Showing 6,681 - 6,700 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 6681

    The Social Construction of Financial Accountability in Government and Parliament Discourses by Seyed Mojtaba Shafipoor, GhanbarAli Rajabloo, Kaveh Mehrani

    Published 2021-05-01
    “…Thus, in each paradigm, dominant discourses formed with context, and by highlighting themselves and marginalizing rival discourse, they succeeded in securing a temporary centralized sign and a new articulation of the semantic system of financial accountability.…”
    Get full text
    Article
  2. 6682

    Cooperative UAV Scheduling for Power Grid Deicing Using Fuzzy Learning and Evolutionary Optimization by Yu-Jun Zheng, Zhi-Yuan Zhang, Jia-Yu Yan, Wei-Guo Sheng

    Published 2025-01-01
    “…Icing is one of the most serious threats to power grid security in cold seasons. This article studies a problem of cooperatively scheduling inspection unmanned aerial vehicles (UAVs) and deicing UAVs for power grid deicing, the aim of which is to minimize the total expected loss of outages and collapses caused by the icing disaster. …”
    Get full text
    Article
  3. 6683

    Integrated systems approach to enhance rural development: word2vec analysis by Thabile Dube, Arnesh Telukdarie

    Published 2025-12-01
    “…Rural development plays a pivotal role in global efforts to eradicate extreme poverty, ensure food security, and create sustainable livelihoods. Existing research shows a lack of comprehensive understanding of the interconnections among various systems and subsystems within a rural ecosystem. …”
    Get full text
    Article
  4. 6684

    Zvezda Shipyard Project: Global Implications and Its Influence on the Russian Economy by I. I. Sechin

    Published 2024-04-01
    “…This strategy addresses both socio-economic goals and defense and security challenges. Additionally, the paper provides quantitative analyses of the multiplicative effects generated by the Zvezda Shipyard project's realization.…”
    Get full text
    Article
  5. 6685

    Study on the Influence of Tectonic Stress on Stability of Horseshoe-Shaped Tunnels by Xin Lv, Shuzhi Wang, Yu Qiu, Xiangxin Liu

    Published 2021-01-01
    “…The numerical model of the tunnel is built by FLAC3D, and the influence of the magnitude and direction of structural stress on the horseshoe-shaped tunnel is studied in detail. Finally, the security support of the tunnel is discussed. Results show that the stress concentration phenomenon is easily focused on the left, right, and bottom sides of the tunnel; these places should therefore be the focus of attention of tunnel stability analysis. …”
    Get full text
    Article
  6. 6686

    Optimal Scheduling of Multi-Energy Complementary Systems Based on an Improved Pelican Algorithm by Hongbo Zou, Jiehao Chen, Fushuan Wen, Yuhong Luo, Jinlong Yang, Changhua Yang

    Published 2025-01-01
    “…In recent years, the global power industry has experienced rapid development, with significant advancements in the source, network, load sectors, and energy storage technologies. The secure, reliable, and economical operation of power systems is a critical challenge. …”
    Get full text
    Article
  7. 6687

    Exploring the Functional Features of Melon Peel Flour for Healthier Bakery Products by Mafalda Alexandra Silva, Tânia Gonçalves Albuquerque, Liliana Espírito Santo, Carla Motta, Agostinho Almeida, Rui Azevedo, Rita C. Alves, Maria Beatriz P. P. Oliveira, Helena S. Costa

    Published 2024-12-01
    “…Based on these results, melon peel has the potential to improve global food security, nutrition, economic well-being, and overall health and well-being.…”
    Get full text
    Article
  8. 6688

    Energy Transition in Azerbaijan: Advantages of System Value Analysis and Strategic Role of the Global Climate Actors by Atiye Beyhan Akay, Sanem Özer, Senem Atvur

    Published 2024-12-01
    “…We argue that Azerbaijan's strategic engagement with the EU is crucial, as it serves as a means for Europe to bolster energy security and assist Azerbaijan in its political drive and strategy for transitioning to green energy. …”
    Get full text
    Article
  9. 6689

    The spillover effects of military spending across superpowers using the TVP - VAR approach by Duc Hong Vo, Minh Phuoc Bao Tran, Phuong Thi Ha Cao

    Published 2024-07-01
    “…The amount of money spent on military activities across superpowers globally has generally caused significant concerns regarding military conflicts, the arms race, economic growth development, security, political stability, and governance. This paper investigates the spillover effects of military spending among the world’s largest spenders on military activities over the period 1997 - 2022. …”
    Get full text
    Article
  10. 6690

