Suggested Topics within your search.
Suggested Topics within your search.
-
21
Measuring the Impact of Social, Economic and Environmental Challenges on Sustainable Development
Published 2025-05-01“…The research method used was the modelling of partial structural equations (PLS-SEM), implemented with the help of the SmartPLS 4.06 software, which allowed the examination of the direct and indirect relationships between the studied variables: social policies (SP), economic policies (EP), environmental policies (PM), quality of life (CV), social equity (ES) and sustainable development (DD). …”
Get full text
Article -
22
Bibliometric Analysis of the Green Deal Policies in the Food Chain
Published 2022-05-01Get full text
Article -
23
Analysis of information flow security using software implementing business logic based on stored database program blocks
Published 2024-04-01“…The procedure also involves analyzing labeled data, in order to control the spread of verified program block output values in external software modules.Conclusions. The technology presented herein does not require developers to include redundant annotations describing security policy rules. …”
Get full text
Article -
24
Software sustainability of global impact models
Published 2024-12-01“…<p>Research software for simulating Earth processes enables the estimation of past, current, and future world states and guides policy. …”
Get full text
Article -
25
VERBAL MODEL OF MANAGEMENT OF A VULNERABLE PROCESS OF DEDICATING THE ACCESS OF USERS TO THE SOFTWARE OF THE ELECTRONIC DOCUMENT SYSTEM
Published 2019-08-01“…This allows you to automate the process of developing access control rules and provide management of the weakly vulnerable process of access control to software tools of the electronic document management system.Result A verbal model is developed for automated control of a weakly vulnerable process of differentiating access to software tools of an electronic document management system, and a system of performance indicators for the functioning of a promising subsystem for protecting confidential information characterizing it as a control object is proposed.Conclusion The presented verbal model provides for the possibility of distributed control, in which the security administrator directly controls the specified process using a remote software tool. …”
Get full text
Article -
26
Research on the Current Status and Key Issues of China’s Green Electricity Trading Development
Published 2025-03-01“…A deeper analysis of recent five-year trends reveals a focus on renewable energy, low-carbon policies, and the relationship between the green electricity economy and environmental development. …”
Get full text
Article -
27
Enhancing Secure Software Development with AZTRM-D: An AI-Integrated Approach Combining DevSecOps, Risk Management, and Zero Trust
Published 2025-07-01“…This paper introduces the Automated Zero Trust Risk Management with DevSecOps Integration (AZTRM-D) framework, a novel approach that embeds security throughout the entire Secure Software and System Development Life Cycle (S-SDLC). …”
Get full text
Article -
28
-
29
A New Approach for Detecting and Resolving Anomalies in Security Policy of the External Firewall Module of the Floodlight SDN Controller
Published 2018-06-01“…In this paper, the authors analyze the developed PreFirewall network application for the Floodlight software defined network (SDN) controller. …”
Get full text
Article -
30
INFLUENCE OF MONETARY POLICY INSTRUMENTS AND INDICATORS ON DYNAMICS OF FINANCING INNOVATION: EMPIRICAL EVIDENCE
Published 2022-07-01“… Today innovations are drivers of countries’ economic growth, competitiveness, security, and sustainable development. Financial policy and its instruments play a significant role in innovation management, and monetary instruments are one of the most important components of financial policy. …”
Get full text
Article -
31
-
32
Driving Path of High-quality Development of China's Artificial Intelligence Technology Industry from the Perspective of Policy Instruments
Published 2024-07-01“…From the perspective of policy instruments, in-depth discussion on the high-quality development path of China's AI technology industry is of great significance to the selection of high-quality development path of China's provincial AI technology industry and the formulation and optimization of government policies in the AI industry. …”
Get full text
Article -
33
Strategic priorities and challenges in research software funding: Results from an international survey [version 2; peer review: 2 approved, 1 approved with reservations, 1 not appr...
Published 2025-01-01“…While research funders have developed programs, initiatives, and policies to bolster research software’s role, there has been no empirical study of how these funders prioritize support for research software. …”
Get full text
Article -
34
Impact of Software Products on Accounting Personnel Requirements
Published 2024-07-01“…Electronic document management system and programm «1С: Accounting 8» performs the calculation part of accounting work, routine operations can be transferred to robots, but software products cannot completely replace an accountant, since there are processes that cannot be formalized, for example, the formation of reporting indicators depends on the selected elements of accounting policy, the choice and decision remains with the accountant. …”
Get full text
Article -
35
Analysis of software defined security model and architecture
Published 2017-06-01“…Currently,most enterprises have deployed information security defense system based on policy access control.With cloud computing environment deployment and network attacking technology development,security has been regarded as one of the greatest problems in the cloud computing environment.The advanced persistent attacks including of bypassing the traditional firewall easily,breaking through the black and white list and feature matching of the security defense mechanism have included to the traditional security system new challenges.The problem in the traditional tightly coupled security defense system of combining the virtual with the true for construction of network environments was described,and a software defined security model and framework was provided.The decoupling scheme of access patterns and deployment position in combining the virtual with the true for construction of network environments was realized,which provided a beneficial exploration in the field of the adaptive active safety for enterprise cloud computing environment.…”
Get full text
Article -
36
”Common Criteria” and Software Defined Network Security
Published 2019-03-01“…Conceptual basis development implies defining the following elements: security objectives and assumptions (for the environment and the object), threats and security policies, as well as functional and assurance requirements. …”
Get full text
Article -
37
Noise pollution in developing countries: Loopholes and recommendations for Vietnam law
Published 2025-01-01Get full text
Article -
38
Building World Hubs for Talents: Understanding Foreign Student Employment Policy Development in China Through the Multiple Streams Framework
Published 2025-07-01“…The rationales, guidelines and objectives in each policy phase are identified by inductive document analysis using NVivo qualitative software. …”
Get full text
Article -
39
-
40
Improvement of China’s healthy city construction policies from the perspective of policy instruments
Published 2025-05-01“…Methods The NVivo software was used to analyze policy tools and construction areas for healthy city development. …”
Get full text
Article