Showing 6,641 - 6,660 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 6641

    Implementation of Peer-Led Seeking Safety for Women in Jail by Kathryn M. M. Nowotny, Danielle Lee Estes, Krystle Nicole Culbertson, Ladies Empowerment and Action Program

    Published 2025-01-01
    “…We describe several “lessons learned” related to the jail context, including structure and security processes and vicarious and retraumatization experiences among facilitators. …”
    Get full text
    Article
  2. 6642

    Hierarchical Aggregation for Federated Learning in Heterogeneous IoT Scenarios: Enhancing Privacy and Communication Efficiency by Chen Qiu, Ziang Wu, Haoda Wang, Qinglin Yang, Yu Wang, Chunhua Su

    Published 2025-01-01
    “…To this end, this paper designs a hierarchical federated-learning framework for heterogeneous IoT systems, focusing on enhancing communication efficiency and ensuring data security through lightweight encryption. By leveraging hierarchical aggregation, lightweight stream encryption, and adaptive device participation, the proposed framework provides an efficient and robust solution for federated learning in dynamic and resource-constrained IoT environments. …”
    Get full text
    Article
  3. 6643

    Artificial intelligence techniques for stability analysis in modern power systems by Jiashu Fang, Chongru Liu

    Published 2024-12-01
    “…Effective stability analysis is essential for the secure operation of modern power systems. As smart grids evolve with increased interconnection, renewable energy integration, and electrification, the large-scale deployment of ultra-high voltage AC/DC networks introduces various operational modes and potential fault points, posing significant challenges to maintaining stability. …”
    Get full text
    Article
  4. 6644

    Good governance based on service information system applications administration population via smartphones by Sitna Hajar Malawat, Dewi Merdayanty, Junaidy Junaidy, Syahrial Shaddiq

    Published 2023-12-01
    “…If applied to an application platform that manages population administration services, the principles of Good Governance can secure the smooth running of these services, in line with the needs of the community. …”
    Get full text
    Article
  5. 6645

    Strategies for Implementing Building Operability Certificate to Improve Performance of Building Management: A Case Study in Probolinggo City, Indonesia by Dwi Putranto Riau, null Rulinawaty, Dwi Siswahyudi, null Muhtarom

    Published 2024-01-01
    “…The building operability certificate concerns occupants’ safety before the building is used and is directed by Law Government Regulation 16 of 2021 for building security. This article discusses implementing a building operability certificate underperforming and the strategy for implementing the building operability certificate (SLF) policy. …”
    Get full text
    Article
  6. 6646

    Agricultural support policies and GHG emissions from agriculture in Latin America: relationships and policy implications for climate change by Sara A. Wong, Gonzalo Rondinone, Carmine Paolo De Salvo

    Published 2023-11-01
    “…Domestic support policies for farmers and agriculture, through their price effect, have been deemed potentially environmentally harmful; for example, in developing countries, agricultural prices have been set- below the world market prices, aiming to secure low retail prices for urban consumers. This practice has lowered producer prices, and thereby prevented farmers from adopting ecofriendly production techniques. …”
    Get full text
    Article
  7. 6647

    Optimal configuration of dynamic VAR compensators considering uncertainty and correlation by Xiaoming Mao, Zijing Qiu, Shengbo Chen

    Published 2024-11-01
    “…Simulation studies in the modified New England 10‐machine 39‐bus system show the proposed method can ensure transient voltage security of the studied power system under source‐load uncertainty.…”
    Get full text
    Article
  8. 6648

    Simplified Technique for Sealing Corneal Perforations Using a Fibrin Glue-Assisted Amniotic Membrane Transplant-Plug by Selcuk Kara, Sedat Arikan, Ismail Ersan, Arzu Taskiran Comez

    Published 2014-01-01
    “…An amniotic membrane patch was placed over the plug, which was then secured by a bandage contact lens. Result. Surgery to restore corneal stromal thickness without recurrence of perforation. …”
    Get full text
    Article
  9. 6649

    Quantile and interquantile regression models for returns to education by economic sector and vulnerable population in Colombia by Jacobo Campo-Robledo, Cristian Castillo-Robayo, Julimar da silva Bichara

    Published 2024-12-01
    “…Traditional Mincerian socioeconomic variables such as gender, experience, hours worked, marital status, relationship with the head of the household, and social security affiliation, were controlled for. Results show that while there is a positive effect between educational level and income in all economic sectors studied, this relationship varies in magnitude and form along the wage distribution.…”
    Get full text
    Article
  10. 6650

    Ring Oscillators with Additional Phase Detectors as a Random Source in a Random Number Generator by Łukasz Matuszewski, Mieczysław Jessa, Jakub Nikonowicz

    Published 2024-12-01
    “…This feature enhances the security of the produced sequences, as eavesdroppers are unable to observe the continuous random bit generation process, such as through monitoring power lines. …”
    Get full text
    Article
  11. 6651

    An Image Encryption Algorithm Based on the Improved Sine-Tent Map by Zijing Gao, Zeyu Liu, Lichan Wang

