Showing 4,681 - 4,700 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 4681

    Attaching artificial Achilles and tibialis cranialis tendons to bone using suture anchors in a rabbit model: assessment of outcomes by Obinna P. Fidelis, Caleb Stubbs, Katrina L. Easton, Caroline Billings, Alisha P. Pedersen, David E. Anderson, Dustin L. Crouch

    Published 2025-01-01
    “…Study Design Metal suture anchors with braided composite sutures of varying sizes (United States Pharmacopeia (USP) size 1, 2, or 5) were used to secure artificial tendons replacing both the Achilles and tibialis cranialis tendons in 12 female New Zealand White rabbits. …”
    Get full text
    Article
  2. 4682

    Impact of nurturing care educational videos focusing on children with nutritional problems aged 6-23 months on mothers' knowledge and child growth by Fitri Haryanti, Lely Lusmilasari, Sri Hartini, Ayyu Sandhi, Ika Parmawati, Akhmadi Akhmadi, Nisa Nur Hasanah, Fitriana Andarwati, Hani Risnawati, Alissa Nur Pratiwi, Ananda Sekar Kusumawati, Redyta Dwi Cahyani

    Published 2024-12-01
    “…Results: The intervention group showed significant improvements in nurturing care knowledge (p = 0.012), responsive caregiving (p = 0.018), and safety and security (p = 0.006). A significant difference in safety and security was observed between groups at posttest 1 (p = 0.020). …”
    Get full text
    Article
  3. 4683

    A Green′s function for a convertible bond using the Vasicek model by R. Mallier, A. S. Deakin

    Published 2002-01-01
    “…We consider a convertible security where the underlying stock price obeys a lognormal random walk and the risk-free rate is given by the Vasicek model. …”
    Get full text
    Article
  4. 4684

    Bilgiyi Süzmek by M. Tayfun Gülle

    Published 2011-09-01
    “…The article deals with the concerns about Secure Internet Law to be enforced on November 22, 2011, and points out that individuals of democratic societies are capable of filtering information and families have a part to play in protecting from the information pollution on the Internet. …”
    Get full text
    Article
  5. 4685

    Method of quantitative assessment for diversified software system by Yuan YAO, Chuanxing PAN, Zheng ZHANG, Gaofei ZHANG

    Published 2020-03-01
    “…To instruct the selecting of the redundancy variants for diversified software system at different situations,the evaluation systems of usability,security and performance was constructed by using some diversified software evaluation indicators.Then hierarchical analyzation system (HAS) was introduced based on the three evaluation systems.A real case verify that HAS is practicable at the situation that there are not many variants.…”
    Get full text
    Article
  6. 4686

    Anomaly Detection in Network Traffic Using Advanced Machine Learning Techniques by Stephanie Ness, Vishwanath Eswarakrishnan, Harish Sridharan, Varun Shinde, Naga Venkata Prasad Janapareddy, Vineet Dhanawat

    Published 2025-01-01
    “…Anomaly detection in network traffic is a critical aspect of network security, particularly in defending against the increasing sophistication of cyber threats. …”
    Get full text
    Article
  7. 4687

    An encryption algorithm for multiple medical images based on a novel chaotic system and an odd-even separation strategy by Chunyun Xu, Yubao Shang, Yongwei Yang, Chengye Zou

    Published 2025-01-01
    “…To simultaneously augment security and optimize encryption efficiency, we undertake a dual-pronged approach. …”
    Get full text
    Article
  8. 4688

    Trustworthy and efficient project scheduling in IIoT based on smart contracts and edge computing by Peng Liu, Xinglong Wu, Yanjun Peng, Hangguan Shan, Saïd Mahmoudi, Bong Jun Choi, Haksrun Lao

    Published 2025-01-01
    “…Subsequently, the solution integrates combinatorial auction with random sampling (CA-RS) into smart contracts. Alongside security analysis, simulations are conducted using real data sets. …”
    Get full text
    Article
  9. 4689

    TM-Chain: TCB Measurement Management Using Cloud Blockchain for IoT Devices by Jaemin Park, Sungjin Park

    Published 2025-01-01
    “…In the IoT era, RA is an important security feature because verifiers make critical decisions based on the RA result. …”
    Get full text
    Article
  10. 4690

    An Improved Deep Belief Network IDS on IoT-Based Network for Traffic Systems by Rayeesa Malik, Yashwant Singh, Zakir Ahmad Sheikh, Pooja Anand, Pradeep Kumar Singh, Tewabe Chekole Workneh