    A platform for Bioengineering Tissue Membranes from cell spheroids by Quang Bach Le, Hariharan Ezhilarasu, Weng Wan Chan, Alok Tanala Patra, Priya Murugan, Shashaank Abhinav Venkatesh, Yean Kai Tay, Shin Ru Lim, Ahmad Amirul Abdul Rahim, Jia Sheng Zach Lee, Xuezhi Bi, Deepak Choudhury

    Published 2025-04-01
    “…To overcome this, we developed a method to assemble spheroids into a thin layer by using two mesh scaffolds to spread them evenly, and a solid frame with grid to secure the assembly. This allows the spheroids to fuse into a thin membrane-like tissue, allowing better medium diffusion during cell culture. …”
    Get full text
    Article
  11. 6691

    An Effective Privacy-Preserving Algorithm Based on Logistic Map and Rubik’s Cube Transformation by Wenbin Yao, Pengdi Ye, Xiaoyong Li

    Published 2014-01-01
    “…Security and privacy issues present a strong barrier for users to adapt to cloud storage systems. …”
    Get full text
    Article
  12. 6692

    Quantum Particle Swarm Optimization Extraction Algorithm Based on Quantum Chaos Encryption by Chao Li, Mengna Shi, Yanqi Zhou, Erfu Wang

    Published 2021-01-01
    “…The bit error rate and similarity coefficient of the voice signal are extracted by testing the source voice signal SA1, SA2, and SI943 under different SNR, and the similarity coefficient, uncertainty, and disorder of the observed signal and the source voice signal SA1, SA2, and SI943 verify the effectiveness of the proposed speech signal extraction method and the security of quantum chaos used in speech signal encryption.…”
    Get full text
    Article
  13. 6693

    New Locked-Wire-Type External Fixator (the Ichi-Fixator) for Fourth and Fifth Carpometacarpal Joint Dislocation by Satoshi Ichihara, Masao Suzuki, Akira Hara, Toshiya Kudo, Yuichiro Maruyama

    Published 2018-01-01
    “…Linked external wire-type fixation enables enhanced security of fixation, facilitates postoperative mobilization, and may allow an immediate return to work.…”
    Get full text
    Article
  14. 6694

    Fast Antinoise RFID-Aided Medical Care System by Ming-Hour Yang, Jia-Ning Luo

    Published 2015-10-01
    “…We prove that our generated proof is reliable because it can resist most security threats and guarantee the integrity of the proof. …”
    Get full text
    Article
  15. 6695

    Machine Learning-Based Anomaly Prediction for Proactive Monitoring in Data Centers: A Case Study on INFN-CNAF by Andrea Asperti, Gabriele Raciti, Elisabetta Ronchieri, Daniele Cesini

    Published 2025-01-01
    “…Anomaly prediction in time series is crucial for ensuring the stability and security of data centers, especially in scientific contexts such as INFN-CNAF, the National Center for Research and Development in Information and Communication Technology of the National Institute for Nuclear Physics. …”
    Get full text
    Article
  16. 6696

    Assessment method on protection effectiveness of differential privacy algorithms based on fuzzy influence diagram by TIAN Yuechi, LI Fenghua, ZHOU Zejun, SUN Zhe, GUO Shoukun, NIU Ben

    Published 2024-08-01
    “…Starting from five aspects—algorithm security, feasibility, privacy bias, data utility, and user experience, an indicator system was established. …”
    Get full text
    Article
  17. 6697

    Review of Digital Construction of UHV Projects Based on Building Information Modeling Technology by QI Lizhong, LIU Ding, ZHANG Zhuoqun, XIE Rongzhen, RONG Jingguo, ZHANG Su, YUAN Bo, SUN Yi

    Published 2025-02-01
    “…As major national infrastructure projects, UHV projects are key to ensuring power grid security, promoting energy consumption, and optimizing resource allocation. …”
    Get full text
    Article
  18. 6698

    Interpersonal Cognitive Distortions: What is the Role of Childhood Trauma and Attachment? by Meva Demir-Kaya, Feridun Kaya, Yüksel Eroğlu

    Published 2023-10-01
    “…These findings provide evidence that childhood trauma, mediated by anxious attachment, might contribute to interpersonal cognitive distortions in adulthood. However, secure and avoidant attachment had no statistically meaningful direct impact on interpersonal cognitive distortions. …”
    Get full text
    Article
  19. 6699
  20. 6700

    Evaluating Türkiye’s Influence in the Somali Peace Process: Positive or Negative Peace? by Huriye Yıldırım Çinar, Asena Boztaş, N. Ceren Türkmen

    Published 2024-12-01
    “…The findings suggest that Türkiye’s multi-faceted engagement in Somalia (humanitarian aid, development cooperation, and security sector reform) generally aligns with the positive peace paradigm. …”
    Get full text
    Article