Showing 6,341 - 6,360 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 6341

    The Impact of Digitalization on the Constitutional Rights of Citizens by S. S. Vashurina

    Published 2024-04-01
    “…The current legislation of the Russian Federation is primarily focused on the protection of personal data and personal security on the Internet, and by introducing special norms into basic laws, it creates conditions for the implementation of the rights such as active suffrage, the right to education, the right to access to justice and other rights. …”
    Get full text
    Article
  2. 6342

    Design and Experimental Validation of Clutch Protection Structure of Miniature Reducer by Yu Wang, Huihua Liu, Yukun Li, Changjiang Zhou, Bo Hu

    Published 2022-09-01
    “…For service robots, security reconnaissance vehicles, etc. their mobile range is large and working space is complex. …”
    Get full text
    Article
  3. 6343

    Participation of Citizens in Pre-Trial Hearings. Review of an Experiment in the Netherlands by Barbara Brink, Albert T. Marseille

    Published 2014-10-01
    “…In 2011 the Dutch Central Appeals Tribunal, the highest Dutch court of appeal in legal areas pertaining to social security and the civil service, started consulting the parties of a dispute at an early stage in the procedure, in order to include them in the decisions about the procedural steps to be taken in the settlement of the appeal. …”
    Get full text
    Article
  4. 6344

    Improving Data Privacy in the Internet of Things by Using Artificial Immune System, in Regard with the Internet Limitations by Marzieh Faridi Masouleh, Ali Harounabadi, Asal Sayyad

    Published 2022-03-01
    “…Studies show that the lack of a complete, efficient and standard model has caused many security flaws in these networks. By using the Internet limitations, this study discusses how to create a target function to protect data privacy in the Internet of Things. …”
    Get full text
    Article
  5. 6345

    Design of Fully Automatic Drone Parachute System with Temperature Compensation Mechanism for Civilian and Military Applications by Basem AL-Madani, Marius Svirskis, Gintautas Narvydas, Rytis Maskeliūnas, Robertas Damaševičius

    Published 2018-01-01
    “…Due to high cost of top-end drones and requirements for secure landing, development of reliable drone recovery systems is a hot topic now. …”
    Get full text
    Article
  6. 6346

    Prophet: A Context-Aware Location Privacy-Preserving Scheme in Location Sharing Service by Jiaxing Qu, Guoyin Zhang, Zhou Fang

    Published 2017-01-01
    “…In this paper, we design a Prophet framework, which provides an effective security scheme for users sharing their location information. …”
    Get full text
    Article
  7. 6347

    Navigating the landscape of remote patient monitoring in Canada: trends, challenges, and future directions by Khayreddine Bouabida, Khayreddine Bouabida, Khayreddine Bouabida, Khayreddine Bouabida, Breitner Gomes Chaves, Enoch Anane, Navaal Jagram

    Published 2025-02-01
    “…We explore the regulatory, technical, and operational challenges that RPM faces, including critical issues around data privacy, security, and interoperability, factors essential for sustainable integration. …”
    Get full text
    Article
  8. 6348

    The Food Safety Modernization Act of 2011 – Proposed Rule for Preventive Controls for Human Food by Soohyoun Ahn, Keith R. Schneider, Michelle D. Danyluk, Renee Goodrich-Schneider

    Published 2014-09-01
    “…FSMA aims to ensure the safety and security of the US food supply by focusing on preventing food safety problems rather than responding after they occur. …”
    Get full text
    Article
  9. 6349

    Parish revival in Southern Russia in the context of revolutionary upheavals and the Civil War by Yu. A. Biryukova

    Published 2023-09-01
    “…Its functions were to be extended to the level of a grass-roots zemstvo, to ensure the legal and economic security of the parishioners, and to influence the surrounding society.…”
    Get full text
    Article
  10. 6350

    Discharge against Medical Advice in Surgical Patients with Posttraumatic Stress Disorder: A Case Report Series Illustrating Unique Challenges by Marek Brzezinski, Maren Gregersen, Luiz Gustavo Schuch, Ricarda Sawatzki, Joy W. Chen, Grant Gauger, Jasleen Kukreja, Brian Cason

    Published 2017-01-01
    “…In all three subjects, the stress of feeling misunderstood by clinicians and the distress of public detainment by hospital security in the setting of chronic PTSD led to aggressive and risky behavior. …”
    Get full text
    Article
  11. 6351

