Artigos de revistas sobre o tema "Maintenance of security order and defense of possessions"

Siga este link para ver outros tipos de publicações sobre o tema: Maintenance of security order and defense of possessions.

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 26 melhores artigos de revistas para estudos sobre o assunto "Maintenance of security order and defense of possessions".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.

1

Чернышева, Г. Н., Г. А. Лавренова, Ю. А. Савич e Э. Б. Лубянская. "ENSURING ECONOMIC SECURITY IN THE LOGISTICS OF THE STATE DEFENSE ORDER". Organizer of Production, n.º 3 (9 de fevereiro de 2022): 171–84. http://dx.doi.org/10.36622/vstu.2021.47.14.015.

Texto completo da fonte
Resumo:
Введение. Логистику закупок на производственных предприятиях, вовлеченных в процесс и получающих государственное финансирование в системе гособоронзаказа, направленного на поддержание военного потенциала государства, принято рассматривать через призму военно-научных, военно-экономических и военно-производственных возможностей государства на содержание и развитие вооружённых сил. Специфика осуществления таких закупок для вооруженных сил, а также для предприятий необходимых для организации производства ресурсов, услуг и работ заключается в дополнительных рисках, которые необходимо вовремя выявлять и предотвращать, так как они могут нанести вред не только экономической безопасности отдельных предприятий, но и нанести вред обороноспособности страны. Несмотря на то, что регламенты и процедуры заключения и выполнения гособоронзаказа строго прописаны в современном законодательстве, представленном широким перечнем федеральных законов и других нормативно-правовых актов (44 -ФЗ, 223-ФЗ, 275-ФЗ, Приказ 334, Постановление 1465 и др.), в силу противоположности интересов Заказчика и Исполнителя и необходимости соблюдения принципа секретности имеют место нарушения административного и уголовного характера в управлении материальными, финансовыми и информационными потоками. В этих условиях применение субъектами системы гособоронзаказа заказчиками и исполнителями логистического подхода управления материальными, информационными и финансовыми ресурсами позволит усилить контроль и надзор на всех этапах реализации ГОЗ и предотвратить потенциальные угрозы и нарушения. Данные и методы. В статье исследуется логистика реализации основных задач гособоронзаказа по стадиям его заключения и исполнения, включающая методы контроля процессов государственных закупок для обеспечения экономической безопасности с учетом специфики распределения бюджетных средств среди основных субъектов, занимающих монопольное положение. В процессе исследования проблем логистики гособоронзаказа был предложен системный подход, в соответствии с которым выделено три основных подсистемы: подсистема государственного заказчика, подсистема головного исполнителя и подсистема кооперации головного исполнителя, взаимодействие между которыми осуществляется через финансовые отношения. Полученные результаты. В статье предложен комплексный подход к организации контроля и надзора движения финансовых ресурсов между подсистемами системы гособоронзаказа. Заключение. Результаты исследования могут быть использованы в качестве теоретической основы для совершенствования логистики в гособоронзаказе. Материал представляет интерес как для государственных заказчиков, так и для руководителей и специалистов предприятий ОПК, являющихся головными исполнителями гособоронзаказа. Introduction. Procurement logistics at manufacturing enterprises involved in the process and receiving state funding in the system of state defense orders aimed at maintaining the military potential of the state is usually considered through the prism of military-scientific, military-economic and military-production capabilities of the state for the maintenance and development of the armed forces. The specifics of such purchases for the armed forces, as well as for enterprises necessary for the organization of production of resources, services and works, are additional risks that need to be identified and prevented in time, since they can harm not only the economic security of individual enterprises, but also harm the country's defense capability. Despite the fact that the regulations and procedures for concluding and executing a state defense order are strictly prescribed in modern legislation, represented by a wide list of federal laws and other regulatory legal acts ( 44-FZ, 223-FZ, 275-FZ, Order 334, Resolution 1465, etc.), due to the opposite interests of the Customer and the Contractor and the need to comply with the principle of secrecy, there are violations of an administrative and criminal nature in the management of material, financial and information flows. Under these conditions, the use by the subjects of the state defense order system by customers and performers of the logistics approach to managing material, information and financial resources will strengthen control and supervision at all stages of the implementation of the state defense order and prevent potential threats and violations. Data and methods. The article examines the logistics of implementing the main tasks of the state defense order by the stages of its conclusion and execution, including methods of controlling public procurement processes to ensure economic security, taking into account the specifics of the distribution of budget funds among the main subjects occupying a monopoly position. In the process of studying the problems of logistics of the state defense order, a systematic approach was proposed, according to which three main subsystems were identified : the subsystem of the state customer, the subsystem of the head contractor and the subsystem of cooperation of the head contractor, the interaction between which is carried out through financial relations. The results obtained. The article offers a comprehensive approach to the organization of control and supervision of the movement of financial resources between the subsystems of the state defense order system. Conclusion. The results of the study can be used as a theoretical basis for improving logistics in the state defense order. The material is of interest both for state customers and for managers and specialists of defense industry enterprises who are the main executors of the state defense order.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Zvozdetska, Oksana. "NATO’s new strategic concept in cybersecurity issues in the context of up-to-the date vulnerability and threat information". Mediaforum : Analytics, Forecasts, Information Management, n.º 6 (17 de dezembro de 2018): 71–93. http://dx.doi.org/10.31861/mediaforum.2018.6.71-93.

