Showing 201 - 220 results of 5,943 for search '"Securities ', query time: 0.06s Refine Results
  1. 201
  2. 202

    Community Food Security and Florida Cooperative Extension Service by Alison E. Lutz, Nick T. Place, Mickie E. Swisher

    Published 2007-07-01
    “…Swisher, defines community food security and identifies its importance for extension agents in Florida. …”
    Get full text
    Article
  3. 203

    Development and Testing of Intelligent Alcohol Transportation Security System by Velaphi Msomi, Shandene E. A. Solomons

    Published 2018-01-01
    “…The development and testing of intelligent liquid transportation security system are being reported in this paper. The targeted fluid to be secured was ethanol alcohol and this was due to the theft cases occurring during the transportation of this product from the supplier to the customer. …”
    Get full text
    Article
  4. 204
  5. 205
  6. 206
  7. 207
  8. 208

    Artificial Intelligence and the Financial Security of the State on the Example of Poland by Elżbieta Feret

    Published 2024-12-01
    “…Recognising the need to use them, it is necessary to pay attention to ensuring the guarantee of the state’s financial security, which determines its independence of functioning. …”
    Get full text
    Article
  9. 209
  10. 210

    Human Factors and Errors in Security Aviation: An Ergonomic Perspective by Michelle S. F. Arcúrio, Eliane S. Nakamura, Talita Armborst

    Published 2018-01-01
    “…In a previous study we have identified the incidence of human factors and errors in the security screening process, concerning the Brazilian civil aviation. …”
    Get full text
    Article
  11. 211
  12. 212
  13. 213
  14. 214
  15. 215

    Explainable Security Requirements Classification Through Transformer Models by Luca Petrillo, Fabio Martinelli, Antonella Santone, Francesco Mercaldo

    Published 2025-01-01
    “…Security and non-security requirements are two critical issues in software development. …”
    Get full text
    Article
  16. 216

    Secure Multicast Routing Algorithm for Wireless Mesh Networks by Rakesh Matam, Somanath Tripathy

    Published 2016-01-01
    “…Existing secure routing protocols that address different active attacks are still vulnerable due to subtle nature of flaws in protocol design. …”
    Get full text
    Article
  17. 217

    Human resources development in farming and fisheries for food security by Abdulla Nadhiya, Vasylieva Natalia

    Published 2025-01-01
    “…The article delves into the issues of providing food security in the Maldives, a nation that regularly faces adverse weather conditions and natural disasters. …”
    Get full text
    Article
  18. 218
  19. 219

    A Secure and Fair Joint E-Lottery Protocol by Chin-Ling Chen, Yuan-Hao Liao, Woei-Jiunn Tsaur

    Published 2014-01-01
    “…In this paper, we use the multisignature and verifiable random function to construct a secure and fair joint e-lottery scheme. The players can check the lottery integrity, and the winning numbers can be verified publicly.…”
    Get full text
    Article
  20. 220