Showing 5,521 - 5,540 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 5521

    Farm gate profitability of organic and conventional farming systems in the tropics by Amritbir Riar, Eva Goldmann, David Bautze, Johanna Rüegg, Gurbir S. Bhullar, Noah Adamtey, Monika Schneider, Beate Huber, Laura Armengot

    Published 2024-12-01
    “…In instances where premium prices for non-cash crops are secured, their profitability can even surpass that of cash crops. …”
    Get full text
    Article
  2. 5522

    Accelerating Deep Learning-Based Morphological Biometric Recognition with Field-Programmable Gate Arrays by Nourhan Zayed, Nahed Tawfik, Mervat M. A. Mahmoud, Ahmed Fawzy, Young-Im Cho, Mohamed S. Abdallah

    Published 2025-01-01
    “…This dependency on internet connectivity increases bandwidth consumption and fails to meet the required security criteria, contrary to ZYBO-Z7 board hardware programming. …”
    Get full text
    Article
  3. 5523

    Evaluation of EGFR-TKIs and ICIs treatment stratification in non-small cell lung cancer using an encrypted multidimensional radiomics approach by Xingping Zhang, Xingting Qiu, Yue Zhang, Qingwen Lai, Yanchun Zhang, Guijuan Zhang

    Published 2025-01-01
    “…Conclusion The proposed method effectively balances the level of evidence with privacy protection, enhancing the study’s validity and security. Therefore, radiomics biomarkers are expected to complement molecular biology analyses and guide therapeutic strategies for EGFR-TKIs, ICIs, and their combinations.…”
    Get full text
    Article
  4. 5524

    Toward 6G: An Overview of the Next Generation of Intelligent Network Connectivity by Sivarama Prasad Tera, Ravikumar Chinthaginjala, Giovanni Pau, Tae Hoon Kim

    Published 2025-01-01
    “…Additionally, it identifies major challenges—such as advanced coding schemes, energy management, and security—and presents a roadmap for future research in these critical areas. …”
    Get full text
    Article
  5. 5525

    A novel and efficient digital image steganography technique using least significant bit substitution by Shahid Rahman, Jamal uddin, Hameed Hussain, Sabir Shah, Abdu Salam, Farhan Amin, Isabel de la Torre Díez, Debora Libertad Ramírez Vargas, Julio César Martínez Espinosa

    Published 2025-01-01
    “…However, image-based steganography is a challenging task due to transparency, security, computational efficiency, tamper protection, payload, etc. …”
    Get full text
    Article
  6. 5526

    Exploring the Landscape of Programming Language Identification With Machine Learning Approaches by Amandeep Verma, Rahul Saha, Gulshan Kumar, Alessandro Brighente, Mauro Conti, Tai-Hoon Kim

    Published 2025-01-01
    “…The increasing complexity of modern software development necessitates tools and methodologies for code analysis, maintenance, and migration in multi-language Integrated Development Environments (IDEs). The security needs of the software development process also recently led to the introduction of the Software Bill of Materials (SBOM), which vendors must include in their products. …”
    Get full text
    Article
  7. 5527

    The impact of a water promotion and access intervention on elementary school students in the presence of food insecurity by Leslie Gerstenfeld, Lauren Blacker, Charles E McCulloch, Lorrene D Ritchie, Valeria M Ordonez, Laura Schmidt, Anisha I Patel

    Published 2025-01-01
    “…However, students with child food insecurity (CFI) may not respond to nutrition interventions like children who are food-secure. Design: The Water First cluster-randomised trial found that school water access and promotion prevented child overweight and increased water intake. …”
    Get full text
    Article
  8. 5528

    Does climate-smart agriculture technology improve farmers' subjective well-being? Micro-level evidence from Odisha, India by Dukhabandhu Sahoo, Pritisudha Mohanty, Surbhi Mishra, Manash Kumar Behera, Souryabrata Mohapatra

    Published 2025-01-01
    “…Since the global population is expected to reach 9.7 billion by 2050, food production must increase by 70% in the next 30 years to provide food security in the face of climate change. Implementing climate-smart agriculture technology (CSAT) is essential for ensuring food security and promoting economic growth in the context of sustainable agriculture. …”
    Get full text
    Article
  9. 5529

    Treatment of Spontaneous Subarachnoid Hemorrhage: A 20‐Year National Inpatient Sample Review by Joshua Feler, Dylan Wolman, Radmehr Torabi, Jia‐Shu Chen, Abigail Teshome, Rahul Sastry, Curtis Doberstein, Mahesh Jayaraman, Krisztina Moldovan, Ali Mahta

    Published 2025-01-01
    “…Patients undergoing surgery to secure an aneurysm were more severely ill through time yet experienced a stable hospital mortality rate.…”
    Get full text
    Article
  10. 5530

    SYN flood attack defense strategy for asymmetric routing by Jian-xi TAO, Li ZHOU, Zhou ZHOU, Wei YANG, Qing-yun LIU, Rong YANG

