Showing 5,141 - 5,160 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 5141

    Model for Predicting Hope According to the Attachment Styles and Time Perspective with the Mediation Role of Psychological Resilience in the University Students by Zohre Zohoori Zangeneh, sozan emami pour, Anita Baghdasarians

    Published 2024-12-01
    “…Moreover, secure, avoidant and ambivalent attachment styles, time perspective and psychological resilience have significant direct effect on the students’ hope (p<0.01). …”
    Get full text
    Article
  2. 5142

    Defend Against Property Inference Attack for Flight Operations Data Sharing in FedMeta Framework by Jin Lei, Weiyun Li, Meng Yue, Zhijun Wu

    Published 2025-01-01
    “…Our contribution lies in the development of a secure and efficient data-sharing solution for flight operations data, which has the potential to revolutionize the aviation industry.…”
    Get full text
    Article
  3. 5143

    Analysis of new varieties adoption behavior of Chinese turbot farmer based on the perspective of heterogeneity by Qilei Ding, Zhengyong Yang, Renjie Xu, Yifei Chen

    Published 2025-01-01
    “…China is the largest turbot farming in the world, where germplasm source security is closely related to national security. To further promote the sustainable development of the turbot aquaculture industry, the China Marine Fish Industry Technology System team has developed a new variety of fast-growing turbot (hereinafter referred to as new varieties) in 2012. …”
    Get full text
    Article
  4. 5144

    ORGANIC FARMING: A RELIABLE STRATEGY FOR SUSTAINABLE AGRICULTURE IN NEPAL by Sushmita Tiwari, Shreya Rai, Jasmin Adhikari, Samarth Bista

    Published 2024-01-01
    “…As a result, it becomes increasingly important to address how to achieve food security while simultaneously addressing the imbalance in the ecosystem. …”
    Get full text
    Article
  5. 5145

    Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks by Mohammed Almehdhar, Abdullatif Albaseer, Muhammad Asif Khan, Mohamed Abdallah, Hamid Menouar, Saif Al-Kuwari, Ala Al-Fuqaha

    Published 2024-01-01
    “…Based on our thorough analysis, we identify key limitations in current methodologies and propose potential paths for future research, focusing on integrating real-time data analysis, cross-layer security measures, and collaborative IDS frameworks.…”
    Get full text
    Article
  6. 5146

    From data to diagnosis: leveraging deep learning in IoT-based healthcare by Miracle A. Atianashie, Chukwuma Chinaza Adaobi

    Published 2024-11-01
    “…Ethical and legal considerations are also critical as the deployment of artificial intelligence in healthcare necessitates careful consideration of patient consent and data security. The future of deep learning in healthcare IoT is geared toward enhancing data security, improving device integration, and creating patient-centric models through innovative technologies such as blockchain and edge computing. …”
    Get full text
    Article
  7. 5147

    Factors Influencing QRIS Adoption in Warkops by Muhammad Zahran Nurendra, Liliana Inggrit Wijaya, Bobby Ardiansyahmiraja, Jun Kajee

    Published 2025-01-01
    “…In contrast, perceived security, risk, anxiety, and comfort do not significantly affect the intention to adopt QRIS. …”
    Get full text
    Article
  8. 5148

    Enhancing RF Fingerprint Generation in Power Amplifiers: Unequally Spaced Multitone Design Approaches and Considerations by Chengyu Fan, Junting Deng, Ethan Chen, Vanessa Chen

    Published 2024-01-01
    “…The rapid growth of Internet of Things (IoT) devices and communication standards has led to an increasing demand for data security, particularly with limited hardware resources. …”
    Get full text
    Article
  9. 5149

    Healthcare assessment tools—a valid source of data for pre-hospital care? Usability for ensuring medical care in the event of a disaster by Robert Konrad, Robert Konrad, Denise Schuster, HJ Heppner, HJ Heppner

    Published 2025-02-01
    “…Currently, only the German Armed Forces (Bundeswehr) offer an internally secured infrastructure that allows all those involved in the care of soldiers to access all important medical data quickly and easily from any location.…”
    Get full text
    Article
  10. 5150

