Showing 4,661 - 4,680 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 4661

    Ozon uygulamasının devital ağartma yapılan dentinde rezin simanın shear bağlanma dayanımına etkisi by Betül Özçopur, Özer Alkan, Öznur Eraslan, Eylem Ayhan Alkan, Gürcan Eskitaşçıoğlu

    Published 2014-08-01
    “…Ozon uygulanan Secure siman örnekleri (G5), G1, G3, ve G7 gruplarından anlamlı derecede daha düşük bağlanma dayanımı gösterdi (P < 0.05). …”
    Get full text
    Article
  2. 4662

    Efficient task scheduling and computational offloading optimization with federated learning and blockchain in mobile cloud computing by Matheen Fathima G, Shakkeera L

    Published 2025-03-01
    “…Consequently, maintaining MCC security and optimization of resources according to the task becomes significant task. …”
    Get full text
    Article
  3. 4663
  4. 4664
  5. 4665

    ENSURING HUMAN RIGHTS IN THE CONTEXT OF IMPLEMENTATION OF ELECTRONIC VOTING IN UKRAINE: PERSPECTIVES AND RISKS by Liudmyla Gudz

    Published 2024-05-01
    “…Switzerland, the United States, Norway, Sweden, India, and Brazil have also used e-voting, with varying degrees of success and challenges related to security and privacy. For example, in Switzerland, e-voting was used experimentally in some cantons but faced significant security issues, while in India, EVMs have become standard in most polling stations, increasing public confidence in the electoral process. …”
    Get full text
    Article
  6. 4666
  7. 4667
  8. 4668

    Tea Growing and Socio-Economic Development of Small Holder Farmers: A Case Study of Rushoroza Kabale District. by Byamukama, Hillary

    Published 2025
    “…The study findings indicated that there were contributions of tea growing to welfare they included; poverty alleviation, food security, illiteracy level, financial support, capital base, collateral security, and illiteracy level. …”
    Get full text
    Thesis
  9. 4669

    Četnictvo v Hradci Králové: Úvod do jeho struktury ve třicátých letech 20. století by Petr Grulich

    Published 2015-01-01
    “…The organization and activity of the gendarmerie in Hradec Králové are presented in the context of the statewide events and the organization of security. …”
    Get full text
    Article
  10. 4670

    GLONASS AS A TOOL TO ENSURE THE SAFETY OF TRANSPORTATION OF DANGEROUS GOODS by A. Ochkalova

    Published 2016-05-01
    “…The article describes the definition of dangerous goods, shows the reasons for the increased control over the transportation of such kind of goods and special security measures, gives the peculiarities of satellite navigation systems, the algorithm of implementation of the global navigation tracking system in practice, and shows a need for further measures to ensure safety transportation of dangerous goods.…”
    Get full text
    Article
  11. 4671

    Accountability of algorithms in data management of data subjects and business users by Davide Mula

    Published 2021-04-01
    “…In particular, the paper will try to understand how the security of automated and algorithmic decision-making processes can be verified ex post, due to their impact on privacy of both public and private entities. …”
    Get full text
    Article
  12. 4672

    Historic Abu Ghraib verdict: U.S. Contractor held accountable for torture by Andrea Mølgaard

    Published 2024-01-01
    “…After years of legal battles, three Iraqi survivors of torture in the Abu Ghraib prison have secured justice in a historic victory in U.S. courts. …”
    Get full text
    Article
  13. 4673
  14. 4674
  15. 4675

    Analisis Kualitas Performa Aplikasi Digital Banking X Menggunakan Framework ISO 25010 by Medina Nurul Zahra, Kraugusteeliana Kraugusteeliana

    Published 2023-07-01
    “…The conclusion is that the critical characteristic is security, which can refer to the evaluation quality of performance X application. …”
    Get full text
    Article
  16. 4676
  17. 4677

    Desain Layanan E-Surat untuk Desa Waru Barat, Pamekasan, Madura menggunakan QR-Code by Wahyudi Agustiono, Intan Rofika Putri, Devie Rosa Anamisa

    Published 2021-11-01
    “…The functionality testing showed the application successfully generated e-certificate along with the unique QR Code to secure and maintain the validity of the document. …”
    Get full text
    Article
  18. 4678
  19. 4679

    Usefulness of 3-Dimensional Flexible Endoscopy in Esophageal Endoscopic Submucosal Dissection in an Ex Vivo Animal Model by Kazutoshi Higuchi, Mitsuru Kaise, Hiroto Noda, Go Ikeda, Teppei Akimoto, Hiroshi Yamawaki, Osamu Goto, Nobue Ueki, Seiji Futagami, Katsuhiko Iwakiri

    Published 2019-01-01
    “…The degree of sense of security using 3D vision (3.67 [0.82]) was significantly higher than that using 2D vision (2.67 [0.52]) in trainees (P=.04), but was equivalent in experts. …”
    Get full text
    Article
  20. 4680

    Nurturing care during COVID-19: a rapid review of early evidence by Bernadette Daelmans, Tarun Dua, Vanessa Cavallera, Kristy Hackett, Kerrie Proulx, Rachel Lenzi-Weisbecker, Rachel Hatch, Carina Omoeva

    Published 2022-06-01
    “…A relatively large number of studies examined child safety and security and indicate a reduction in maltreatment referrals. …”
    Get full text
    Article