Showing 6,001 - 6,020 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 6001
  2. 6002
  3. 6003

    Permanent aquifer storage loss from long-term groundwater withdrawal: A case study of subsidence in Bandung (Indonesia) by Michelle Rygus, Marco Bianchi, Alessandro Novellino, Ekbal Hussain, Ahmad Taufiq, Steven Reinaldo Rusli, Dwi Sarah, Claudia Meisina

    Published 2025-02-01
    “…Our study is one of the first examples of using satellite data with geomechanical models to constrain groundwater extraction rates and emphasises the importance of remote sensing data in groundwater resource management, and the irreversible impact of unsustainable groundwater extraction, which has implications for long term water security. New Hydrological Insights for the Region: The study found that continued industrial groundwater extraction has resulted in permanent aquifer storage loss, with significant implications for long-term water security. …”
    Get full text
    Article
  4. 6004

    Relations Between the Holy See and Lithuania: A 100-Year History by Haroldas Šinkūnas, Indrė Isokaitė-Valužė

    Published 2024-11-01
    “…Although the reestablishment of the independent State of Lithuania being based on the continuation of the State’s identity opened door for securing the validity of the Concordat concluded by the Holy See and the Republic of Lithuania in 1927, it was no longer capable of reflecting new realities, and new fundamental changes required the conclusion of new treaties between the parties. …”
    Get full text
    Article
  5. 6005

    Multi‐objective multiperiod stable environmental economic power dispatch considering probabilistic wind and solar PV generation by Aamir Ali, Sumbal Aslam, Sohrab Mirsaeidi, Noor Hussain Mugheri, Riaz Hussain Memon, Ghulam Abbas, Hammad Alnuman

    Published 2024-12-01
    “…Abstract The economic‐environmental power dispatch (EEPD) problem, a widely studied bi‐objective non‐linear optimization challenge in power systems, traditionally focuses on the economic dispatch of thermal generators without considering network security constraints. However, environmental sustainability necessitates reducing emissions and increasing the penetration of renewable energy sources (RES) into the electrical grid. …”
    Get full text
    Article
  6. 6006
  7. 6007
  8. 6008

    The U.S. Assistance to the MENA Arab Countries under the Trump Administration: The Logic of a Diff erentiated Approach by V. I. Bartenev

    Published 2020-12-01
    “…The assistance to Cairo and Amman is ringfenced and protected, while aid to other recipients, including security assistance and FMF grants, is prone to quite drastic cuts. …”
    Get full text
    Article
  9. 6009
  10. 6010
  11. 6011

    Financial Innovations and Financial Inclusion Among Commercial Banks in Uganda: Case Study Of Kabale District. by Mpirirwe, Christine

    Published 2023
    “…As more clients choose mobile banking, the report advises banking institutions to develop measures to improve security in the platform. The report also advises making these platforms straightforward and simple to use in order to attract more users to the business. …”
    Get full text
    Thesis
  12. 6012

    The Contribution of Micro Finance Institutions on the Growth of Small and Medium Business : A Case Study of North Kigezi Diocese Sacco In Rukungiri Municipality. by Ainembabazi, Wensi

    Published 2023
    “…Findings from the study established that the requirements for accessing credit services from North Kigezi SACCO by small-scale enterprises include; collateral security, being an active member, Local Council letter, and having guarantor, among other requirements. …”
    Get full text
    Thesis
  13. 6013

    Effective Facial Expression Recognition System Using Artificial Intelligence Technique by Imad S. Yousif, Tarik A. Rashid, Ahmed S. Shamsaldin, Sabat A. Abdulhameed, Abdulhady Abas Abdullah

    Published 2024-12-01
    “…Recognizing these facial expressions accurately is essential for a variety of applications — such as tools that use our faces to interact with computers (human-computer interaction, or HCI), security systems and emotionally intelligent artificial intelligence technologies. …”
    Get full text
    Article
  14. 6014