    Industry 4.0: digital twins characteristics, applications, and challenges in-built environments by Heni Zribi, Taycir Ben Abid, Abdelkarim Elloumi, Yasmina Hani, Besma Bechir Graba, Aderrahman Elmhamedi

    Published 2025-12-01
    “…Despite these potential benefits, several challenges prevent the widespread adoption of DT technology such as data security and ownership concerns, the lack of common data standards and interoperability, and difficulties in managing diverse source systems.…”
    Get full text
    Article
  12. 6352

    NOISE A FAVORITE FACTOR IN THE INDUSTRIAL WORK ENVIRONMENT by Vergilică HARALAMBIE, Oana Roxana CHIVU, Claudia BORDA, Dan NITOI, Marilena GHEORGHE, Villi PASARE, Marinela MARINESCU, Larisa BUTU, Ioana - Cătălina ENACHE

    Published 2023-05-01
    “…After the implementation of the measures at the organization level, the increase in the level of security and the decrease in the level of risk will result. …”
    Get full text
    Article
  13. 6353

    Anesthetic Management for Emergent Repair of Tracheoinnominate Fistula by Vinayak Nadar, Ratan K. Banik

    Published 2020-01-01
    “…The tracheostomy tube was then removed over a Cook catheter to maintain secure passage in case of airway collapse. The oral endotracheal tube was then inserted distal to the arterial and tracheal defect. …”
    Get full text
    Article
  14. 6354

    SIGNS OF THE ADMINISTRATIVE AND LEGAL REGIME IN THE SYSTEM OF EVENTS OF THE NORTHERN DELIVERY by Galina V. Goncharuk

    Published 2024-11-01
    “…The relevance of the research lies in the strategic importance of events for early delivery of goods to hard-to-reach territories of the North and the Arctic of Russia to ensure national security, including the preservation and development of the local population. …”
    Get full text
    Article
  15. 6355

    Multicast communication protocol based on quantum key distribution against trojan horse attacking by Hong-yang MA, Xing-kui FAN

    Published 2014-07-01
    “…The communication protocols of throughput, channel utilization, security proof were analyzed theoretically. By analyzing, the protocol can effectively counter Trojan horse attacking, guarantee the multicast communication information safely.…”
    Get full text
    Article
  16. 6356

    Morphological and molecular characterization of Stenocranus pacificus (Hemiptera: Delphacidae) on maize plants by Anivea Fachmi, Dita Megasari, Ramadhani Mahendra Kusuma

    Published 2024-11-01
    “…Additionally, maize contributes to food diversification and security. One of the main threats to maize production is pest attacks, including Stenocranus pacificus and Peregrinus maidis. …”
    Get full text
    Article
  17. 6357

    Review on Cement Stabilization/Solidification of Municipal Solid Waste Incineration Fly Ash by Chengcheng Fan, Baomin Wang, Tingting Zhang

    Published 2018-01-01
    “…Municipal solid waste incineration (MSWI) fly ash must be treated properly prior to being disposed in the security landfill due to its serious pollution toxicity. …”
    Get full text
    Article
  18. 6358

    Optimizarea generării de itinerarii pentru ghizi turistici autonomi prin integrarea datelor în timp real în algoritmi genetici by Cristian SANDU, Luminița DUMITRIU, Ioan ȘUȘNEA

    Published 2024-12-01
    “…Research in the field of autonomous vehicles has made good progress in the last years, but mass adoption is unlikely to happen very soon due to, in most part, important ethical and security concerns. The authors consider that niche uses of autonomous vehicles are more likely to be researched and developed, since they can substantially make an immediate difference in specific applications. …”
    Get full text
    Article
  19. 6359

    Distributed Power Trading System Based on Blockchain Technology by Shuguo Chen, Weibin Ding, Zhongzheng Xiang, Yuanyuan Liu

    Published 2021-01-01
    “…The traditional centralized power trading model has some problems, such as low data security and trust crisis of regulators. Blockchain technology provides prominent ideas for solving these problems. …”
    Get full text
    Article
  20. 6360

    An Economic Policy Exit Strategy from the Corona Lockdown by Michael Hüther, Hubertus Bardt

    Published 2020-04-01
    “…This requires a clear exit strategy and following several steps to return to previous welfare and growth data levels. After securing survival during this crisis via various liquidity lines and bridging loans, the economy’s restart requires the relaunch of public infrastructure, especially of schools and kindergartens. …”
    Get full text
    Article