Texto completo da fonte
Resumo:
The focus of the article revolves around NATO’s roadmap of smart defense against cyber attacks as the bedrock of Euro-Atlantic security. The author discloses NATO’S new policy and cutting-edge technical initiatives, aimed at focusing on countering global threats and cyber security challenges. It is stressed out, that new ideas towards a more synergetic approach between all the NATO Cyber Defense agencies should be explored to develop a shared framework for cybersecurity that might provide up-to-the date intelligence in order to ensure the development, acquisition and maintenance of the necessary military capabilities. The research highlights the core aspects of the 2010 Lisbon Summit that adopted NATO’s Strategic Concept ‘Active Engagement, Modern Defense: Strategic Concept for the Members of the North Atlantic. Treaty Organization’, that recognizes Cyber Defense as one of its strategic priorities. In particular, to foster Allied Nations’ cooperative efforts to counter terrorism, cyber attacks, prevent the proliferation of nuclear weapons and other weapons of mass destruction (WMD), Reinforce energy security and environmental constraints. Develop the capacity to contribute to energy security, including protection of critical energy infrastructure and transit areas and lines, cooperation with partners, and consultations among Allies on the basis of trategic assessments and contingency planning; In July 2011, NATO Defense Ministers adopted revised NATO Policy on Cyber Defense, which highlighted three areas: • The principles of subsidiarity and proportionality, which involve the assistance provided only upon request, in any other cases, the principle of selfresponsibility of sovereign states is applied; • Avoiding unnecessary duplication of the structures or capabilities and approaches on the international, regional and national levels; • Collaboration based on trust, with regard to the potential sensitivity and vulnerability of the system, the access to which has to be given. After the 2014 Wales Summit, in the revised NATO Cyber Defense Policy, cyber threats were identified as a potential prerequisite for collective defense under the Article 5 of the NATO Treaty. Noteworthy, Cyber Security is responsible for providing the broad spectrum of services in the following specialist security areas: CIS Security, Cyber Defense, Information Assurance, and Computer & Communications Security. Cyber defense is provided by many Alliance bodies: any NATO response concerning collective defense against cyber attacks will be subordinated to the North Atlantic Council (NAC), The Cyber Defense Committee (CDC) – the leading advisory body of the NAC. The executive level is represented by The Cyber Defense Management Board (CDMB), NATO Communications and Information Agency (NCI Agency), Cyber Security incorporates the NATO Computer Incident Response Capability (NCIRC) Technical Centre, providing specialist services to prevent, detect, respond to and recover from cyber security incidents.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Irianto, Dwi Wahyu, Sovian Aritonang e Ansori Ansori. "PEMELIHARAAN RUDAL AIR TO GROUND DALAM RANGKA MENDUKUNG TUGAS TNI AU". Strategi dan Kampanye Militer (SKM) 9, n.º 2 (25 de dezembro de 2023): 17–39. http://dx.doi.org/10.33172/skm.v9i2.14562.

Texto completo da fonte
Resumo:
The Indonesian Air Force (TNI AU) as an integral part of the Indonesian National Army plays a crucial role in maintaining and defending the sovereignty of the nation. However, the TNI AU faces several challenges in maintaining air to ground missiles, which are a vital part of the air defense system. Challenges such as limited maintenance facilities, the quality and quantity conditions of personnel, and insufficient software affect the implementation of maintenance. Therefore, this research will examine the maintenance strategy of air to ground missiles in order to increase the operational readiness and training of the TNI AU in maintaining the security of Indonesian airspace. The research method used is qualitative, using a SWOT analysis to identify strengths, weaknesses, opportunities, and threats related to missile maintenance. This research is conducted at Maintenance Depot 60 with informants chosen purposively. The results of the SWOT analysis will be used as a reference in determining the strategy in the maintenance of air to ground missiles. It is concluded that maintenance facilities, personnel, and software significantly influence the implementation of air to ground missile maintenance
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Korniyenko, Dmytro, e Yuriy Pavlyutin. "The essence of the mechanism of administrative and legal support of service and combat activity of security forces (on the example of the National Guard of Ukraine)". Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 4, n.º 4 (29 de dezembro de 2020): 35–41. http://dx.doi.org/10.31733/2078-3566-2020-4-35-41.

Texto completo da fonte
Resumo:
The article emphasizes that the administrative and legal support of the security forces involves the implementation of the state through a set of legal norms, regulations and means of regulating public relations in the field of security and defense. The narrow definition of administrative and legal support is aimed precisely at the service and combat activities of the security forces. It has been offered to consider administrative and legal maintenance of service and combat activity of security forces as implementation by the state by means of legal norms, instructions and means of streamlining of set of the coordinated and interconnected preventive, protective, protective, mode, isolation-restrictive measures (actions) of bodies, divisions, parts. and individual officials of the security forces, which are carried out in order to ensure the implementation of the tasks facing the security forces in accordance with the law in peacetime and in wartime, as well as crisis situations that threaten national security. The consideration of the mechanism of administrative and legal support of service and combat activity of security forces as a set of legal means, measures and methods by means of which regulation of public relations in the field of service and combat activity of security forces is carried out is substantiated. It has been concluded that the elements of the mechanism of administrative and legal support of the service and combat activities of the security forces include: public relations in the field of providing the service and combat activities of the security forces; authorized subjects of power of the security forces in the field of security and combat activities of the security forces; administrative and legal relations that take place in the process of ensuring the service and combat activities of the security forces; guarantees, measures, means, forms and methods of ensuring the service and combat activities of the security forces. It has been established that a promising area of development of the security and defense sector of the country may be the adoption of a separate Concept of administrative and legal support of combat operations in the field of security and defense (including combat operations of security forces) or other separate regulations.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Santoso, Dewi, e Fadhillah Nafisah. "Indonesia’s Global Maritime Axis Doctrine: Security Concerns and Recommendations". Jurnal Hubungan Internasional 10, n.º 2 (9 de janeiro de 2018): 191. http://dx.doi.org/10.20473/jhi.v10i2.7306.

Texto completo da fonte
Resumo:
Since President Joko Widodo’s administration begins, there has been a new reform forIndonesia’s maritime psyche. The President sees a huge potential in Indonesia’s maritimesector, especially due to its strong and consolidated domain around Indian and PacificOceans. Hence, he came up with an overarching concept of “Global Maritime Axis”,and set it as the main point of his administration. This so-called “Jokowi’s doctrine”fundamentally represents national vision and development agenda to rebuild the country’sidentity as a maritime nation, boosts its maritime culture, and expands its economy fromwhich Indonesians could prosper. This paper seeks to analyze the impact of Indonesia’smaritime vision in foreign and defense policy, specifically upon maritime diplomacy andresolutions of border disputes; maintenance of territorial integrity, maritime sovereignty,good order at sea, security over the outer islands; and safeguards over national resourcesand exclusive economic zones (EEZ). It then ends with examining recent maritime securitydevelopments, which fosters Indonesia’s position as a maritime power with considerablediplomatic influence on the world, and the opportunities therein.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Meleshin, K. Yu, e A. Ye Shabalina. "From the Concept of National Security to the Concept of Civilizational Security as the Basis of Eurasian Integration". EURASIAN INTEGRATION: economics, law, politics 17, n.º 2 (6 de julho de 2023): 143–52. http://dx.doi.org/10.22394/2073-2929-2023-02-143-152.