    Published 2013-08-01
    “…In order to resolve the problem that existing network security facilities can't defend against large-scale SYN flood attack under asymmetric routing environment, attack detection technology and connection management strategy were researched, and a defense architecture combining a light-weight detection method with a hierarchical connection management strategy was presented. …”
    Get full text
    Article
  11. 5531

    Integral attack on HIGHT block cipher by Jian-sheng GUO, Jing-yi CUI, Zhi-shu PAN, Yi-peng LIU

    Published 2016-07-01
    “…The security of HIGHT block cipher under integral attack was studied. …”
    Get full text
    Article
  12. 5532

    ASSESSMENT OF THE CREDIT HISTORY OF ENTERPRISES

    Published 2017-12-01
    “…In the framework of this study, it was assumed that the creditworthiness of agrarian enterprises involves the following four factors which are subject to the assessment: the credit history of the enterprise, its financial status, business plan and the adequacy of the security (the subject of the mortgage). This article describes the results of the assessment of the credit history of the enterprise. …”
    Get full text
    Article
  13. 5533

    Meet-in-the-middle attacks on FOX block cipher by IRong-jia L, INChen-hui J

    Published 2016-08-01
    “…The security of the block cipher FOX against meet-in-the-middle attack was analyzed.Firstly,3-round meet-in-the-middle distinguishers was constructed and 6-round meet-in-the-middle attacks for FOX64 and FOX128 was proposed.The two attacks were beter attacks for 6-round FOX64 and FOX128,respectively.Secondly,the meet-in-the-middle distinguisher was extended of FOX128 to 4 rounds and proposed 7-round meet-in-the-middle attack combined with time/memory/data tradeoff.Compared to the currently known attacks on 7-round FOX128,The attack has a greater time and memory complexity,however the data complexity is much smaller.…”
    Get full text
    Article
  14. 5534

    Bedřich ze Strážnice a husitské posádky ve Slezsku by Martin Čapský

    Published 2020-12-01
    “…In Silesia, the priest Bedřich of Strážnice helped to transform the system operating among the garrisons in Central and South Moravia, including the collection of food in the form of tributes, obtaining the spoils of war, supplying through the convoys sent from the Hussite domain, and the cooperation with local elites. At the same time, securing supplies determined the main features of military operations. …”
    Get full text
    Article
  15. 5535

    Dynamic hierarchical quantum information sharing protocol by Heng-yue JIA, Xia WU, Ke-jia ZHANG, Jian-ming ZHU, Yang LI

    Published 2016-12-01
    “…Quantum secret sharing (QSS) is one important branch of quantum cryptography.Based on the studies of multi-shared quantum bits,a new dynamic quantum bit sharing protocol was proposed.The participation of the shared members is hierarchical in this protocol.The quantum information leader,in the absence of the establishment of a new quantum channel,can remove some of the participants in the secret reconstruction system.After the layoffs,the leader can also update the quantum information using quantum operations,and the remaining effective partici-pants can recover the new quantum information without performing additional operations.In addition,the correct-ness,security and the hierarchy of the participants of the protocol were discussed.…”
    Get full text
    Article
  16. 5536

    Application of fuzzy modeling in the evaluation of crisis state of enterprises by M. N. Belousova, A. A. Dashkov

    Published 2019-04-01
    “…In the model of a fuzzy assessment of the crisis state of enterprises, the following input linguistic variables have been highlighted: the relative level of financial status, the probability of bankruptcy, the level of information security, the level of innovation potential. The terms of the input variables and the result variable have been described. …”
    Get full text
    Article
  17. 5537

    Research and Application of the Key Part Design Method of Minor Double Input Planetary Gear Reducer by Xu Ke, Zhang Qing

    Published 2017-01-01
    “…Through analysis of the result,when the condition cannot meet the strength requirement by using general mechanical design method,the theoretical security coefficient calculated by using the disposable mechanical design method is 3. 96 under the same conditions. …”
    Get full text
    Article
  18. 5538

    A Novel Image Encryption Algorithm Based on DNA Subsequence Operation by Qiang Zhang, Xianglian Xue, Xiaopeng Wei

    Published 2012-01-01
    “…The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.…”
    Get full text
    Article
  19. 5539

    Introducing the Citizen’s Income (Bürgergeld): Making Bold Changes by Alexander Herzog-Stein

    Published 2022-02-01
    “…The reform of the in-work benefit element should aim at supporting sustainable employment subject to social security contributions. However, to live up to its name, the citizen’s income must ensure genuine social participation for those receiving the citizen’s income.…”
    Get full text
    Article
  20. 5540

    AN APPROACH HYBRID RECURRENT NEURAL NETWORK AND RULE-BASE FOR INTRUSION DETECTION SYSTEM by Trần Thị Hương, Phạm Văn Hạnh

    Published 2019-06-01
    “…Network intrusion detection is one of the most important issues of network security and is a research interest of many researchers. …”
    Get full text
    Article