Showing 4,981 - 5,000 results of 9,720 for search '"Securities ', query time: 0.06s Refine Results
  1. 4981

    High trophic similarity between non-native common carp and gibel carp in Turkish freshwaters: Implications for management by Sadi Aksu, Özgür Emiroğlu, Paride Balzani, J. Robert Britton, Esengül Köse, Irmak Kurtul, Sercan Başkurt, Oğuzcan Mol, Emre Çınar, Phillip J. Haubrock, Pinar Oztopcu-Vatan, Ali Serhan Tarkan

    Published 2025-01-01
    “…In Turkey, stocking of common carp Cyprinus carpio is practised to provide food security for people and job security for artisanal fishers, resulting in a country-wide distribution. …”
    Get full text
    Article
  2. 4982

    Generative adversarial synthetic neighbors-based unsupervised anomaly detection by Lan Chen, Hong Jiang, Lizhong Wang, Jun Li, Manhua Yu, Yong Shen, Xusheng Du

    Published 2025-01-01
    “…Abstract Anomaly detection is crucial for the stable operation of mechanical systems, securing financial transactions, and ensuring network security, among other critical areas. …”
    Get full text
    Article
  3. 4983

    MonoMax Suture: A New Long-Term Absorbable Monofilament Suture Made from Poly-4-Hydroxybutyrate by Erich K. Odermatt, Lutz Funk, Rainer Bargon, David P. Martin, Said Rizk, Simon F. Williams

    Published 2012-01-01
    “…Its tensile modulus of 0.48 GPa is approximately one-third of the value of the PDS II fiber providing an exceptionally flexible and pliable fiber with excellent knot strength and security. These features are further enhanced by the fiber's elasticity, which also improves knot security and may help prevent wound dehiscence. …”
    Get full text
    Article
  4. 4984

    A Scalable Framework for Sensor Data Ingestion and Real-Time Processing in Cloud Manufacturing by Massimo Pacella, Antonio Papa, Gabriele Papadia, Emiliano Fedeli

    Published 2025-01-01
    “…However, existing frameworks face challenges related to scalability, resource orchestration, and data security, particularly in rapidly evolving decentralized manufacturing settings. …”
    Get full text
    Article
  5. 4985

    Enhancing Safety in Nigeria's Oil and Gas Sector: A Fault Tree Analysis Approach by Mgbowaji Zacchaeus, John Nwenearizi Ugbebor, Ikechukwu Ozoemenam Agbagwa, Ochuko Felix Orikpete

    Published 2023-12-01
    “…By dissecting incidents ranging from structural failures to security threats, the research illuminates the multifaceted risks entrenched within the sector's activities. …”
    Get full text
    Article
  6. 4986

    Electronic petitions in France on the material of Change.org, a non-governmental e-petition platform by K. V. Bannikov, N. K. Radina, O. A. Smirnova, D. V. Shavarova

    Published 2022-09-01
    “…Residents of France most often relate to social problems (social security, health care and education) in electronic petitions. …”
    Get full text
    Article
  7. 4987

    Comparing Types of Statistical Data Between Turkey (the Case Study of Istanbul) and Selected Countries for Creating Fire Strategies by Erhan Bakırcı, Buket Karatop, Sümeyye Bayındır

    Published 2019-07-01
    “…Therefore, it can be said that fire statistics are kept and used to determine the strategies of fire statistics, especially in the countries that have high standards of social security and are technologically advanced. The strength of this chain of secure relations is possible with the establishment of learning systems. …”
    Get full text
    Article
  8. 4988

    A FSTCN-Based Leak Detection Method for Large-Scale Pipeline Transportation Systems by Du Zhang, Chang-Su Kim, Chul-Hyun Hwang, Tae-Jun Lee, Hoe-Kyung Jung

    Published 2025-01-01
    “…In large-scale pipeline transportation systems, security issues such as leaks and explosions are prevalent, thus early detection of leaks is important to reduce security hazards in pipeline systems. …”
    Get full text
    Article
  9. 4989

    Numerical Assessment of a Safety System to Minimize Injuries during a Cyclist Run-Over by E. H. López-García, M. F. Carbajal-Romero, J. A. Flores-Campos, C. R. Torres-SanMiguel

    Published 2021-01-01
    “…The computed results were divided into groups, A for the run-over test without a passive security system and B for the run-over test with a passive security system. …”
    Get full text
    Article
  10. 4990