Texto completo da fonte
Resumo:
In the conditions of the global crisis of the modern world order, the nation-state ceases to be a form adequate to the globalizing world, transforming into corporations-states, on the one hand, and into states-civilizations, on the other. This objectively leads to the transformation of the concept of national security into the concept of civilizational security, corresponding to the needs of transforming states and societies in the conditions of active confrontation of competing concepts of the future global world order.Aim. Substantiation of the evolution of the concept of national security into the concept of civilizational security and identification of its essence.Tasks. Identification of objective reasons for the evolution of security concepts, their differences and essence, development of proposals for the formation of the concept of Eurasian civilizational security.Methods. The structural-functional approach, comparative-historical analysis, system analysis, generalization, synthesis were used.Results. In the process of the development of the global crisis of the world order, there is a growing crisis of national states as a form of organization of societies. In parallel with the transformation of the nation-state into a corporation-state and a state-civilization, there is an objective process of formation of a new concept of civilizational security. The main objects of civilizational security are systems of civilizational values and civilizational identities that ensure the very existence of both civilizations and civilizational States.Conclusions. The ess ence of civilizational security is the maintenance and defense by civilization of its identity based on its own system of values, its model of society and the state, its system of historical and spiritual coordinates.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Tolstonosov, Yu, D. Tolstonosov e S. Kravchenko. "PROBLEM ISSUES OF THE ORGANIZATION OF INTERACTION BETWEEN THE NATIONAL GUARD OF UKRAINE AND SUBJECTS OF THE DEFENSE FORCES OF UKRAINE DURING THE PERFORMANCE OF STATE SECURITY TASKS UNDER THE CONDITIONS OF THE STATE OF MARTIAL". STATE SECURITY 1, n.º 1 (2023): 75–79. http://dx.doi.org/10.33405/2786-8613/2023/1/1/288277.

Texto completo da fonte
Resumo:
The article examines the problems of interaction between the National Guard of Ukraine and other entities of the Defense Forces of Ukraine, analyzes important aspects of this interaction, and identifies problems that arise in the joint performance of tasks to ensure state security in the conditions of martial law. The article provides recommendations and approaches that can play an important role during planning, management and application by the National Guard of Ukraine and other subjects. In the opinion of the authors of the article, such recommendations can be:urgent improvement of domestic legislation, regarding the organization of effective interaction between NSU and other subjects for their joint actions to ensure state security during martial law; a clear distribution of authority, subordination and control, which should encourage coordinated joint actions between subjects;creation of an appropriate structure in management bodies for organization, coordination of efforts and maintenance of effective interaction between subjects;creation of a complex of support for subjects access to up-to-date information, convenient communication channels, which will allow the subjects management bodies to identify emerging risks in a timely manner and quickly take appropriate measures to respond to them; systematic coordination of the use of forces and means of subjects and the sequence of their actions during the performance of both joint and separate service-combat tasks;establishment and constant maintenance of mutual understanding among interacting subjects regarding the ways and means of achieving a common goal; organization and holding of a sufficient number of joint service meetings, training meetings (team-building events) of subjects, which will contribute to the development of trust, mutual assistance and reduction of the degree of mistrust and conflicts between them; the unity of views of the subjects on the preparation, maintenance and coordination of the relevant operational and service documentation; early determination of tasks, order of organization and maintenance of interaction of management bodies of subjects during preparation and during operations (combat operations); conscientious performance by officials of NSU and other subjects of their duties and obligations and adequate responsibility for non-fulfillment of previous agreements. The problems outlined in the article and the recommendations provided make a valuable contribution to the development of effective mechanisms of interaction between the NSU and other subjects of the defense forces of Ukraine, which contribute to the improvement of the overall state security of Ukraine in the conditions of a military conflict.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Bespalko, I. A., L. D. Hrekov, D. V. Pekariev e D. L. Fedorchuk. "The concept of information system for providing monitoring of space in order to increase military security". Kosmìčna nauka ì tehnologìâ 28, n.º 4 (9 de agosto de 2022): 03–17. http://dx.doi.org/10.15407/knit2022.04.003.

Texto completo da fonte
Resumo:
The concept of an information system to provide the monitoring of space in order to increase military security is proposed with the accounted-for peculiarities of solving problems by the domestic structures of the security and defense sector. The concept is based on the separation of the functionality of open and specialized parts of the algorithm and software support for analyzing the space situation with the attainment of their compatibility. The results of the capability analysis of the publicly available software, which can be used for the evaluation of the space situation as an additional means, are presented. The functional model of the information system to provide the monitoring of space was developed, and a decomposition of its main functional block — a general assessment of the space situation has been carried out. The main software components of the algorithm and software support for the overall estimating of the space situation are determined: detection and monitoring of space objects, maintenance of the database of space objects, modeling and display of the space situation, and their main tasks are outlined. The structural scheme of the software and hardware complex of the general estimation of space situation is developed. Further ways of research are offered: concretization of the functionality of the components of the algorithms and software support of the general estimation of the space situation, substantiation and development of databases’ structures of space objects and objects of space activity, creation of the relevant software and hardware complexes and check of the adequacy of the used mathematical models, as well as issues of information security.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Kim, Sang Jin. "The Role of Private Security for a Quarantine and Social Safety Net after the COVID-19 Pandemic: Consensus Control and Reorganization of Safe Society". Forum of Public Safety and Culture 20 (30 de janeiro de 2023): 139–58. http://dx.doi.org/10.52902/kjsc.2023.20.139.

Texto completo da fonte
Resumo:
This study examines the gap (control of infected people and citizens, maintenance of order in hospital facilities, management of quarantine facilities, vaccine supply and demand, etc.) caused by a lack of quarantine response personnel in the process of responding to the COVID-19 pandemic in our society through private security in the event of a recurrence of the pandemic. It was conducted to present it as a good for building a quarantine social safety net. To this end, the purpose of this study is to estimate the role that private security can play as a good for health security and how it will affect the agreed-upon control and safety society reorganization structure. After the presentation, the results were drawn through two interviews. A total of 10 people were selected for the study, including 6 practitioners and 4 researchers. The first interview was held from May 1 to 30, 2021, and the second interview was held from October 1 to November 5, 2021. Investigation results, research project 1. Regarding the 'role of private security for the establishment of an anti-epidemic social safety net', cooperation with public security (12) is 'support for the quarantine authorities to maintain order,' and the expansion of service services (12) is 'maintenance of order in the clinic, vehicle control, and guidance. For the role of 'work, simple administrative assistance work', and the role of assisting quarantine activities (4), the 'role of temporarily supplementing and supporting the work (maintenance of order in inspection clinics, vehicle control and guidance work, etc.) of insufficient medical personnel' was the most showed a high response. Research project 2. Regarding the 'precedence of private expenses for agreed control', cooperation with the quarantine authorities (4) refers to 'whether it is about establishing and supporting a business cooperation system between the quarantine authorities and private security', promoting local governments and strengthening cooperation ( 8) is 'continuous publicity development so that citizens can recognize and sympathize with the role of private security guards in their duties, such as control and guidance', and securing credibility and public confidence (6) is 'to inspire citizens' mature awareness of participation, public institutions, the media, Cooperation activities with civic groups, etc.' was the highest response by factor. Research project 3. As for 'alternatives to the priority of private security for agreed control', securing service quality and professionalism (5) means 'reinforcing education so that private security officers can clearly know their authority and duties', and improving image (8).), 'Strengthening public relations activities to change public perception', and 'Securing the budget of public institutions for the use of private expenses' for privatization and preparation of legal basis (16) showed the highest response by factor. Research project 4. Regarding 'Prospects for Security Reorganization Structure', the confidence in private security and the opportunity to take another leap (9) are 'the effect of increasing the use of private expenses due to cooperation in disaster situations', improving the government's awareness of the private defense system and increasing immunity (7) is 'the effect of incorporating private security as a safety resource into the total force mobilization system in the case of a national disaster', and the effect of increasing the quarantine social safety net (7) is 'preventing the overuse of some quarantine authorities due to the use of alternative resources for private quarantine agents. ' was the highest response for each factor.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Mamlyuk, Boris N. "Uniting for “Peace” in the Second Cold War: A Response to Larry Johnson". AJIL Unbound 108 (2014): 129–34. http://dx.doi.org/10.1017/s2398772300002014.