    Published 2022-01-01
    “…The security challenges such as privacy, scalability, authenticity, trust, and centralization thwart the quick adaptation of the smart services; hence, effective solutions are needed to be in place. …”
    Get full text
    Article
  11. 4691

    Challenges in Microgrids with Medium Voltage Circuit by Hércules A. Oliveira, Luiza H. S. Santos, Luiz A. de S. Ribeiro, José G. de Matos, Lucas de P. A. Pinheiro

    Published 2025-01-01
    “…Effective coordination between protection devices and management systems ensures a rapid and selective response to faults, thereby enhancing microgrid security and facilitating efficient problem detection and resolution. …”
    Get full text
    Article
  12. 4692

    How Developments in Genebanks Could Shape Utilization Strategies for Domestic Animals by Qianzi Ren, Ying Gong, Peng Su, Gang Liu, Yabin Pu, Fuqing Yu, Yuehui Ma, Zhenqing Wang, Yefang Li, Lin Jiang

    Published 2025-01-01
    “…Global geographical, climatic, and ecological diversity has given rise to a wealth of domestic animals, which are essential for food security and agricultural sustainability. Since the 1960s, these critical genetic resources have declined significantly due to overdevelopment, ecological degradation, and climate change, posing a serious threat to global food security. …”
    Get full text
    Article
  13. 4693

    The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database by Jeongseok Choi, Jaekwon Kim, Dong Kyun Lee, Kwang Soo Jang, Dai-Jin Kim, In Young Choi

    Published 2016-03-01
    “…The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.…”
    Get full text
    Article
  14. 4694

    Motorcycle Engine Start System Using Fingerprint and Voice Command by Wabdillah, Akbar Iskandar, Syahriandi

    Published 2023-06-01
    “…Making the starter engine system on this motorbike is to make it easier for users to turn on the motorbike without using a key so that they only use voice commands through an application found on an Android smartphone. In the security section, fingerprints are used as a substitute for manual ignition on motorbikes. …”
    Get full text
    Article
  15. 4695

    Electronic medical records sharing solution based on Hyperledger Fabric by CHEN Jiali, MA Ziqiang, MIAO Li, LI Bingyu, YUE Xiaolin

    Published 2024-10-01
    “…Compared to other secret sharing schemes, this solution demonstrates better theoretical time complexity, providing an efficient and reliable solution for secure storage and multi-party sharing of EMR.…”
    Get full text
    Article
  16. 4696

    Protecting Medical Images Using a Zero-Watermarking Approach Based on Fractional Racah Moments by Karim El-Khanchouli, Hanaa Mansouri, Nawal El Ghouate, Hicham Karmouni, Nour-Eddine Joudar, Mhamed Sayyouri, S. S. Askar, Mohamed Abouhawwash

    Published 2025-01-01
    “…This article introduces a new family of orthogonal moments, the fractional Racah moments (FrROMs), developed to meet the demands of copyright protection for medical images, a field requiring robust and secure methods that preserve the integrity of the original image. …”
    Get full text
    Article
  17. 4697

    Enhancing the Process of AES: A Lightweight Cryptography Algorithm AES for Ad-hoc Environments by Alharith A. Abdullah, Çağatay Aydin, Oğuz Ata, Mustafa Alhandhal

    Published 2022-12-01
    “…This algorithm will be modified to improve the security as well as reduce the amount of time and energy consumed in comparison with the original algorithm. …”
    Get full text
    Article
  18. 4698

    In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes by Amal Hkiri, Mouna Karmani, Fawaz Hasan Alasmary, Omar Ben Bahri, Ahmed Mohammed Murayr, Mohsen Machhout

    Published 2025-02-01
    “…In the rapidly evolving landscape of the Internet of Things (IoT) and Wireless Sensor Networks (WSN), the need for secure and efficient data transmission is paramount. …”
    Get full text
    Article
  19. 4699

    StegoEDCA: An Efficient Covert Channel for Smart Grids Based on IEEE 802.11e Standard by Marek Natkaniec, Paweł Kępowicz

    Published 2025-01-01
    “…These covert channels provide an innovative solution for securely transmitting large volumes of data within the smart grid.…”
    Get full text
    Article
  20. 4700

    Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game by Ashraf Al Sharah, Taiwo Oyedare, Sachin Shetty

    Published 2016-01-01
    “…Security in mobile ad hoc networks (MANETs) is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. …”
    Get full text
    Article