    A multi-model feature fusion based transfer learning with heuristic search for copy-move video forgery detection by Hessa Alfraihi, Muhammad Swaileh A. Alzaidi, Hamed Alqahtani, Abdulbasit A. Darem, Ali M. Al-Sharafi, Ahmad A. Alzahrani, Menwa Alshammeri, Abdulwhab Alkharashi

    Published 2025-02-01
    “…If original content is not accessible, then the forgery recognition technique is employed in image security. In contrast, methods that depend on deep learning (DL) have exposed good performance and suggested outcomes. …”
    Get full text
    Article
  15. 6015

    Population Shrinkage and Spatio-Temporal Changes in Cultivated Land Use Efficiency in China’s Agro-Pastoral Ecotone by Lu Chen, Ning Zhao, Zhixun Zhang, Yun Zhang, Wenjie Zuo, Youshuo Wang, Bin Wu, Monika Stanny, Yuheng Li, Guoming Du

    Published 2025-01-01
    “…Revealing the level of cultivated land use efficiency and its influencing factors in the northern agro-pastoral ecotone from the perspective of population contraction can provide a decision-making reference for ensuring national food security and promoting the implementation of rural revitalization strategies. …”
    Get full text
    Article
  16. 6016

    The Impact of Artificial Intelligence on Healthcare: A Comprehensive Review of Advancements in Diagnostics, Treatment, and Operational Efficiency by Md. Faiyazuddin, Syed Jalal Q. Rahman, Gaurav Anand, Reyaz Kausar Siddiqui, Rachana Mehta, Mahalaqua Nazli Khatib, Shilpa Gaidhane, Quazi Syed Zahiruddin, Arif Hussain, Ranjit Sah

    Published 2025-01-01
    “…However, there are major obstacles to the mainstream implementation of AI in healthcare, including issues with data security and budget constraints. Conclusion Healthcare may be transformed by AI, but its successful use requires ethical and responsible use. …”
    Get full text
    Article
  17. 6017

    Belonging to the Land in Tura: Reforms, Migrations, and Indentity Politics in Evenkia by Olga Povoroznyuk

    Published 2014-06-01
    “…In the long course of reforms and identity construction, the indigenous intelligentsia has manipulated the concept of belonging to the land either to stress or to erase cultural differences, and thus, to secure the access of the local elite to valuable resources. currently, the most hotly debated boundaries are those dividing Evenks into local and migrant, authentic and unauthentic, urban and rural. …”
    Get full text
    Article
  18. 6018

    « Pieds Noirs Rythmes : un orchestre de détenus OAS dans le “Sing-Sing” français » by Jean-Claude Vimont

    Published 2016-01-01
    “…From 1962 to 1968, several hundreds of activist members of the OAS (Organisation of the Secret Army), i.e. partisans of a French Algeria, were condemned to be incarcerated in the barracks of Thoiras, a maximum-security prison located near the citadel of Saint-Martin-de-Ré. …”
    Get full text
    Article
  19. 6019

    Comme une aiguille sur un sillon d’asphalte by Julien Glauser

    Published 2021-12-01
    “…Through his work with skateboarders in Tokyo, the author shows how the search for spots - places that are good for skating - and the observation of security measures transform the skaters' perception of their environment. …”
    Get full text
    Article
  20. 6020

    A density clustering-based network performance failure big data analysis algorithm by Xiang LI, Yuan LI, Zifei ZHANG, Zhe YANG

    Published 2020-09-01
    “…Facing frequent network security incidents,how to quickly find abnormal data in massive monitoring database and carry out network failure analysis becomes a research difficulty.A density-based network performance failure big data analysis algorithm was proposed,which extracted key performance characteristic indicators through entropy weight analysis,implemented data shaping through data cleaning and standardization,and extracted abnormal performance data on the basis of DBSCAN clustering algorithm.Relying on the real-time massive backbone network link performance data of multiple domestic operators to validated this algorithm,the results shows that compared with the manually manner,the recognition accuracy of the algorithm proposed to the network performance abnormal data is more than 90%,which can well fit for the analysis of real-time Internet network operation failure.…”
    Get full text
    Article