Texto completo da fonte
Resumo:
Larry Johnson’s timely and important essay challenges both utopian and realist accounts of UN law and practice by reviving the debate over the nature and functions of the UN General Assembly, particularly the General Assembly’s power to deploy certain legal tactics not only to influence collective security deliberations in the UN Security Council, but also, more significantly, to provide some legal justification for multilateral military “collective measures” in the event of Security Council gridlock. One vehicle by which the General Assembly may assert its own right to intervene in defense of “international peace and security” is a “Uniting for Peace” (UFP) resolution, authorized by resolution 377(V) (1950). At its core, a “uniting for peace” resolution is an attempt to circumvent a Security Council deadlock by authorizing Member States to take collective action, including the use of force, in order to maintain or restore international peace and security. General Assembly resolution 377(V) does not require resolutions to take specific legal form—language that echoes the preambular “lack of unanimity of the permanent members [that results in the Security Council failing to] exercise its primary responsibility for the maintenance of international peace and security” is sufficient to render a given resolution a UFP, provided the General Assembly resolution calls for concrete “collective [forceful] measures.” For this reason, experts disagree on precisely how many times a UFP has indeed been invoked or implemented, although informed analysts suggest UFP has been invoked in slightly more than ten instances since 1950.
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Sulistiyanto, Siswo Pujiatmoko, Much Mualim e Nugroho Adi Sasongko. "PT PAL Empowerment Strategy as a Lead Integrator at ALPALHANKAM KCR 60 to Support State Defense at Sea". IOP Conference Series: Earth and Environmental Science 972, n.º 1 (1 de janeiro de 2022): 012059. http://dx.doi.org/10.1088/1755-1315/972/1/012059.

Texto completo da fonte
Resumo:
Abstract Research on the empowerment of PT PAL as a Lead Integrator on the KCR 60 Defense Security Equipment Tool (ALPALHANKAM) to support national defense at sea as part of the Alutsista readiness within the scope of Defense Management. This study is important because according to the Law Decree No: 16 of 2012 on Defense Industry which states that one of the government-owned defense industries designed as Lead Integrator (main guide) is PT. PAL Indonesia Persero. The tasks and functions of the 60 m Fast Missile Ship (KCR 60) are very significant with a relatively small size but because it is equipped with Anti-Surface Missiles, the “deterrence effect ” becomes very large both regionally and globally. This study has the objective to analyze the condition of the involvement of PT PAL as Lead Integrator in the development and maintenance of KCR 60 and empowerment strategies that must be implemented in order to promote the progress of shipbuilding companies nationwide ground water either owned by the government (SOEs) and private (BUMS) to support national defense at sea. In addition to PT PAL, the role of the TNI-AL as the user of the KCR 60 is very important and dominant so that research is carried out starting from the TNI-AL Headquarters, Koarmada, the Fast Boat Unit in the Koarmada and KRI as a tactical unit carrying out field operations. The research method used is qualitative where primary data collection is done by interview, observation and secondary data derived from literature review and researching facts and data in the field up to the smallest unit, namely KRI and from various publications in the form of books, journals and mass media and social media related to the object of research. The data analysis technique used is the interactive model of Miles & Huberman.
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Obadeyi, Juliana A., e Felicia S. Adeyemo. "Excellent Customer Services and Tax Revenue Generation: A Theoretical and Conceptual Review". Advances in Multidisciplinary and scientific Research Journal Publication 9, n.º 3 (30 de setembro de 2023): 9–20. http://dx.doi.org/10.22624/aims/sij/v9n3p2.

Texto completo da fonte
Resumo:
Revenue generation from taxpayers is one prime and important component of government fiscal acquisitions. Taxation is the process of levying and collection of tax from taxable persons and organizations or establishments. The objectives of government using taxation include revenue generation to help the government to finance increasing public sector expenditure and to promote social, economic and good governance through provision of merit goods. Merit goods include health and education that must not be left solely to private hands, though private participation should also be encouraged. Revenue generated from tax can also be used to provide commonly consumed goods and services for which individuals cannot be levied. Public goods include internal security through maintenance of law and order by police and other security agencies, external security through defense against external aggression by Navy, Army and Air Forces, and provision of basic amenities such as pipe borne water, street lights and roads. We reviewed tax customer services provided by internal revenue agencies and explore options that are available for excellent customer services to be provided in this parlance. We conclude by identifying gaps in the research domain as a way of setting the stage for further research on the subject matter Keywords: Revenue, Government, Tax, Taxation, Public Good, Fiscal, Finance, Security, Customers Journal Reference Format: Obadeyi Juliana Adepeju & Adeyemo, Felicia (2023): Excellent Customer Services and Tax Revenue Generation - Theoretical and Conceptual Review. Social Informatics, Business, Politics, L:aw, Environmental Sciences & Technology Journal. Vol. 9, No. 3. Pp 9-20 www.isteams/socialinformaticsjournal. dx.doi.org/10.22624/AIMS/SIJ/V9N3P2.
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Chitak, V. V., e Yu I. Usmanov. "International and national legal analysis of the state of information security of Ukraine in conditions of armed conflict". Uzhhorod National University Herald. Series: Law 2, n.º 76 (14 de junho de 2023): 271–77. http://dx.doi.org/10.24144/2307-3322.2022.76.2.43.