    Published 2021-01-01
    “…The correlation of the ciphertext image pixels is very low, and the algorithm is highly secure as a conclusion.…”
    Get full text
    Article
  12. 6652

    Enhancing e-government in digital transformation: integrating archive management and digital solutions in Pekanbaru, Indonesia by Khairul Rahman, Dita Fisdian Adni, M Ari Tri Putra Nasution

    Published 2024-08-01
    “…The study's results identified challenges to SRIKANDI implementation, including inadequate technological infrastructure, the need for skilled human resources in information technology, attention to data security, changes in organizational culture, and ongoing technical support. …”
    Get full text
    Article
  13. 6653

    Estimation of Tabriz population based on exponential and logistic growth models for water scarcity analysis by Saeed Imani, Yagob Dinpashoh, Esmaeil Asadi, Ahmad Fakheri Fard

    Published 2024-12-01
    “…In addition, by using this method, it is possible to better plan for the future of this city in terms of water scarcity, water demand and consumption, and water security. The used method can be applied to other cities and regions to predict the population numbers and to assess water scarcity.…”
    Get full text
    Article
  14. 6654

    Stretchable and body conformable electronics for emerging wearable therapies by Benzhao Huang, Qian Wang, Wei Li, Desheng Kong

    Published 2025-01-01
    “…Furthermore, the article delineates the crucial characteristics of wearable therapeutic devices, such as biocompatibility, secure skin attachment, and effective moisture management. …”
    Get full text
    Article
  15. 6655

    Modeling the Risks of Blockchain Development in Improving the Resilience of the Medical Equipment Supply Chain by Atena Maleki, Masoumeh Zeinalnezhad, Tahereh Aliheydari Bioki, Ehsan Hedayati

    Published 2024-10-01
    “…Hence, 10 main political and governmental risks, reliability, service, profitability, security, networking, organizational issues, privacy, social issues, environmental effects were identified and the risks were ranked based on fuzzy BWM and political and governmental risks They ranked first with a weight of 0.26, reliability ranked second with a weight of 0.15, and profitability ranked third with a weight of 0.127..…”
    Get full text
    Article
  16. 6656

    THE STRUCTURE OPTIMIZATION AND ANALYSIS OF THE SEMI-AUTOMATIC RAIL-MOUNTED BILATERAL CASTING MACHINE by WANG ChengJun, 3CHEN XiaoZhe, LIU Kai, HUANG RuHang, LI Gang

    Published 2016-01-01
    “…The study has reduced vibration and improved work stability. Its working security was determined through stress and deformation analysis of casting ladle support system. …”
    Get full text
    Article
  17. 6657

    Adaptive message sending rate control method based on channel congestion cost calculation in VANET by Ming-jian LIU, Guo-zhen TAN, Shuai-bing LI, Nan DING, Cai-xia SONG

    Published 2016-10-01
    “…In VANET,sending beacon messages reliably played a vital role in cooperative awareness and collision avoidance,and changes of vehicle density in real traffic environment had a direct impact on channel load and will cause the channel congestion to a certain degree,thus causing inefficiency of cooperative security applications.Aiming at this issue,a adaptive method based on channel congestion detection to control message sending rate was designed.First of all,an interference model that can accurately reflect the current state of the channel was established.Secondly,according to the Shannon information theory and network utility maximization theory,the optimal transmission speed of the current node in the physical layer was calculated.Finally,according to the mismatch of transmission rate and transmission queue length,the next moment's cost function of the channel congestion degree by monitoring the message queue was established to avoid channel congestion and queue overflow.The simulation experiment shows that the scheme effectively reduces communication transmission delay and avoids channel congestion,ensuring that the data be sent reliably.…”
    Get full text
    Article
  18. 6658

    Condition Recognition of High-Speed Train Bogie Based on Multi-View Kernel FCM by Qi Rao, Yan Yang, Yongquan Jiang

    Published 2019-03-01
    “…Monitoring the operating status of a High-Speed Train (HST) at any moment is necessary to ensure its security. Multi-channel vibration signals are collected by sensors installed on bogies and beneficial information are extracted to determine the running condition. …”
    Get full text
    Article
  19. 6659

    Exploring the possibilities of using cryptocurrencies in production in creative industries by A. R. Akopyan, Yu. V. Vorontsova, V. V. Krysov

    Published 2024-06-01
    “…One of the advantages of applying this type of currency is the ability to conduct fast and secure financial transactions without the involvement of intermediaries. …”
    Get full text
    Article
  20. 6660

    DEVELOPMENT OF SALARY CARDS IN THE SYSTEM OF CASHLESS PAYMENTS IN CONDITIONS OF FINANCIAL INSTABILITY ON THE EXAMPLE OF SBERBANK OF RUSSIA by K. V. Ekimova, S. S. Galasova, V. V. Manuylenko

    Published 2020-09-01
    “…As a result, the main directions for the development of salary projects have been proposed, including the definition of incentive provisions for their application, ensuring security, confidence in salary projects and contactless payment, regulating the risk of occurrence of accounts payable and accounts receivable between business entities, the need to modernize individual banking service, formation of innovative salary cards.…”
    Get full text
    Article