    The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key by Ilham Firman Ashari, Eko Dwi Nugroho, Dodi Devrian Andrianto, M. Asyroful Nur Maulana Yusuf, Makruf Alkarkhi

    Published 2024-03-01
    “… Information security is paramount for individuals, companies, and governments. …”
    Get full text
    Article
  11. 5151

    The role of 5G network in revolutionizing agriculture for sustainable development: A comprehensive review by Wasif ur Rehman, Mohsin Ali Koondhar, Samandar Khan Afridi, Lutfi Albasha, Idris H. Smaili, Ezzeddine Touti, Mouloud Aoudia, Wassim Zahrouni, Ibrahim Mahariq, M.M.R. Ahmed

    Published 2025-03-01
    “…Additionally, the paper explores development optimization of various nodes, fault detection, self-healing mechanisms, AI application optimization, and security issues specific to 5G-enabled smart agriculture. …”
    Get full text
    Article
  12. 5152

    The implications of the ongoing war on Gaza for food sustainability by Abdo Hassoun, Ahmed Hamad, Dalal Iriqat, Mohammed Nijim, Yamina Bouchikh, Mohamed Buheji, Tahani Z. Aldahdouh

    Published 2025-06-01
    “…This work investigates the impact of the ongoing war on food security and food-related sustainable development goals (SDGs) from local, regional, and global perspectives. …”
    Get full text
    Article
  13. 5153

    Effect of friction on levelling of the maxillary canine with NiTi superelastic wire - an in silico experiment using a finite element method by Rikou Miyawaki, Yukiko Yokoi

    Published 2024-10-01
    “…When the wire is ligated securely to the bracket, additional friction is generated, hindering the levelling process.…”
    Get full text
    Article
  14. 5154

    Comparative Study of Microorganisms in Diabetic and non-diabetic Patients with Moderate and Severe Periodontitis by Grace Alejandra Cabezas Cantos, Jonathan Armando Yanza Freire, Ingrid Polethe Morillo Gavilema, Aisha Adamarys Pineda Gómez

    Published 2024-07-01
    “…<br /><strong>Methods:</strong> a descriptive and cross-sectional study was carried out at the Hospital of the Ecuadorian Social Security Institute and at the González Suárez Health Center in the period June-August 2023. …”
    Get full text
    Article
  15. 5155
  16. 5156

    The question of Baltic states in the policy of the Great Western powers in 1943 by Ramojus Kraujelis

    Published 2003-12-01
    “…Because the Western Allies hoped that Stalin would continue the cooperation with the Western powers, USA and Britain accepted Stalin's demands for security in Tehran. Baltic states in inter-Allied relations were used as a bargaining chip. …”
    Get full text
    Article
  17. 5157
  18. 5158

    Some issues of global problems in the changing system of values of the modern world by Natalia Hrushchynska

    Published 2023-12-01
    “…The article analyzes the peculiarities of global problems in the modern world system, their transformation, identification of more acute issues, taking into account the urgent issue of the security of each country, food security against the background of the growth of the total population of the planet. …”
    Get full text
    Article
  19. 5159

    THE ANALYSIS OF THE KEY DRIVERS AND BARRIERS OF CLOUD MIGRATION IN COMPANIES IN BOSNIA AND HERZEGOVINA by Kasim Tatić, Zijad Džafić, Mahir Haračić, Merima Haračić

    Published 2020-05-01
    “…According to the research results, the most significant obstacles of cloud migration include the fo-llowing: lack of internal experts, privacy, lack of respo-nsibility of cloud providers in case of security incident, costs and complexity of migration to the cloud, etc. …”
    Get full text
    Article
  20. 5160

    STATE POLICY TO COUNTER CRIME IN BORDER REGIONS IN A DIGITAL SOCIETY by Maya G. Dieva, Dureja Z. Zijadova

    Published 2024-03-01
    “…The purpose of the scientific report is to summarize the criminal risks of digitalization for the national security of border regions and to analyze some areas of state policy in the field of combating crime in a digital society. …”
    Get full text
    Article