Showing 5,721 - 5,740 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 5721

    Food Insecurity and Obesity by Rachel Savelle, LaToya J. O'Neal

    Published 2017-05-01
    “…It is important that the coexistence of food insecurity and obesity is well understood so that community outreach programs and interventions can continue to be implemented in order to improve food security by increasing access to affordable, healthy foods and promoting good health nationwide. …”
    Get full text
    Article
  2. 5722

    Le suicide, une pathologie carcérale ? by Laurence Guignard

    Published 2018-05-01
    “…The failure of prevention, as demonstrated by prison statistics, thus appears to be inherent to the methods used: the straitjacket, security isolation cells, and the training of prison guards in techniques of resuscitation. …”
    Get full text
    Article
  3. 5723

    Ballot initiatives and the national debate on immigration by Mario Menéndez

    Published 2012-01-01
    “…As of 1996 new laws related to immigration and access to welfare benefits followed the main guidelines of Proposition 187; since the 9-11 attacks national security has become the main axis of immigration laws. …”
    Get full text
    Article
  4. 5724

    Précarité alimentaire et pratiques informationnelles des étudiant·e·s by Céline Paganelli, Viviane Clavier

    Published 2023-10-01
    “…Four categories were identified: food secure, mildly food insecure, moderately food insecure and severely food insecure. …”
    Get full text
    Article
  5. 5725

    Design and Implementation of Software-Based Simulator for Performance Evaluation of Transmission Protocol by Chang-Su Kim, Jong-Il Park, Hoe-Kyung Jung

    Published 2014-03-01
    “…We propose a method of software-based transmission protocol simulation for the establishment of ubiquitous infrastructure as a method of securing reliability of a ubiquitous sensor network (USN), which is an important element of ubiquitous infrastructure establishment. …”
    Get full text
    Article
  6. 5726

    Trucking, Owner-Operators, and Florida Perishables by Richard Beilock

    Published 2005-04-01
    “…In this report, we examine the extent to which owner-operators have been able to maintain their share of Florida's produce/ornamentals haulage and their dependence upon larger carriers to secure loads. his is EDIS document, FE543, a publication of the Department of Food and Resource Economics, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida, Gainesville, FL. …”
    Get full text
    Article
  7. 5727

    Trucking, Owner-Operators, and Florida Perishables by Richard Beilock

    Published 2005-04-01
    “…In this report, we examine the extent to which owner-operators have been able to maintain their share of Florida's produce/ornamentals haulage and their dependence upon larger carriers to secure loads. his is EDIS document, FE543, a publication of the Department of Food and Resource Economics, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida, Gainesville, FL. …”
    Get full text
    Article
  8. 5728
  9. 5729
  10. 5730

    The global energy challenge: second-generation feedstocks on marginal lands for a sustainable biofuel production by Claudio Russo, Valerio Cirillo, Nausicaa Pollaro, Fabio Terribile, Andrea Chiodini, Albino Maggio

    Published 2025-01-01
    “…Biofuels represent a renewable source of energy, but their production has raised concerns regarding their possible impacts on food security. Indeed, the current biofuel production primarily relies on food crops and arable lands. …”
    Get full text
    Article
  11. 5731

    Design a Robust DDoS Attack Detection and Mitigation Scheme in SDN-Edge-IoT by Leveraging Machine Learning by Habtamu Molla Belachew, Mulatu Yirga Beyene, Abinet Bizuayehu Desta, Behaylu Tadele Alemu, Salahadin Seid Musa, Alemu Jorgi Muhammed

    Published 2025-01-01
    “…However, the complexity of IoT networks, with their resource-constrained devices, presents substantial security challenges, particularly Distributed Denial of Service (DDoS) attacks. …”
    Get full text
    Article
  12. 5732

    Person-based design and evaluation of MIA, a digital medical interview assistant for radiology by Kerstin Denecke, Daniel Reichenpfader, Dominic Willi, Karin Kennel, Harald Bonel, Harald Bonel, Knud Nairz, Nikola Cihoric, Damien Papaux, Hendrik von Tengg-Kobligk

    Published 2024-08-01
    “…The Q&A module achieved a precision of 0.51, a recall of 0.87 and an F-Score of 0.64 based on 114 questions asked by the participants. Security and accessibility also require improvements.ConclusionThe applied person-based process described in this paper can provide best practices for future development of medical interview assistants. …”
    Get full text
    Article
  13. 5733