    Dynamics of Cropland Non-Agriculturalization in Shaanxi Province of China and Its Attribution Using a Machine Learning Approach by Huiting Yan, Hao Chen, Fei Wang, Linjing Qiu

    Published 2025-01-01
    “…Cropland is a critical component of food security. Under the multiple contexts of climate change, urbanization, and industrialization, China’s cropland faces unprecedented challenges. …”
    Get full text
    Article
  11. 4991

    Driving simulator study of text messaging and phone conversations: Effects of messages’ valence, drivers’ values and self-reported driving behaviors by Ivars Austers, Inese Muzikante, Ronalds Cinks

    Published 2025-01-01
    “…Self-reported values of power, security, and universalism were significantly correlated with objective driving measures: power was associated with riskier driving behaviors, whereas security and universalism were linked to safer driving patterns. …”
    Get full text
    Article
  12. 4992

    Impact of Community-based Adaptation Methods in Creating Resilient Communities in Indonesia and Philippines by Tota Wayne, Abdul Maulud Khairul Nizam, Md Noor Noorashikin

    Published 2024-01-01
    “…Improvements were observed in disaster management, aquaculture, food, and water-security resilience, thus, 25% water management practices, also including irrigation systems and flood control measures. …”
    Get full text
    Article
  13. 4993

    Solar Drying for Domestic and Industrial Applications: A Comprehensive Review of Innovations and Efficiency Enhancements by Md Atiqur Rahman, S. M. Mozammil Hasnain, Prabhu Paramasivam, Rustem Zairov, Abinet Gosaye Ayanie

    Published 2025-02-01
    “…Abstract Global challenges such as energy scarcity and food security are intensified by a growing population and substantial post‐harvest food losses, contributing to alarming hunger levels. …”
    Get full text
    Article
  14. 4994
  15. 4995

    Promoting Healthy Lifestyle Strategies among Couples for Sustainable Family Survival in Oyo State, Nigeria by Taiwo Adekemi Akinyemi, Olajide Olatunde Adeola, Halimot Omobola Toriola

    Published 2024-12-01
    “…Healthy lifestyle can be encouraged through mindfulness, with secure communities and local mental support resources playing a key role. …”
    Get full text
    Article
  16. 4996

    The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field by Ijaz Khalid, Tariq Shah, Khalid Ali Almarhabi, Dawood Shah, Muhammad Asif, M. Usman Ashraf

    Published 2022-01-01
    “…The mathematical operation of the Elliptic Curve over the prime finite field is wildly used for secure data communication as it provides high security while utilizing the same size as the secret key. …”
    Get full text
    Article
  17. 4997

    The Effectiveness and Mechanisms of China’s Grain Support Policies in Relation to Grain Yield—An Evaluation of a Wide Range of Policies by Tianjian Li, Fan Yang, Haotian Zhang, Qingning Lin

    Published 2025-01-01
    “…These conclusions are of great significance for improving grain production support and protection systems, enhancing incentives for farmers to grow food and for local governments to control food, and achieving the goal of food security.…”
    Get full text
    Article
  18. 4998

    Blockchain enabled traceability in the jewel supply chain by Aman Patel, Siva Sai, Ankit Daiya, Harshal Akolekar, Vinay Chamola

    Published 2025-01-01
    “…The system incorporates robust security measures, addressing vulnerabilities such as reentrancy attacks and unauthorized access. …”
    Get full text
    Article
  19. 4999

    Effect of Banana Production on Poverty Reduction in Kabuyanda Sub-County, Isingiro District. by Arinda, Edgar

    Published 2024
    “…Additionally, diversifying banana products like flour, chips, and juice was suggested to enhance food security and create additional income streams through value addition. …”
    Get full text
    Thesis
  20. 5000

    Routing control method of hot standby BRAS in IP MAN by Huanyi WANG, Guofu XIANG

    Published 2016-01-01
    “…With the implementation of“Broadband China”strategy,IP services become more and more diversified,the demand for all kinds of security is also increasing.The key technology of BRAS hot backup and its realization method were introduced,realizing the seamless handover between primary and standby BRAS and effectively controlled the route range in BRAS.The routing was optimized to reduce traffic between interconnect circuits of primary and backup BRAS to improve the utilization efficiency of the circuit.…”
    Get full text
    Article