Texto completo da fonte
Resumo:
The article discusses, the international and national legal regulation of Ukraine’s information security is examined following the armed conflict initiated by the Russian Federation and the subsequent aggression against Ukraine. The main challenges and threats are analyzed, focusing on the role of various actors in ensuring Ukraine’s information security in the present day.It is noted that fostering favorable conditions for Ukraine’s political development constitutes the country’s national interests. These primary interests include ensuring the effective exercise of political rights and freedoms for citizens to satisfy individual human interests, strengthening democracy to fulfill societal interests, and providing effective protection of the constitutional order, sovereignty, and territorial integrity of the country. Additionally, these interests encompass the establishment and maintenance of political stability, including the stability of state power and its institutions. In the sphere of information security, Ukraine’s national interests are employed to shape the strategic and current tasks of state policy.The study demonstrated that effective information activities and the utilization of key international legal documents can significantly enhance a state’s efforts towards peaceful crisis resolution. In particular, information technologies can help expand the capabilities of ensuring a country’s defense capacity. The efficient use of information technologies assists Ukraine in its information confrontation with Russia, achieve its strategic goals, and ensure national security.Additionally, the article emphasizes that neglecting information factors or distorting information can provoke radical sentiments and flare-ups of hostility, potentially leading to the destabilization of the situation in the country and catastrophic consequences for national security.Consequently, information security is a vital component of Ukraine’s national interest, and fostering favorable conditions for the political development of the country is essential for achieving national security and protecting the state’s interests.
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Pan, Jeng-Shyang, Fang Fan, Shu-Chuan Chu, Hui-Qi Zhao e Gao-Yuan Liu. "A Lightweight Intelligent Intrusion Detection Model for Wireless Sensor Networks". Security and Communication Networks 2021 (30 de abril de 2021): 1–15. http://dx.doi.org/10.1155/2021/5540895.

Texto completo da fonte
Resumo:
The wide application of wireless sensor networks (WSN) brings challenges to the maintenance of their security, integrity, and confidentiality. As an important active defense technology, intrusion detection plays an effective defense line for WSN. In view of the uniqueness of WSN, it is necessary to balance the tradeoff between reliable data transmission and limited sensor energy, as well as the conflict between the detection effect and the lack of network resources. This paper proposes a lightweight Intelligent Intrusion Detection Model for WSN. Combining k-nearest neighbor algorithm (kNN) and sine cosine algorithm (SCA) can significantly improve the classification accuracy and greatly reduce the false alarm rate, thereby intelligently detecting a variety of attacks including unknown attacks. In order to control the complexity of the model, the compact mechanism is applied to SCA (CSCA) to save the calculation time and space, and the polymorphic mutation (PM) strategy is used to compensate for the loss of optimization accuracy. The proposed PM-CSCA algorithm performs well in the benchmark functions test. In the simulation test based on NSL-KDD and UNSW-NB15 data sets, the designed intrusion detection algorithm achieved satisfactory results. In addition, the model can be deployed in an architecture based on cloud computing and fog computing to further improve the real-time, energy-saving, and efficiency of intrusion detection.
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Gumilar, M., e Eka Apriansyah. "Stabilisasi Tanah Lempung Dengan Semen Dan Pasir Laut". JURNAL ILMIAH BERING'S 3, n.º 02 (10 de outubro de 2016): 49–55. http://dx.doi.org/10.36050/berings.v3i02.105.

Texto completo da fonte
Resumo:
Based on the times the need for careful consideration of the environment around us. Both in the review in terms of economy, industry, agriculture, social, cultural and defense security to be leveling development outcomes will be achieved. Factors supporting these areas is the availability of an adequate road traffic in order to smooth transportation of goods and people. On the other hand to meet the needs of road infrastructure should be review or analysis back when confronted with clay soil stabilization conditions is low, so the cost of which is issued for road maintenance will be higher. Therefore in need through quality improvement efforts penghemetan Yanah on its use for road construction, especially road base by way of mixing the soil with cement and sand. research that we have done with mnggunakan addition of cement and sand and the sea, with a cement content of 8%, 10%, 12%, 14%, and 16% can result in the addition of as much as 14% cement content is the addition that produces the best quality.
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Hermann Léopold, HOUESSOU. "THE " REPUBLICAN POLICEMAN" ACCORDING TO THE OTHER IN ABOMEYCALAVI (BENIN)". International Journal of Agriculture, Environment and Bioresearch 07, n.º 04 (2022): 01–14. http://dx.doi.org/10.35410/ijaeb.2022.5739.

Texto completo da fonte
Resumo:
In Benin, the "Republican Police" is defined as a single internal security force, resulting from the merger of the former national police and the former national gendarmerie of Benin in accordance with law N ° 2017-41 of December 29, 2017. Article 2 of Decree No. 2018-314 of July 11, 2018 stipulates that the Republican Police is a paramilitary force established to ensure public security, the maintenance of order and the execution of laws. It has jurisdiction over the entire territory, including paramilitary and military personnel as well as military barracks, air bases and naval force buildings. The police officer is therefore invested with missions that can put him in “situation” with all the components of society, including his own colleagues. This state of affairs generates a host of opinions related to the police in the execution of their sovereign missions. This research aims to analyze the perceptions of the Republican policeman in the town of Abomey-Calavi. To achieve this, recourse is made to a methodological approach based on documentary research, field investigation and observation. The interviews carried out with 32 respondents composed of citizens, municipal elected officials, road users, prisoners, market women, but also agents of public security and defense forces were approached. It emerges from the analysis of the data carried out under the prism of the symbolic interactionism of H. Blumer, that the Republican police officer is much more concerned with something other than the security and the free movement of people and their goods. Some people surveyed think that the police officer is often misunderstood and is the object of contempt. For still others, the police officer must be more professional to avoid prejudices that are detrimental to the institution.
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Shevchenko, O. "Environmental and food security as components of ensuring the economic security of Ukraine in a strategic format". Uzhhorod National University Herald. Series: Law, n.º 68 (24 de março de 2022): 110–17. http://dx.doi.org/10.24144/2307-3322.2021.68.18.

