-
41
Capital adequacy assessment and risks of Russian banks in an unstable economic situation
Published 2020-10-01Subjects: Get full text
Article -
42
Procedural features of interrogating a juvenile suspected of murder
Published 2021-12-01Subjects: Get full text
Article -
43
MEASURES TO REDUCE THE DEFECTIVENESS OF AVIATION PRODUCTS AND ASSESSMENT OF THE EFFECTIVENESS OF ITS IMPLEMENTATION
Published 2021-02-01Subjects: Get full text
Article -
44
International trade through the prism of statistics: problems of accounting, evaluation and analysis
Published 2020-09-01Subjects: Get full text
Article -
45
-
46
INTERNATIONAL ANTI-CORRUPTION STANDARDS IN THE PRIVATE SPHERE
Published 2024-05-01Subjects: “…eurocrime, eu legislation, corruption, international organizations, international standards, offenses, legal basis, crime prevention, private sector, universal acts.…”
Get full text
Article -
47
Peculiarities of Using International Legal Standards in the Field of Ensuring the Rights of Persons Sentenced to Deprivation of Freedom in Ukraine
Published 2020-12-01Subjects: Get full text
Article -
48
PREPARATION OF PHD STUDENTS FOR PEDAGOGICAL ACTIVITY IN HIGHER EDUCATION
Published 2017-09-01Subjects: Get full text
Article -
49
The role of non-governmental public associations in protecting the rights of persons with disabilities in Ukraine during the war
Published 2022-12-01Subjects: Get full text
Article -
50
PILOTING A NEW SET OF THE AEER ACCREDITATION CRITERIA
Published 2016-12-01Subjects: Get full text
Article -
51
Applying international engineering alliance standards in design and quality assurance of the higher and intermediate vocational training
Published 2022-05-01Subjects: Get full text
Article -
52
Performance Testing of Twisted Pair Cables
Published 2008-01-01“…All tests were done on these samples to make sure of using validity and complying with the international standard. After testing the selected samples, it is found that 4% are not satisfying the international standard specification while as 96% are satisfying the international standard specification.…”
Get full text
Article -
53
Advanced Approach to Information Security Management System Model for Industrial Control System
Published 2014-01-01“…Companies in many parts of the world protect sensitive information using the international standard known as the information security management system (ISMS). …”
Get full text
Article -
54
SPECIFICATION OF ACCOUNTING OF FIXED ASSETS UNDER INTERNATIONAL AND RUSSIAN STANDARDS
Published 2017-06-01“…The current Accounting Regulation «Accounting for Fixed Assets» is compared with the International Standard «Fixed Assets» in terms of determining and recognizing objects in accounting and reporting.…”
Get full text
Article -
55
Study on Standardization of Privacy Protection in Network Environment
Published 2013-04-01“…With the development of network technology and its broad applications,more and more applications involve privacy.Therefore,standardization of privacy protection becomes a hot topic.Privacy protection work by international standard organizations was introduced,and then the main features,and difficulty and key points for that were analyzed.According to the analysis,the trend of standardized work in privacy protection was also discussed.…”
Get full text
Article -
56
Research on Internet hotspot information detection
Published 2007-01-01“…To recognize the hotspot information through great deal of Internet data,the hotspot information detection al-gorithm(HID) was designed.Based on segmented word joint,with a customized noise library and multi-level filtering strategies,HID was provided with the ability to detect hotspot information in large amount of Internet pages.Experiment on TDT international standard test corpus proved the efficiency of HID.…”
Get full text
Article -
57
IMPROVE AUDIT REPORTING BY ANALYZING THE LIQUIDITY OF THE AUDITED ENTITY
Published 2018-05-01“…Focusing on the prospects of applying the international standard of audit 520 «Analytical procedures», in the framework of assessing the financial situation, the author determines that the organization’s audit planning system should be based on personal observations of the auditor, audit data of previous years, budget data, planning and actual calculations. …”
Get full text
Article -
58
DISTRIBUTED LEDGER TECHNOLOGY IN THE BANKING SECTOR: ANALYSIS OF THE VALUE OF Information technology IN REDUCING THE FINANCIAL LOSS OF THE COMMERCIAL BANK
Published 2017-10-01“…The technique of the international standard of business analysis practice BABOK GUIDE v3 (SWOT-Analysis) is used to identify internal and external factors that affect the organization. …”
Get full text
Article -
59
Manual of References, Creating Tables and Figures in Scholarly Publications: APA 6 Rules
Published 2016-12-01“…National and international standard(s) provided for citing and referencing tables and figures, in addition to the content (and context) of the scientific publications might provide the relevant publication to be more widely and correctly read and reviewed. …”
Get full text
Article -
60
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article