Showing 6,761 - 6,780 results of 9,720 for search '"Securities ', query time: 0.10s Refine Results
  1. 6761

    Suture Repair and Suspensory Button Fixation of Avulsion Fracture of the Fibular Styloid (Arcuate Fracture) by Surasak Srimongkolpitak, M.D., Pratchaya Manop, M.D., Bancha Chernchujit, M.D.

    Published 2025-01-01
    “…If the fixation system is not sufficient to secure the various stabilities of the knee, it will fail and cause significant knee instability. …”
    Get full text
    Article
  2. 6762

    Analysis of solar photovoltaic module parks in Ukraine: Forecasting their further operation and end-of-life management by Karpash Maksym, Yavorskiy Andriy, Zhovtulia Liubomyr, Vasechko Valentyn

    Published 2025-01-01
    “…The war in Ukraine has further underscored the importance of solar energy for the country’s energy security and resilience. However, with the majority of PV capacity installed only recently and with a finite lifespan, Ukraine will soon face significant volumes of decommissioned PV modules requiring processing, utilization, or reuse. …”
    Get full text
    Article
  3. 6763

    Nonexposure Accurate Location K-Anonymity Algorithm in LBS by Jinying Jia, Fengli Zhang

    Published 2014-01-01
    “…Experimental results show that our algorithms are more secure than the existent cloaking algorithms, need not have all the users reporting their locations all the time, and can generate smaller ASR.…”
    Get full text
    Article
  4. 6764

    Upaya Irlandia dalam Mengimplementasikan Renewable Energy Directive untuk Pemenuhan Energi Terbarukan 2030 by Amanda Nabila Noor Azahra, Haryo Prasodjo, Devita Prinanda

    Published 2023-07-01
    “…Penelitian ini menggunakan metode kualitatif, dengan menggunakan teori keamanan energi (energy security). Sumber data diperoleh dari studi terdahulu atau yang sering disebut kajian literatur atau kajian pustaka. …”
    Get full text
    Article
  5. 6765

    Seeking victims’ perspective on remedy: the case of Brasil Verde Farm’s workers by Regiane Cristina de Oliveira

    “…The workers’ narratives – collected through oral history methodology, during a fieldtrip to Piauí, in March 2016 –, help to overcome the ongoing debate on remedy studies related to the discourse of victims’ “wants and needs”, and reveal that any reparation measure that intend to promote social emancipation has to deal with the absences of the right to participation, security, adequate standards of living, health, adequate housing, education, and also access to land.…”
    Get full text
    Article
  6. 6766

    AFM-DViT: A framework for IoT-driven medical image analysis by Jiacheng Yang

    Published 2025-02-01
    “…The AFM-DViT model offers an effective solution for secure and efficient medical image analysis in IoT-enabled environments.…”
    Get full text
    Article
  7. 6767

    Application of edge-cloud collaborative intelligence technologies in power grids by Qing HAN, Kunlun GAO, Ting ZHAO, Jiangqi CHEN, Xinyu YANG, Shusen YANG

    Published 2021-03-01
    “…With the continuous development of the Internet of things on electricity (IoTE) and large-scale deployment of intelligent edge devices, an explosively increasing amount of data are being generated at the network edge.The efficient, fast and secure processing and analysis of the massive edge located data brings great challenges for the traditional cloud computing-based intelligence technologies.Instead, edge-cloud collaborative intelligence (ECCI) technologies can significantly outperform the cloud computing-based intelligence in terms of the network bandwidth saving, delay reduction and privacy protection, and therefore have shown a great potential in boosting the development of power grids.To investigate the application of ECCI in power grids, the concept and research progress of ECCI were firstly introduced.The characteristics and advantages of ECCI were summarized and its applicability in the power grids were discussed.Secondly, the key technologies of ECCI applications for power grids were discussed and the solutions based on ECCI technologies for two typical scenes were proposed respectively.Finally, a brief discussion of future work was given.…”
    Get full text
    Article
  8. 6768

    Coordinative Discourse of Strategic Sovereignty Tilting the European Union’s Institutional Balance by T. A. Romanova, S. V. Mazanik

    Published 2022-11-01
    “…The article uses the cases of the EU industrial, trade policy, and the common security and defense policy to demonstrate the changing institutional balance.The results of the study show that the main institutional beneficiary of "strategic sovereignty" is the European Commission. …”
    Get full text
    Article
  9. 6769