Texto completo da fonte
Resumo:
The article reveals the evolution of environmental and food security in Ukraine’s national security strategies during the years of independence. It is determined that at the state level a number of issues related to the creation of the most effective system of environmental and food security of the state within the existing at different stages of statehood National Security Strategies of Ukraine, both at the legislative level and in the functioning of relevant competent government agencies. The content of ensuring the ecological and food security of the state in four national security strategies of Ukraine is revealed. It is determined that the issue of environmental and food security of the state needs a clear definition of the state in strategic priorities and goals that should meet current trends in the national economy and world realities in this area. Threats to national security in the field of environmental and food security have been studied. It was emphasized that in accordance with the Final Provisions of the National Security Strategy of Ukraine 2020 on the development of planning documents in the field of national security and defense, which will determine ways and tools for its implementation, clearly regulates the adoption and approval of the President food security. The Strategy of Environmental Safety and Adaptation to Climate Change until 2030, adopted by the Cabinet of Ministers of Ukraine on October 20, 2021 in order to increase the level of environmental safety, reduce the impacts and consequences of climate change in Ukraine, is analyzed. The implementation of the Strategy is aimed at fulfilling Ukraine’s international obligations under the Paris Climate Agreement to reduce greenhouse gas emissions and adapt to the effects of global climate change. The main environmental threats to Ukraine in this Strategy are: a significant level of air pollution, water and land resources, imperfect system of state supervision (control) and monitoring of the environment. The draft order of the Cabinet of Ministers of Ukraine “On approval of the Food Security Strategy for the period up to 2030”, which will be aimed at defining priorities in the field of food security as a component of national security, the importance of preventing hunger and malnutrition of the most vulnerable. It will include: the establishment of a system of national and regional food security monitoring to detect and prevent food threats; development and implementation of an action plan to provide the population with food in emergency situations; measures for the development of sustainable agricultural production; diversification of production; creation of sustainable production and marketing systems. It is emphasized that the most striking indicator of effective implementation of national Strategies in the field of environmental security and food security should be maintaining the proper natural state of our country’s ecology and the formation of a sufficient level of self-sufficiency in food of Ukraine. The directions of increase of efficiency of maintenance of ecological and food safety of Ukraine are defined.
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Ritu Dewan. "IoT based Efficient and Secure Building Architecture with Constrained Application Protocol (CoAP)". Journal of Electrical Systems 20, n.º 7s (4 de maio de 2024): 1456–67. http://dx.doi.org/10.52783/jes.3717.

Texto completo da fonte
Resumo:
The Internet of Things (IoT), one of the newest technologies, has great potential for many industry businesses. Smart building technology is one of the biggest IoT industries. IoT is used on a regular basis in many different industries. It is used in a variety of contexts, including physical defense, e-health, smart buildings, grids, cities, homes, asset management, and transportation management. IoT-level, networked smart buildings offer affordable assistance. Comfort, accessibility, security, and energy management are necessary for commercial space. Naturally, IoT-based solutions can satisfy these requirements. With the depletion of the energy supply and the increase in demand for energy, there has been a growing focus on energy usage and building maintenance. This paper uses emerging IoT technology to demonstrate a smart building design that is both safe and energy-efficient. Constrained Application Protocol (CoAP) is a crucial internet transmission protocol that assigns a unique address to every device. Data is transferred using this application layer protocol outside of secure channels. While there are several recommended techniques to protect sensitive data transfer, one likely way to improve the security aspect of CoAP for authentication and end-to-end security is through the use of Datagram Transport Layer Protection (DTLS).This paper propose a smart building design in which the Internet of Things is used to control the operation of all technological components. The simulation results show that compared to the situation of employing Message Queuing Telemetry Transport (MQTT), adopting CoAP in a smart building saves energy use by around 34.86%. In order to increase security in a smart building, this article also explains how to include the DTLS protocol inside of CoAPutilising enhancements from the Certificate Authority (CA).Finally, using the ContikiCooja (CC) simulator to simulate system performance and data collecting in terms of latency, throughput, and resource consumption, CoAP is utilized to modify orderer and peer nodes for performance research in smart building.
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Antoshkin, Vadim, e Lidia Antoshkina. "Conceptual provisions for preserving economic security in the conditions of war and martial law". University Economic Bulletin, n.º 55 (29 de dezembro de 2022): 77–83. http://dx.doi.org/10.31470/2306-546x-2022-55-77-83.

Texto completo da fonte
Resumo:
The subject of the research is conceptual provisions about the structure, components and threats of economic security in the conditions of martial law and war; possibilities of its preservation and maintenance. The purpose of the article is to substantiate the conceptual provisions regarding the structure and components of economic security in military conditions, as well as the possibilities of its preservation and support. The methodological basis of the article is the methods of dialectical unity and contradiction, historical, monographic, system-structural analysis and synthesis; statistical and economic methods (absolute and relative values, index, grouping and ranking), mathematical programming and modeling. Results of the article. It was revealed that the structure of economic security is formed by the following structural blocks: international politics, world economy, globalization processes; economic, state and public institutions; resources and productivity; ideology, strategies and models of the country's development; monitoring, methods of evaluation and diagnosis and forecasting. Factors affecting it are sources of formation and threats and risks of destruction. It was determined that the main threat to the economic security of Ukraine was the long-term Russian aggression and war, especially starting in 2022. It was not brutal, it led to the capture of approximately 20% of the territory; large-scale destruction of public infrastructure, energy, housing stock, industry and agriculture; displacement of millions of people; murders of hundreds of thousands of people; inflation and devaluation and threats of default; curtailment of social programs. Direct losses are accompanied by no less devastating indirect ones. Further measures to support economic security should be based on constant monitoring of not only the economic, but primarily the military situation, quantitative assessments and forecasts. Field of application of results. The conclusions of the article can be used in enterprises, institutions of higher education, research institutions, consulting organizations. Conclusions. Under these conditions, the state authorities, with the help of the international community, implemented the following measures for its preservation: the institutions of the executive power were optimized; millions of people and enterprises, institutions of higher education, etc., were relocated. to relatively safe places; budget expenditures were optimized and defense funding was increased; applied digital and online tools of activity and management. Law and order and personal safety of citizens in controlled territories are ensured; the integrity of the economy through the work of the banking, tax, customs systems, markets, trade and export-import operations. Further measures to support economic security should be based on constant monitoring of not only the economic, but primarily the military situation, quantitative assessments and forecasts.
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

RADIONOV, Yurii. "THE STATE’S FINANCIAL RESOURCES MANAGEMENT UNDER MARTIAL LAW". Economy of Ukraine 2023, n.º 1 (28 de janeiro de 2023): 20–43. http://dx.doi.org/10.15407/economyukr.2023.01.020.