    Data privacy preservation for the search of Internet of things based on fine-grained authorization by Jia-hui WANG, Chuan-yi LIU, Bin-xing FANG

    Published 2017-01-01
    “…Secondly, the scheme of data privacy preservation for the search of Internet of things based on fine-grained authorization was pro-posed, which combined the encrypted search algorithm with the attribute based access control algorithm. Thirdly, the security analysis and performance analysis of the scheme were also carried out. …”
    Get full text
    Article
  14. 5734

    Marketing analysis of the technological equipment market for the Russian logging industry by Yu. V. Astashova, I. Yu. Okolnishnikova, O. N. Gatilova

    Published 2021-08-01
    “…The directions of further development of forest engineering and the entire forest complex of Russia based on import substitution and ensuring the economic and technological security of Russia are substantiated.…”
    Get full text
    Article
  15. 5735

    HYGIENIC EVALUATION OF ENVIRONMENTAL INFLUENCE ON THE HEALTH OF CHILDREN FROM RURAL REGIONS OF SOUTHERN UKRAINE by V.V. Babienko, V.L. Mykhailenko

    Published 2017-03-01
    “…The program of preventive measures in areas with low environmental security should include correction of food, providing drinking water quality and regulatory measures on hygienic education of the children’s population.…”
    Get full text
    Article
  16. 5736

    Next generation IP network test system framework based on microservices architecture by Jingyi XU, Zeyu ZHAO, Minhu SHEN, ·ibin ·ING, Weiqiang ZHOU

    Published 2019-09-01
    “…The next generation IP network is a new type of public network.It integrates wire and wireless,broad-band and narrow-band,transmit and receive,passive and active,which leads to the diverse and complex service scenarios.However,different scenario has different needs and standards,and there remains gaps with the current techniques,protocols and standards.In order to ensure the completeness and security of all kinds of techniques and facilities in the new application scenarios,and the upcoming new characteristics in the process of network development,a comprehensive test system framework needs to be established.The next generation IP network test framework based on micro services architecture was proposed,combined with different new application characteristics,which provided support for the development of network technology.…”
    Get full text
    Article
  17. 5737

    FACTORS INFLUENCING ENTREPRENEURIAL INTENTIONS OF STUDENTS SPECIALIZING IN THE TOURISM INDUSTRY by Francisco Dias, Antonina N. Tret'yakova, Tamer Atef, Joanna Kosmaczewska, Regina Navickiene

    Published 2016-12-01
    “…On the tendency to create new business positively affect entrepreneurial values of significant groups, the belief in the ability to provide their personal (psychological) and social security, as well as entrepreneurship education.…”
    Get full text
    Article
  18. 5738

    Efficient distributed model sharing strategy for data privacy protection in Internet of vehicles by Zijia MO, Zhipeng GAO, Yang YANG, Yijing LIN, Shan SUN, Chen ZHAO

    Published 2022-04-01
    “…Aiming at the efficiency problem of privacy data sharing in the Internet of vehicles (IoV), an efficient distributed model sharing strategy based on blockchain was proposed.In response to the data sharing requirements among multiple entities and roles in the IoV, a master-slave chain architecture was built between vehicles, roadside units, and base stations to achieve secure sharing of distributed models.An asynchronous federated learning algorithm based on motivate mechanism was proposed to encourage vehicles and roadside units to participate in the optimization process.An improved DPoS consensus algorithm with hybrid PBFT was constructed to reduce communication costs and improve consensus efficiency.Experimental analysis shows that the proposed mechanism can improve the efficiency of data sharing and has certain scalability.…”
    Get full text
    Article
  19. 5739

    The Performance of LBP and NSVC Combination Applied to Face Classification by Mohammed Ngadi, Aouatif Amine, Bouchra Nassih, Hanaa Hachimi, Adnane El-Attar

    Published 2016-01-01
    “…The growing demand in the field of security led to the development of interesting approaches in face classification. …”
    Get full text
    Article
  20. 5740

    Attribute-based authenticated key agreement protocol supporting revocation by Qiang LI, Deng-guo FENG, Li-wu ZHANG

    Published 2014-05-01
    “…The protocol is provably secure in the standard model and modified ABCK model. …”
    Get full text
    Article