Showing 6,401 - 6,420 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 6401

    An Overview of Global Wheat Market Fundamentals in an Era of Climate Concerns by Aliakbar Enghiad, Danielle Ufer, Amanda M. Countryman, Dawn D. Thilmany

    Published 2017-01-01
    “…In addition to gradually and consistently increasing global wheat demand, these market drivers are posited to impact world prices and, ultimately, food security. To investigate how these factors differentially influence wheat markets, an extensive survey of literature regarding wheat market fundamentals was conducted, as well as a trend analysis using a uniquely compiled data set specific to significant wheat-producing areas. …”
    Get full text
    Article
  2. 6402

    Self-Adaptive Firefly-Algorithm-Based Unified Power Flow Controller Placement with Single Objectives by Selvarasu Ranganathan, S. Rajkumar

    Published 2021-01-01
    “…The selection of positions for unified power flow controller (UPFC) placement in transmission network is an essential factor, which aids in operating the system in a more reliable and secured manner. This paper focuses on strengthening the power system performance through UPFC placement employing self-adaptive firefly algorithm (SAFA), which selects the best positions along with parameters for UPFC placement. …”
    Get full text
    Article
  3. 6403

    Multiscale Structural Health Monitoring of Cable-Anchorage System Using Piezoelectric PZT Sensors by Khac-Duy Nguyen, Jeong-Tae Kim, Young-Hwan Park

    Published 2013-11-01
    “…Structural health monitoring of the cable-anchorage system is very important to secure the integrity of the cable-stayed bridge. The cable-anchorage system carries most of the self-weight, so that any damage in the system may significantly reduce the load carrying capacity of the bridge. …”
    Get full text
    Article
  4. 6404

    Signal Processing Techniques for Through-Wall Object Imaging Using UWB Antipodal Vivaldi Antenna by Sajjad Ahmed, Arslan Ahmed Sohoo, Fawad Salam Khan, Imran Khan Keerio, Sarfraz Ahmed

    Published 2024-12-01
    “…Through-wall imaging (TWI) is a critical application in various domains, including security, surveillance, search and rescue, and structural assessment. …”
    Get full text
    Article
  5. 6405

    Video Multiple Watermarking Technique Based on Image Interlacing Using DWT by Mohamed M. Ibrahim, Neamat S. Abdel Kader, M. Zorkany

    Published 2014-01-01
    “…Digital watermarking is one of the important techniques to secure digital media files in the domains of data authentication and copyright protection. …”
    Get full text
    Article
  6. 6406

    Newly Licensed RNs Describe What They Like Best about Being a Nurse by Maja Djukic, Linda H. Pellico, Christine T. Kovner, Carol S. Brewer

    Published 2011-01-01
    “…Five themes emerged: “providing holistic patient care,” “having an autonomous and collaborative practice,” “using diverse knowledge and skills to impact patient outcomes,” “receiving recognition,” and “having a job that is secure and stimulating.” Strategies are discussed that organizations might employ in helping NLRNs to realize what they best like about their work, which might lead to improved retention rates.…”
    Get full text
    Article
  7. 6407

    Research on the Heat Dissipation Characteristics of Lithium Battery Spatial Layout in an AUV by Zhaoyong Mao, Shaokun Yan

    Published 2016-01-01
    “…The lithium battery heat dissipation properties not only affect the underwater vehicle performance but also bring some security risks. Based on the widespread application of lithium batteries, lithium batteries in an AUV are taken as an example to investigate the heat dissipation characteristics of the lithium battery spatial layout in an AUV. …”
    Get full text
    Article
  8. 6408

    Support Vector Machine for Behavior-Based Driver Identification System by Huihuan Qian, Yongsheng Ou, Xinyu Wu, Xiaoning Meng, Yangsheng Xu

    Published 2010-01-01
    “…Since human driving behaviors belong to a dynamic biometrical feature which is complex and difficult to imitate compared with static features such as passwords and fingerprints, we find that this novel idea of utilizing human dynamic features for enhanced security application is more effective. In this paper, we first describe our experimental platform for collecting and modeling human driving behaviors. …”
    Get full text
    Article
  9. 6409

    Possibilities in Blockchain technology application by Bačević Jelena

    Published 2023-01-01
    “…The paper represents a comprehensive review of possibilities in Blockchain technology application in contemporary business environment, its benefits and shortcomings as well as security problems appearing in theory and practice. …”
    Get full text
    Article
  10. 6410