Texto completo da fonte
Resumo:
The legislative, normative legal acts adopted during martial law, which regulate the filling of budgets and using financial resources, are analyzed. It is established that in September 2022, compared to March, the deficit of the consolidated and state budgets increased several times. The analysis of the sources and structure of revenues and directions of state and local budgets spending for the nine months of 2022 by areas, including the study of budget programs, showed that most of the state budget expenditures were made on the country's defense, social security of the population, performing the main functions of the state, in particular, the public order maintenance, security and the exercise of powers by the judicial branch of government. Local budgets are entrusted with ensuring the educational process and financing the entire housing and communal services sector of the country. To increase significantly the efficiency and effectiveness of the use of state financial resources, it is proposed to introduce new methodological and organizational approaches in budget expenditures management. It is noted that in wartime, old organizational forms, methodological approaches are not applicable, because they not only fail to meet the requirements of market relations, including in terms of ensuring the efficiency of management and use of financial resources, but also remain a factor of danger, deformation of task performance in entire state management system. In this situation, there is an opportunity to start reforms, to apply more effective methods, principles, and means of methodological and organizational support for the activities of each government-funded, and not only such, institution and organization. This applies to both the main manager of budget funds and the manager of a lower level, recipients of budget funds, that is, from the ministry to any other institution or organization for the purpose of designing a new organizational management system based on a systemic approach to management and use of budget expenditures to improve the efficiency of using financial resources, increase the effectiveness of state's financial, budgetary and economic policy.
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Barannik, D. "METHOD OF TWO-STAGE IMPLANTATION OF HIDDEN INFORMATION BASED ON STEGANOCOMPRESSION TRANSFORMATIONS". Information and communication technologies, electronic engineering 4, n.º 1 (12 de maio de 2024): 31–38. http://dx.doi.org/10.23939/ictee2024.01.031.

Texto completo da fonte
Resumo:
In the article, the need for further development of the state is directly related to: solving issues of increasing defense capability and information security; development of information and intelligent systems. The necessity of ensuring the required level of completeness of information, compliance with the requirements of its relevance, achievement and maintenance of the appropriate level of integrity, accessibility and confidentiality is substantiated. The article emphasizes that for this purpose, complex systems of coding and information protection are being built. It is shown that recently, in order to further increase the level of security of information resources, methods of hidden embedding of information have been used. In this field of scientific and applied research, the direction of timely delivery of integral video information in a secure mode is outlined. For protection, the following can be used: meta-messages, which are formed on the basis of intelligent analysis of video frames; separate video segments of aerial photographs containing the most important information for decision-making. This article examines a class of methods of steganographic transformations, which are associated with embedding messages in digital containers, which are formed by a stream of video segments (VS). However, existing steganographic systems are based mainly on the use of the amount of psychovisual (PSV) redundancy available for reduction. Therefore, an increase in steganographic capacity leads to a loss of integrity and efficiency of delivery of video-container information. Steganocompression coding in the stegano-polyadic basis was created on the basis of taking into account the amount of redundancy permissible for reduction. In this case, in the process of compression of the components of the VS, the direct embedding of hidden information is organized. Concealment of information is carried out by technological stages, depending on the compression transformation of the transitional syntax of the quilted sequence. The key stage is the technology of two-stage implementation of the elements of the concealed message added to the stegano sequences to the syntax of the steganocompression representation of the BC components.
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Volkov, I., e О. Batiuk. "CERTAIN ASPECTS OF THE LEGAL REGULATION OF THE PROCESS OF COMPENSATION BY PERSONS OF THE OFFICERS FOR COSTS RELATED TO THEIR KEEPING AT INSTITUTIONS OF HIGHER EDUCATION IN THE CONTEXT OF CONDUCTING CLAIMS". Scientific journal of the National Academy of National Guard "Honor and Law" 2, n.º 85 (2023): 58–64. http://dx.doi.org/10.33405/2078-7480/2023/2/85/282542.

Texto completo da fonte
Resumo:
Issues related to the organization of the activities of military structures have always been and will be one of the relevant areas of scientific research in various fields. The procedure for completing military service can be an element of the subject of the study of science in the field of administrative law, as a tool for the analysis of social relations in the sphere of public administration, on the one hand, and the system of legal norms studying their regulation, on the other. Legal regulation of order with persuasion and coercion is part of the legal functional methods of state management of the essence, which has a legal impact on the socio-legal sphere and its individual elements in the process of social relations, the main participant of which is the state government. An important part of the organizational activity of the structural components of the security and defense sector of the state, as part of the state management mechanism, is to ensure the effectiveness of personnel training and optimization of state budget expenditures in this area. In cases of early termination of the contract for military service in officer positions by individual graduates of higher military educational institutions, the implementation of compensatory mechanisms implemented by the state is ensured against such persons incurring expenses related to their maintenance in higher education institutions, including by conducting claims lawsuit work. The article examines separate issues of legal regulation of the process of reimbursement of expenses related to maintenance in institutions of higher education during studies by officers who have not served the five-year term of military service in the relevant positions established by law. On the basis of the analysis of the legislation and taking into account the results of practical activities in the specified area, recommendations were made aimed at optimizing the conduct of claims and lawsuits in this category of cases. Separate algorithms of actions are proposed, the task of which is to improve the effectiveness of the implementation of compensatory mechanisms for compensation by officers, dismissed from military service on the grounds specified by law, of costs associated with their retention in institutions of higher education, including by conducting claims and lawsuits work.
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Chaikovska, Leonida, Liuda Panibratets, Serhii Stepanov, Vladyslava Hriniv e Volodymyr Kaskiv. "STATE OF BRIDGE FACILITIES OF UKRAINE ON PUBLIC ROADS OF NATIONAL IMPORTANCE IN THE CONTROLLED TERRITORIES IN 2023". Dorogi i mosti 2024, n.º 29 (17 de maio de 2024): 280–92. http://dx.doi.org/10.36100/dorogimosti2024.29.280.

Texto completo da fonte
Resumo:
Introduction. Bridges are important critical infrastructure facilities; they play a key role in economic development and ensure the security of regions and the state as a whole. During the period of martial law, bridges became an important element of the country's defense capability, as well as routes for humanitarian evacuation and export logistics. To make effective management decisions at the level of the State Agency for the Restoration and Development of Infrastructure of Ukraine in the field of bridge management, the Analytical Expert Bridge Management System (AESUM) software package is being implemented. Problem statement. In connection with the introduction of martial law in Ukraine, ensuring the proper functioning of the bridge sector has become of great social importance, since the availability of sustainable transport links allows to ensure the vital activity of the population and the functioning of the state under martial law. It is also important to improve the strategy of operation of transport facilities, taking into account the scientific and analytical apparatus of the AESUM software package. Objective. Implementation of an effective strategy for the operation of bridges on highways in order to plan financial resources for their repair and maintenance. Providing the general public with up-to-date statistical information on bridges from AESUM will be useful for scientific and practical purposes, and identifying certain analytical trends will allow to improve AESUM in terms of forming a strategy for the operation of transport facilities. Materials and methods. Analytical, statistical, system analysis. Results. The paper presents analytical and statistical information on transport facilities on public roads of national importance in the controlled territories of Ukraine as of the end of 2023. Certain trends have been identified and the technical condition of transport facilities has been focused on.
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Andrusyshyn, B. I. "Continuity of legal traditions of Ukrainian legislation (Constitutional projects by George Andruzsky)". TRANSFORMATION LEGISLATION OF UKRAINE IN MODERN CONDITIONS DOCTRINAL APPROACHES AND MEASUREMENTS, n.º 14 (1 de setembro de 2023): 100–107. http://dx.doi.org/10.33663/2524-017x-2023-14-100-107.

