Showing 4,881 - 4,900 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 4881

    Research Progress on the Digestion Characteristics and Influencing Factors of Whole Grain Brown Rice by WANG Dan, ZHAI Xiao-tong, ZHANG Na, WU Na-na, TAN Bin

    Published 2025-01-01
    “…The development of the whole grain industry in China is a key measure in implementing the “Food Security Guarante Law” strategy and the “Healthy China” strategy. …”
    Get full text
    Article
  2. 4882

    Agricultural sustainability through Smart Farming Systems: A comparative Analysis Between the Republic of Korea and Republic of Uganda. by Happy, Kenneth, Gang, Roggers, Ban, Yeongjun, Yang, Sungyu, Rahmat, Endang, Okello, Denis, Komakech, Richard, Cyrus, Okello, Okello, Kalule David, Kang, Youngmin

    Published 2024
    “…It is expected to potentially enhance the sustainability of agriculture and global food security. The need for smart farming arises from the increasing adverse environmental, ecological, social, and economic impacts on food systems. …”
    Get full text
    Article
  3. 4883

    Design and implementation of trans-department graduation management system in digital campus by Su-mei WANG, Qian-yi WANG, Tian-ping LAI, Xiao-nan LI, Chun FAN, Yi-ming PENG, Guo-ping FAN

    Published 2013-09-01
    “…Graduation management system is the typical case of trans-department applications in digital campus,having very high requirements of information integration,data exchange and real-time.An easily-extensible,adaptive system architecture and triple permission mechanism was designed and developed,not only to meet the school's graduation business processes,but also to provide a rich and efficient business management,security flexible access control and humanized service.…”
    Get full text
    Article
  4. 4884

    L’immigration clandestine à Mayotte : un phénomène révélateur de l'incidence des changements climatiques sur la sécurité humaine? by Nadia Wu-Tiu-Yen

    Published 2015-02-01
    “…Considering the level of vulnerability of theses populations, the human security approach may be a good way to look at this situation.…”
    Get full text
    Article
  5. 4885

    Factors Associated With Recurrent Emergency Department Visits for Epistaxis in Adults, Cross Sectional Study in Two Tertiary Care Hospitals in Riyadh, Saudi Arabia [Letter] by Al-Wathinani AM, Goniewicz K

    Published 2025-01-01
    “…Ahmed M Al-Wathinani,1 Krzysztof Goniewicz1,2 1Department of Emergency Medical Services, Prince Sultan Bin Abdulaziz College for Emergency Medical Services, King Saud University, Riyadh, 11541, Saudi Arabia; 2Department of Security, Polish Air Force University, Deblin, PolandCorrespondence: Ahmed M Al-Wathinani, Email ahmalotaibi@ksu.edu.sa…”
    Get full text
    Article
  6. 4886

    Making Simple Repairs: Bathtub and Shower Cracks by Mary N. Harrison

    Published 2019-05-01
    “… Cleaning mildew, replacing tile, repairing wood rot behind the tub or shower wall all can cost you money from your security deposit. Avoid this loss with a few simple precautions. …”
    Get full text
    Article
  7. 4887

    Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding by Gao-li WANG, Yan-zhao SHEN

    Published 2014-02-01
    “…The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. …”
    Get full text
    Article
  8. 4888

    The Severity of the COVID-19 Among Chronic Disease Patients in the Selected Hospitals in Riyadh, Saudi Arabia – A Retrospective Study [Letter] by Al-Wathinani AM, Goniewicz K

    Published 2025-01-01
    “…Ahmed M Al-Wathinani,1 Krzysztof Goniewicz1,2 1Department of Emergency Medical Services, Prince Sultan Bin Abdulaziz College for Emergency Medical Services, King Saud University, Riyadh, 11541, Saudi Arabia; 2Department of Security, Polish Air Force University, Deblin, PolandCorrespondence: Ahmed M Al-Wathinani, Email ahmalotaibi@ksu.edu.sa…”
    Get full text
    Article
  9. 4889

    Analysis and defense of the BlackEnergy malware in the Ukrainian electric power system by Yong WANG, Yu-ming WANG, Lin ZHANG, Lin-peng ZHANG