    Nano colonies: Rearing honey bee queens and their offspring in small laboratory arenas by Zachary S. Lamas, Serhat Solmaz, Cory Stevens, Jason Bragg, Eugene V. Ryabov, Shayne Madella, Miguel Corona, Jay D. Evans

    Published 2025-01-01
    “…The process creates a bridge between field research and laboratory trials and provides a secure system for contagious or regulated elements while maintaining many of the intrinsic characteristics of a honey bee colony.…”
    Get full text
    Article
  11. 6411

    Jurisprudential Welfare Through the Transformation of the “Rendang-Mu” Qurban Meat Management System by Mardiyan Hayati, Mamdukh Budiman, Mirza Mahbub Wijaya, Mowafg Masuwd

    Published 2024-12-01
    “…The findings indicate that the Rendang-Mu Program represents a transformation in the pattern of meat management and distribution, implementing a system of qurban meat management through canning and packaging with three essential benefits that facilitate and enhance its utility: (1) prolonged consumption and distribution over an extended period, (2) practical, delicious, and nutritious, (3) more evenly distributed reach, (4) high flexibility in achieving community food security, and (5) compliance with Islamic law.…”
    Get full text
    Article
  12. 6412

    Indigenous Identity in the Global Sustainable Project by Yusril Ihza Mahendra, Eduardus Andhika Kurniawan, Balya Arung Segara

    Published 2025-02-01
    “…Developing countries can secure funding from developed countries to preserve their forests. …”
    Get full text
    Article
  13. 6413

    New Artificial Urinary Sphincter Devices in the Treatment of Male Iatrogenic Incontinence by Ioannis Vakalopoulos, Spyridon Kampantais, Leonidas Laskaridis, Vasileios Chachopoulos, Michail Koptsis, Chrysovalantis Toutziaris

    Published 2012-01-01
    “…Recently three more sphincter devices, the Flow-Secure, the Periurethral Constrictor, and the ZSI 375, have been developed and presented in the market. …”
    Get full text
    Article
  14. 6414

    Blending Static and Dynamic Analysis for Web Application Vulnerability Detection: Methodology and Case Study by Paulo Nunes, Jose Fonseca, Marco Vieira

    Published 2025-01-01
    “…Our approach was able to confirm either as a vulnerability or a false alarm 76.7% of the results reported by the SA, decreasing tremendously the usual need for manual work, which is a huge improvement for security practitioners.…”
    Get full text
    Article
  15. 6415

    Increasing the level of self-esteem in adolescent children through art therapy by T. S. Gordon

    Published 2020-10-01
    “…An additional effect and guarantee of securing performance will be if a teenager after art therapy turns artistic activity into a hobby. …”
    Get full text
    Article
  16. 6416

    Public acceptance in direct potable water reuse: a call for incorporating responsible research and innovation by Karen Moesker, Udo Pesch, Neelke Doorn

    Published 2024-12-01
    “…However, the successful implementation of Direct Potable Water Reuse (DPR) projects hinges on securing public acceptance, which remains challenging. …”
    Get full text
    Article
  17. 6417

    Obesity and overweight among the poor and marginalized in rural Mexico: impact analysis of the effect of school breakfasts on children aged five to eleven by Odra A. Saucedo-Delgado, Marcela De-La-Sota-Riva-Echánove, Leovardo Mata

    Published 2023-05-01
    “…These findings highlight the need for a more comprehensive school breakfast program, that is connected to the food and nutritional security approach and is designed and implemented according to each Mexican region’s specific alimentary requirements and socioeconomic needs.…”
    Get full text
    Article
  18. 6418

    Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing by Changbo Ke, Zhiqiu Huang, Weiwei Li, Yi Sun, Fangxiong Xiao

    Published 2014-01-01
    “…However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features. …”
    Get full text
    Article
  19. 6419

    Diversity at Landscape Level to Increase Resilience. A Review by Turyasingura, Benson, Mwanjalolo, Majaliwa, Ayiga, Natal

    Published 2023
    “…Hence, building on these insights, diversity at landscape level is paramount to promoting resilient livelihoods as a means of improving the health and functioning of socio-ecological systems, as well as a mechanism for achieving food security. The study concludes that there should be involving many actors in a landscape management aspect to stimulate knowledge exchange and training.…”
    Get full text
  20. 6420

    Development and Implementation of a Healthcare Resource Allocation System: A Case Studay of Rugarama Hospital. by Byamukama, Hillary, Bwambale, Gedion

    Published 2024
    “…Key features include real-time resource allocation, secure user authentication, and an intuitive interface. …”
    Get full text
    Thesis