Showing 41 - 60 results of 455 for search '"international standard"', query time: 0.05s Refine Results
  1. 41
  2. 42
  3. 43
  4. 44
  5. 45
  6. 46

    INTERNATIONAL ANTI-CORRUPTION STANDARDS IN THE PRIVATE SPHERE by Tetyana Syroid

    Published 2024-05-01
    Subjects: “…eurocrime, eu legislation, corruption, international organizations, international standards, offenses, legal basis, crime prevention, private sector, universal acts.…”
    Get full text
    Article
  7. 47
  8. 48
  9. 49
  10. 50
  11. 51
  12. 52

    Performance Testing of Twisted Pair Cables by Ahmed F. Mahmoud, Mahmoud I. Abdallah

    Published 2008-01-01
    “…All tests were done on these samples to make sure of using validity and complying with the international standard. After testing the selected samples, it is found that 4% are not satisfying the international standard specification while as 96% are satisfying the international standard specification.…”
    Get full text
    Article
  13. 53

    Advanced Approach to Information Security Management System Model for Industrial Control System by Sanghyun Park, Kyungho Lee

    Published 2014-01-01
    “…Companies in many parts of the world protect sensitive information using the international standard known as the information security management system (ISMS). …”
    Get full text
    Article
  14. 54

    SPECIFICATION OF ACCOUNTING OF FIXED ASSETS UNDER INTERNATIONAL AND RUSSIAN STANDARDS by T. Rogulenko, E. Egorova

    Published 2017-06-01
    “…The current Accounting Regulation «Accounting for Fixed Assets» is compared with the International Standard «Fixed Assets» in terms of determining and recognizing objects in accounting and reporting.…”
    Get full text
    Article
  15. 55

    Study on Standardization of Privacy Protection in Network Environment by Feng Gao, Feng Zhang, Wei Zhou

    Published 2013-04-01
    “…With the development of network technology and its broad applications,more and more applications involve privacy.Therefore,standardization of privacy protection becomes a hot topic.Privacy protection work by international standard organizations was introduced,and then the main features,and difficulty and key points for that were analyzed.According to the analysis,the trend of standardized work in privacy protection was also discussed.…”
    Get full text
    Article
  16. 56

    Research on Internet hotspot information detection by ZENG Yi-ling1, XU Hong-bo1

    Published 2007-01-01
    “…To recognize the hotspot information through great deal of Internet data,the hotspot information detection al-gorithm(HID) was designed.Based on segmented word joint,with a customized noise library and multi-level filtering strategies,HID was provided with the ability to detect hotspot information in large amount of Internet pages.Experiment on TDT international standard test corpus proved the efficiency of HID.…”
    Get full text
    Article
  17. 57

    IMPROVE AUDIT REPORTING BY ANALYZING THE LIQUIDITY OF THE AUDITED ENTITY by S. Ponomareva

    Published 2018-05-01
    “…Focusing on the prospects of applying the international standard of audit 520 «Analytical procedures», in the framework of assessing the financial situation, the author determines that the organization’s audit planning system should be based on personal observations of the auditor, audit data of previous years, budget data, planning and actual calculations. …”
    Get full text
    Article
  18. 58

    DISTRIBUTED LEDGER TECHNOLOGY IN THE BANKING SECTOR: ANALYSIS OF THE VALUE OF Information technology IN REDUCING THE FINANCIAL LOSS OF THE COMMERCIAL BANK by A. Mikhaylova

    Published 2017-10-01
    “…The technique of the international standard of business analysis practice BABOK GUIDE v3 (SWOT-Analysis) is used to identify internal and external factors that affect the organization. …”
    Get full text
    Article
  19. 59

    Manual of References, Creating Tables and Figures in Scholarly Publications: APA 6 Rules by Mehmet Ali Akkaya

    Published 2016-12-01
    “…National and international standard(s) provided for citing and referencing tables and figures, in addition to the content (and context) of the scientific publications might provide the relevant publication to be more widely and correctly read and reviewed. …”
    Get full text
    Article
  20. 60

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article