Texto completo da fonte
Resumo:
The legislative process of the first half and middle of the 19th century is considered. in Ukraine, in particular, the constitutional projects of Cyril and Methodius. A historical and legal analysis of the constitutional drafts of the youngest member of the Cyril and Methodius Brotherhood, George Andrusky, entitled «Outlines of the Constitution of the Republic» was made. The influence on the preparation and content of the documents of the ideas of the «Book of the Being of the Ukrainian People» and the revolutionary ideas of Taras Shevchenko is emphasized. Against the historical background of the era, the reaction of the tsarist guard to the creation of St. Volodymyr’s Kyiv University and its role in modern Ukrainian nation-building, the formation of ideas of political resistance and free-thinking are highlighted. The work of Ukrainian lawyers, historians, philosophers who studied this problem was analyzed. The historical and legal features of Ukrainian constitutionalism, the influence of the Cyril-Methodist heritage on the germs of civil society ideas in Ukrainian political and legal thought are highlighted. The evolution of the constitutional concept of H. Andruzhsky from the ideas of the constitutional monarchy to the republican form of government is revealed. The ideas of equality before the law of the rights of citizens, the need to abolish serfdom and estate privileges, land reform in the context of giving peasants land, the introduction of political freedoms, a fair tax system for the population, the creation of an accessible general education system, the establishment of central and local press, military reform, defense of Ukrainians’ right to their language, literature, and culture in general. Considerable attention is paid to the structure of state power of the future state, especially local self-government, the community, which in the project is almost the main, basic link of the state. A solution to the problems of health care and social security is proposed. Worthy of attention in the project are the provisions that set out the requirements for candidates for management positions, in which the age, educational and residency qualifications, the absence of a criminal record and other punishments during the last three years, and the voting procedure were established. The order of coexistence with neighboring countries, first of all with Slavic countries, was envisaged. The statement that the basis of the state’s well-being is the agricultural sector is considered relevant. The essence of a citizen’s freedom, religious education at school, maintenance of the church at the expense of the community has been determined. It is emphasized that the thoughts and considerations expressed by H. Andruzky in the draft constitution were developed in the future in the process of development of Ukrainian constitutionalism and law-making. Key words: Ukraine, Cyril and Methodius brotherhood, George Andrusky, Taras Shevchenko, «Outlines of the Constitution of the Republic», Mykola I, Kyiv University of St. Volodymyr, M. Kostomarov, Hetmanship, constitutional jurisdiction, state formation, Ukrainophiles, Slavophiles, autocracy, gendarmes.
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Teng, Zhijun, Sian Zhu, Mingzhe Li, Libo Yu, Jinliang Gu e Liwen Guo. "Wireless sensor network security defense strategy based on Bayesian reputation evaluation model". IET Communications, 14 de dezembro de 2023. http://dx.doi.org/10.1049/cmu2.12700.

Texto completo da fonte
Resumo:
AbstractIn order to solve the security problems caused by malicious nodes in wireless sensor networks, a TS‐BRS reputation model based on time series analysis is proposed in this paper. By using the time series analysis method, the matching analysis of two time series is carried out to reduce the interference of channel conflicts on the reputation evaluation model and improve the accuracy of model recognition. In order to improve the adaptability of the evaluation model, the adaptive maintenance function μ is introduced into the update of credit value, which aggravates the influence of node behaviour on credit value at the present stage. The simulation results show that the new reputation evaluation model can effectively improve the detection rate and detection speed of malicious nodes in the network. After the introduction of maintenance function, the reputation value of the captured malicious nodes in the network has a faster convergence speed.
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Masliy, Oleksandra, e Alona Buriak. "TRANSFORMATION OF THREATS FOR THE ECONOMIC SECURITY AND SECURITY OF THE INFORMATION ENVIRONMENT OF UKRAINE IN THE CONDITIONS OF A FULL-SCALE WAR". State and Regions. Series: Economics and Business, n.º 3(129) (2023). http://dx.doi.org/10.32782/1814-1161/2023-3-5.

Texto completo da fonte
Resumo:
The article defines an objective list of risks and threats for the economic security and security of the information space of the state in the conditions of a full-scale invasion of the Russian Federation. The main components of threats for the economic security of Ukraine and security-oriented information environment are summarized, including: macroeconomic, production, financial, foreign economic, investment and innovation, social and food security. The systematization and analysis of current challenges and threats made it possible to identify the most significant of them – financial security, which dually reflects the growth of the state budget deficit and the increase in the state debt and expenses for its maintenance, which are the direct economic consequences of a prolonged high-intensity war, as well as factors that cause a fundamental negative influence on the economic security of Ukraine in medium and long-term dimensions. It has been proven that considering a wide range of threats for the economic security is an important step in the formation of effective strategies for the stability and state’ protection. The key directions of action to reduce threats for the food safety have been identified in the article. The manufacturing sector of Ukraine was significantly affected by the high-intensity hostilities with the aggressor country, which caused the destruction or suspension of key, largely export-oriented enterprises, mainly in the metallurgical, chemical and machine-building sectors. The impact of immediate destruction was worsened by the disruption of the logistics of both the domestic market and export routes, a significant increase in the cost of a number of important processes, the loss of part of the labor potential due to forced migrations, as well as the involvement of part of the workers in the Defense Forces, in addition, starting from the fall of 2022, – a complication with energy supply. The effectiveness of adapting the state’s investment strategy to the difficult conditions of war has been proven in the article. The priority of considering the process of risk transformation in wartime is justified, which helps to develop strategies to preserve the economic security of the country. The above makes it necessary to model and forecast the dynamics of Ukraine’s economy in the medium term in order to develop government solutions to ensure the economic security of the state, aimed at the recovery and modernization of Ukraine’s economy in the conditions of war and post-war recovery
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia