نتایج جستجو برای: security officers

تعداد نتایج: 189327  

Abdu-Raheem Kamal Adekunle

Household food security remains a challenge in South Africa. The national government instituted the Integrated Food Security Strategy (IFSS) programme which identifies household agricultural production as an important element of improving household-level food security. Agricultural extension is well positioned to help achieve this aim, but its current contribution is unknown. This study identif...

2002
David Ingles

The author wishes to thank officers of the Development Division and of the Australian Bureau of Statistics for helpful comments on earlier drafts. Officers of the Bureau also assisted by providing some unpublished data on decile shares. This series of papers deals with various aspects of income maintenance and related subjects. It is intended to be of use to researchers and others interested in...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1391

peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...

Journal: :international journal of agricultural science, research and technology in extension and education systems 2013
abdu-raheem kamal adekunle

household food security remains a challenge in south africa. the national government instituted the integrated food security strategy (ifss) programme which identifies household agricultural production as an important element of improving household-level food security. agricultural extension is well positioned to help achieve this aim, but its current contribution is unknown. this study identif...

2007
Nicholas Santos Sean W. Smith

Delegation is the process wherein an entity Alice designates an entity Bob to speak on her behalf. In password-based security systems, delegation is easy: Alice gives Bob her password. In the real world, endusers find this feature rather useful. However, security officers find it infuriating: by sharing her password, Alice gives all of her privileges to Bob, who then becomes indistinguishable f...

2015
Florian Schmid

The Systematic Threat Assessment (STA) is an essential part of a long-term CASRA research project which is funded by the Swiss Federal Office of Civil Aviation (FOCA). The main project goal is to increase the threat detection performance at airports by combining up-to-date intelligence with competence of security officers based on very regular changes to current training programmes which are im...

,

Background: In specific criminal law, security crimes are of special importance for the whole society and the country due to their harmful effects on the public. One of these cases is the study of evidence in crimes against security that the manner and method of detection and investigation of perpetrators of crimes against security is different from other crimes. The purpose of explaining the c...

2011
Diana van Dongen Tjabe Smid Daniëlle RM Timmermans

BACKGROUND The amount of exposure to electromagnetic fields (EMF) at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. METHODS Three occupational groups, the general Dutch working population (n = 567), airport security officers who work with me...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید