Showing 6,421 - 6,440 results of 9,720 for search '"Securities ', query time: 0.13s Refine Results
  1. 6421

    Design and Simulation of an Optimized Reliable Microgrid System for Kabale University Using Solar and Battery Storage. by Aturinde, Alban

    Published 2024
    “…The project highlights the potential of microgrids to enhance energy security, reduce costs, and promote environmental sustainability in educational institutions and similar settings facing energy challenges.…”
    Get full text
    Thesis
  2. 6422

    Diversity at Landscape Level to Increase Resilience. A Review by Benson, Turyasingura, Ayiga, Natal, Majaliwa, Mwanjalolo

    Published 2022
    “…Hence, building on these insights, diversity at landscape level is paramount to promoting resilient livelihoods as a means of improving the health and functioning of socio-ecological systems, as well as a mechanism for achieving food security. The study concludes that there should be involving many actors in a landscape management aspect to stimulate knowledge exchange and training.…”
    Get full text
    Article
  3. 6423

    A class imbalance aware hybrid model for accurate rice variety classification by Hanumesh Vaidya, K.V. Prasad, C. Rajashekhar, D Tripathi, Renuka S, Jyoti Shetty, Kumar Swamy, Shobha Y

    Published 2025-12-01
    “…This breakthrough has far-reaching implications for agricultural management, food security, and the broader application of machine learning in crop science.…”
    Get full text
    Article
  4. 6424
  5. 6425

    Characteristics of Professional Formation’s Indicators of Managers of the System of the Ministry of Internal Affairs of Ukraine by Yu. Yu. Boiko-Buzyl

    Published 2021-07-01
    “…The problem of professional and personal formation of managers of the security and defense sector of Ukraine has been studied. …”
    Get full text
    Article
  6. 6426

    Optimal power flow using recent red-tailed hawk optimization algorithm by Ahmed M Nassef, Mohammad Ali Abdelkareem, Mohamed Louzazni

    Published 2025-03-01
    “…The optimal power flow (OPF) solution determines the most efficient and secure operating point by considering certain objective functions and ensuring the system's operational restrictions are met. …”
    Get full text
    Article
  7. 6427
  8. 6428

    A Risk Management Approach to Global Pandemics of Infectious Disease and Anti-Microbial Resistance by Annie Sparrow, Meghan Smith-Torino, Samuel M. Shamamba, Bisimwa Chirakarhula, Maranatha A. Lwaboshi, Christine Stabell Benn, Konstantin Chumakov

    Published 2024-11-01
    “…Pandemics of infectious disease and growing anti-microbial resistance (AMR) pose major threats to global health, trade, and security. Conflict and climate change compound and accelerate these threats. …”
    Get full text
    Article
  9. 6429

    PERSEPSI PENGUNJUNG TERHADAP KENYAMANAN FASILITAS RUANG TERBUKA PUBLIK FORT ROTTERDAM by Ibrahim Tuahena, Triyatni Martosenjoyo, Abdul Mufti Radja

    Published 2019-06-01
    “…The convenience variables discussed are physical comfort, namely physical studies and anthropometric studies on facilities, psychospiritual comfort that can be achieved by considering the comfort of air, plants, and good regional transportation, sociocultural comfort, namely comfort, social, and comfort such as aroma, circulation, climate, climate, security, security, regional lighting. In this study literature studies were used to analyze the research variables, then using the Likert scale to calculate the results of the evaluations of thirty-three respondents randomly selected. …”
    Get full text
    Article
  10. 6430

    Characteristics of Land Use Change and Evaluation of Ecological Sensitivity in Chongqing by XIE Xianjian, GOU Qiantao, WU Han

    Published 2024-12-01
    “…[Objective] Chongqing, as the economic center of the upper reaches of the Yangtze River in China and a barrier to ensure ecological security in the middle and lower reaches of the Yangtze River, is a typical ecological functional and fragile area in China. …”
    Get full text
    Article
  11. 6431

    Characteristics of suicide prevention apps: a content analysis of apps available in Canada and the UK by Lydia Sequeira, Gillian Strudwick, Karen Lascelles, Hwayeon Danielle Shin, Laura Bennett-Poynter, Samantha Groves, Jessica Kemp

    Published 2025-01-01
    “…Data were then extracted based on descriptive (eg, genre, app developer), security (eg, password protection) and design features (eg, personalisation options). …”
    Get full text
    Article
  12. 6432

    Blockchain dan Kecerdasan Buatan dalam Pertanian : Studi Literatur by Fajar Delli Wihartiko, Sri Nurdiati, Agus Buono, Edi Santosa

    Published 2021-02-01
    “…Besides, this combination can also increase security on the blockchain system through the application of artificial intelligence. …”
    Get full text
    Article
  13. 6433

    Cross-Platform Ecological Momentary Assessment App (JTrack-EMA+): Development and Usability Study by Mehran Sahandi Far, Jona M Fischer, Svea Senge, Robin Rathmakers, Thomas Meissner, Dominik Schneble, Mamaka Narava, Simon B Eickhoff, Juergen Dukart

    Published 2025-01-01
    “…It strongly commits to security and privacy and complies with the General Data Protection Regulations to safeguard user data and ensure confidentiality. …”
    Get full text
    Article
  14. 6434

    Strategic alternatives for increasing the enterprise's financial potential by Мyroslava Zabediuk, Іlona Yatsuk

    Published 2023-03-01
    “…The basic financial strategies in the aspect of increasing the enterprise's financial potential are considered: the strategy of forming financial resources, the structural financial strategy and the strategy of ensuring financial security. The formation and implementation of the enterprise's basic financial strategies must be consistent with the situation and development trends of the market in which the enterprise operates. …”
    Get full text
    Article
  15. 6435

    Providing a General Model for the Successful Implementation of Digital Transformation in Organizations by Haidar Ahmadi, Najme Parsaei, Seyyed Hamed Hashemi, Hamidreza Nematollahi

    Published 2024-06-01
    “…These results highlighted that leadership and vision, change management, collaboration and partnership, user-centered design, and privacy and data security are the principal factors in the implementation of digital transformation. …”
    Get full text
    Article
  16. 6436

    Factors Influencing Telemedicine Adoption Among Health Care Professionals: Qualitative Interview Study by Fiona Schürmann, Daniel Westmattelmann, Gerhard Schewe

    Published 2025-01-01
    “…Practically, the findings guide stakeholders: policy makers should prioritize transparent regulations and data security, health care organizations should provide training and support for HCPs, and technology developers must design telemedicine solutions aligning with trust and usability needs. …”
    Get full text
    Article
  17. 6437

    A critical evaluation of religious syncretism among the Igbo Christians of Nigeria by E.C. Anizoba

    Published 2021-12-01
    “…Besides the belief in ritualistic charms, many Igbo/Igbo-speaking Christians consult diviners for various reasons, including security and prosperity, causes of illness and death, ways of preserving life, as well as to discern the mind of God about one’s future and destiny. …”
    Get full text
    Article
  18. 6438

    The Stories that Make Us: European Holocaust Narratives and the Promise of Albanian Cosmopolitan Memory Practices by Kailey rocker

    Published 2023-12-01
    “…I argue that both appropriations, while different, ultimately speak to the intersection of the following tracks: Albanian efforts to participate in broader European memoryscapes through the reproduction of their own nationally specific narratives and broader European efforts to secure memory narratives through the inclusion of southeastern European ones.…”
    Get full text
    Article
  19. 6439

    Relieve Adversarial Attacks Based on Multimodal Training by Lai Hongjie

    Published 2025-01-01
    “…However, the emergence of adversarial attacks has exposed shortages of neural networks, forcing people to confront their limitations and further increasing concerns about the security of deep learning models. Adversarial training is an effective defense mechanism that incorporates adversarial samples into the training data, enabling models to better detect and resist attacks. …”
    Get full text
    Article
  20. 6440

    Behaviour change communication influences on food consumption behaviours and the demand for diverse nutritious foods in the Makoni District, Zimbabwe. by Delilah Takawira, Mthokozisi Kwazi Zuma, Xikombiso Gertrude Mbhenyane

    Published 2024-01-01
    “…Participants indicated that the Livelihoods and Food Security Programme intervention successfully increased their nutrition knowledge, enhanced their ability to diversify crop production, and improved their access to varied foods, including some new crops. …”
    Get full text
    Article