    Published 2017-01-01
    “…Ukrainian electric power system suffered BlackEnergy virus attacks in December 2015, resulting in blackout accident occurred simultaneously at multiple areas in Ivano-Frankovsk region, the malware also pose a threat to the electric power system security in China. Based on different versions of samples of BlackEnergy acquired, the attack mode was analyzed and the prevention of the virus was provided under the proper analysis environment.…”
    Get full text
    Article
  10. 4890

    THE METHODOLOGY FOR THE BUILDING OF THE SUSTAINABILITY MVZ-INDEX BASED ON THE COMMODITIES WITH DUAL PROPERTIES by M. Minchehkov, V. Vodyanova, M. Zapletin

    Published 2016-11-01
    “…The authors offer a practical approach to a fundamentally new construction of a regional monetary system, based on the methodology of calculation of the new currency unit, secured by the commodities with dual properties.…”
    Get full text
    Article
  11. 4891

    Making Simple Repairs: Bathtub and Shower Cracks by Mary N. Harrison

    Published 2019-05-01
    “… Cleaning mildew, replacing tile, repairing wood rot behind the tub or shower wall all can cost you money from your security deposit. Avoid this loss with a few simple precautions. …”
    Get full text
    Article
  12. 4892

    Development and Challenge of SDN/NFV by Huiling, Zhao, Fan Shi

    Published 2014-08-01
    “…Opposite to its rapid steps, SDN/NFV still have to face some challenges, such as the security, interoperation and performance issue, which should be the new technical focus.…”
    Get full text
    Article
  13. 4893

    Survey of quantum crypto currency by Heng-yue JIA, Xia WU, Jian-ming ZHU

    Published 2017-02-01
    “…The development history of quantum crypto currency was explained briefly, and different kinds of quantum crypto currency (including quantum bank note, quantum coin, quantum check, and quantum Bitcoin) respectively from the aspects of basic scheme models, security requirements, key technologies and research progress were introduced. …”
    Get full text
    Article
  14. 4894

    STATISTICS OF ACCIDENT AND MEASURES TO REDUCE EMERGENCY FOR THE TRANSPORTATION OF DANGEROUS GOODS by A. Ochkalova

    Published 2016-06-01
    “…The article describes the definition of dangerous goods, shows the reasons for the increased control over the transportation of such kind of goods and special security measures, shows the statistics of accidents in the transportation of dangerous goods in Russia, gives examples of different intellectual systems, providing control over the transportation of dangerous goods, presents using such kind of systems abroad, and shows a need for further measures to ensure safety transportation of dangerous goods.…”
    Get full text
    Article
  15. 4895

    Genomics costing tool: considerations for improving cost-efficiencies through cross scenario comparison by Marco Marklewitz, Alexandr Jaguparov, Aude Wilhelm, Oluwatosin Wuraola Akande, Biran Musul, Angela Lee Poates, Babak Afrough, Ashley Norberg, Noah Clayton Hull, Soudeh Ehsani, Group members of GCT pilot working group, Joanna Salvi Le Garrec, Toni Whistler

    Published 2025-01-01
    “…These institutions are the Association of Public Health Laboratories (APHL), FIND, The Global Fund to Fight AIDS, Tuberculosis and Malaria, the UK Health Security Agency (UKHSA), and the World Health Organization (WHO). …”
    Get full text
    Article
  16. 4896
  17. 4897

    ASSESSMENT OF THE REGION'S INVESTMENT ENVIRONMENT AND POLICY INSTRUMENTS FOR THE IMPLEMENTATION OF ITS INVESTMENT POTENTIAL IN WARTIME by Ruslan Boiko, Roman Martsenyuk, Arsen Protsykevych

    Published 2024-12-01
    “…It is substantiated that effective instruments of regional investment policy in the context of critical instability are: military risk insurance and diversification; use of concession agreements; private and public investments in the defence industry and critical infrastructure industries/sectors (energy, transport and logistics, medicine and pharmaceuticals, natural resources); support for innovative and technological startups in the areas of security, the real economy and infrastructure; stimulation of investments in human resources; support for investments in business projects of demobilised persons, war veterans and other combatants; encouragement of investments in the development of export potential to maintain the country's financial security.…”
    Get full text
    Article
  18. 4898
  19. 4899
  20. 4900