaining trust from all data nodes, which can cause data loss and damage.Therefore, a blockchain based research method for multi-source network big data security access permission authentication was proposed.The transformation status of data in network transmission using similarity relationships was measured, and the probability of multi-source network data access based on the similarity matrix was calculated.The data security access contracts were established through blockchain technology, calibrating data access attributes and transaction ciphertexts, and compressing data within corresponding attributes.The access reliability based on the purpose of the access was analyzed, reliability was used as the standard to correspond to the security level, rules under different levels of reliability were accessed, specific permissions were authenticated for data security access, and implementation methods were designed.The experimental results show that using different data attribute contents as testing conditions, encrypting and decrypting data in both conventional and attack modes, the new method can achieve fast authentication response and secure access to network data.…”
Get full text
Article -
1168
Exploring drivers and prevention strategies for sexual violence among adolescent girls and young women in Kicukiro, Rwanda
Published 2025-01-01“…Key drivers of sexual violence included substance use, transactional sexual relationships, inadequate family protection, entrenched gender stereotypes, and limited legal literacy.ConclusionFindings underscore the need for multifaceted interventions that address systemic and cultural barriers, strengthen legal frameworks, and expand community-based programs. …”
Get full text
Article -
1169
ANALYSIS OF THE IMPACT OF THE COVID19 PANDEMIC ON ONLINE FOOD SHOPPING
Published 2024-12-01“…The obtained results can highlight the importance of sustainability and trust in digital transactions, as well as the evolution of modern consumer behavior and shopping preferences.…”
Get full text
Article -
1170
Digital Safety for Women and Children: Legal and Policy Challenges Indonesia, Philippines, and Thailand
Published 2024-12-01“…Key regulations such as the Electronic Information and Transactions (ITE) Law in Indonesia, the Cybercrime Prevention Act in the Philippines, and the Computer Crime Act in Thailand were analyzed alongside institutional reports and academic studies. …”
Get full text
Article -
1171
Effectiveness of Criminal Offense Law Regarding Illegal Levies: Reforming Social Organizations within the Indonesian Legal Framework
Published 2024-12-01“…This ineffectiveness stems from inadequate supervision of youth organization activities, insufficient transparency in financial transactions, and weak enforcement measures against organizations engaging in extortion. …”
Get full text
Article -
1172
Typology of risks of territories of advanced development
Published 2018-06-01“…It should be noted that to date there is no single system of documents for the development of regional infrastructure, which causes a lot of uncertainties in the course of making a decision on this transaction.…”
Get full text
Article -
1173
Application of Internet of Things Based on Big Data Ecosystem in Factory Energy Consumption Analysis Model
Published 2022-01-01“…The Internet of Things technology of big data ecosystem can be summarized as a technology that uses information sensing devices to complete the transaction and network connection according to the protocol content. …”
Get full text
Article -
1174
PROFILES AND PREFERENCES OF ON-LINE MILLENIAL SHOPPERS IN BULGARIA
Published 2014-05-01“…Like other regions of the world, concern about financial transactions security is a major barrier limiting the willingness to shop on-line in Bulgaria. …”
Get full text
Article -
1175
Reflections on the possible application of Rome I Regulation to obligations related to crypto-assets
Published 2024-12-01“…This study does not aim to analyse the basic rules of crypto-asset trading or make an assessment of their legal status but rather seeks to determine how the law applicable to obligations related to crypto-assets could be determined. Linking a given transaction to more than one legal area is one of the essential features of modern global financial markets. …”
Get full text
Article -
1176
Post-humanist food pedagogy in Margaret Atwood’s speculative fiction: The MaddAddam Trilogy
Published 2024-12-01“…Drawing upon the concept of “post food,” which emerges from the industrial food chain’s influence on consumption patterns, the study examines how technological advancements and industrialization that reshape human interactions with food are transacted in learning. In MaddAddam , Atwood presents a post-apocalyptic narrative that highlights the intricate interplay between food, technology, and humanity’s future. …”
Get full text
Article -
1177
Process Improvement for Error Records in a Financial Institution with the Analysis of Simulation on Using Value Stream Mapping
Published 2022-06-01“…In financial institutions, customer satisfaction is closely related to the continuity of operational processes in financial transactions. First, the authors draw the current value stream map base on the approval and solution process adventure of these error records were handled in the processing logic, analyzed and a value stream map was drawn for the current situation. …”
Get full text
Article -
1178
The Role of the Federal Supreme Court in Ensuring the Supremacy of Moral Custom and Islamic Law in Iraq
Published 2025-01-01“…Conclusion: The results of the research obtained by examining some of the judgments of the Federal Supreme Court in Iraq regarding municipal income from alcohol transactions and the issue of polygamy show that the Federal Supreme Court in Iraq plays an important role in guaranteeing the superiority of moral custom and Islamic Sharia through the annulment of objections against the constitution, because this lawsuit leads to the annulment of the text of the law whose constitution is challenged, and all the authorities accept In case the court issues a verdict that the law is illegal based on moral custom and Sharia law, it is obligatory to not implement this law contrary to the constitution and to take necessary measures to replace or amend it.…”
Get full text
Article -
1179
Advanced Fraud Detection: Leveraging K-SMOTEENN and Stacking Ensemble to Tackle Data Imbalance and Extract Insights
Published 2025-01-01“…Overall, the proposed approach marks a notable step in protecting financial transactions from fraud.…”
Get full text
Article -
1180
Diverse single-stranded nucleic acid binding proteins enable both stable protection and rapid exchange required for biological function
Published 2025-01-01“…Single-stranded nucleic acid (ssNA) binding proteins must both stably protect ssNA transiently exposed during replication and other NA transactions, and also rapidly reorganize and dissociate to allow further NA processing. …”
Get full text
Article