    A Chromosome level assembly of pomegranate (Punica granatum L.) variety grown in arid environment by Himanshu V. Patankar, Luis F. Rivera, Fatima Omari Alzahrani, Rod A. Wing, Ikram Blilou

    Published 2025-01-01
    “…Pomegranates can tolerate arid climates and are considered among the fruits that will play a major role in food security. However, the genomics resources of pomegranate growing in arid regions are scarce. …”
    Get full text
    Article
  10. 6770

    Ruling the streets: the policing of protest and political violence in Madrid during the Second Republic, 1931-1936 by Sergio Vaquero Martínez

    Published 2025-02-01
    “…The incoherent alternation of both repertoires followed politically motivated criteria and fostered an escalation of violence that increased the number of victims and obstructed the democratisation of the security apparatus. …”
    Get full text
    Article
  11. 6771

    Impact of Foreign Direct Investment in the Agricultural Sector on the Socio-Economic Development of Zambia Republic by Inna V. Andronova, Lubinda Haabazoka, Aaron Mwewa Kasonde

    Published 2024-12-01
    “…To address this problem, the Zambian Government has taken the path of promoting economic diversification, with agriculture being one of the most viable options due to its ability to create jobs, ensure food security and contribute to gross domestic product (GDP) by adding value and increasing output. …”
    Get full text
    Article
  12. 6772

    THE PREFERENCES OF CHOOSING TAXI-HAILING MODE ATTRIBUTES THROUGH THE BWS-CASE 1 by Mohsen MAKAREMI-SHARIFI, Amir Abbas RASSAFI

    Published 2024-03-01
    “…The results indicate that security and reassurance are the most crucial attributes when deciding this transportation mode, followed by accessibility. …”
    Get full text
    Article
  13. 6773

    Detection method of LDoS attack based on ACK serial number step-length by Zhijun WU, Qingbo PAN, Meng YUE

    Published 2018-07-01
    “…Low-rate denial of service (LDoS) attack is a potential security threat to big data centers and cloud computing platforms because of its strong concealment.Based on the analysis of network traffic during the LDoS attack,statistical analysis was given of ACK packets returned by the data receiver to the sender,and result reveals the sequence number step had the characteristics of volatility during the LDoS attack.The permutation entropy method was adopted to extract the characteristics of volatility.Hence,an LDoS attack detection method based on ACK serial number step permutation entropy was proposed.The serial number was sampled and the step length was calculated through collecting the ACK packets that received at the end of sender.Then,the permutation entropy algorithm with strong time-sensitive was used to detect the mutation step time,and achieve the goal of detecting LDoS attack.A test-bed was designed and built in the actual network environment for the purpose of verifying the proposed approach performance.Experimental results show that the proposed approach has better detection performance and has achieved better detection effect.…”
    Get full text
    Article
  14. 6774

    An improved lightweight ConvNeXt for rice classification by Pengtao Lv, Heliang Xu, Qinghui Zhang, Lei Shi, Heng Li, Youyang Chen, Yana Zhang, Dengke Cao, Zhongyang Liu, Yixin Liu, Jingwen Han, Zhan Zhang, Yiran Qi

    Published 2025-01-01
    “…As a major food crop widely grown around the world, the seed type of rice plays a key role in ensuring food security and optimizing agricultural productivity. …”
    Get full text
    Article
  15. 6775

    The Sudan conflict: A catalyst for the spread of infectious diseases in displaced populations by Ibrahim Nagmeldin Hassan, Nagmeldin Abuassa, Mohamed Ibrahim

    Published 2025-02-01
    “…Timely, coordinated responses are essential to mitigate health risks and protect global health security. This crisis highlights the critical need for sustained efforts to safeguard public health in conflict zones.…”
    Get full text
    Article
  16. 6776

    From forensic chemistry: an educational experience by González Graciela A.

    Published 2024-10-01
    “…In this way, it contributes to generating awareness about safety and security, ethics, and the professional responsibilities of chemists. …”
    Get full text
    Article
  17. 6777

    Linear gate bounds against natural functions for position-verification by Vahid Asadi, Richard Cleve, Eric Culf, Alex May

    Published 2025-01-01
    “…The scheme is feasible for a prover with linear classical resources and $O(1)$ quantum resources, and secure against sub-linear quantum resources.…”
    Get full text
    Article
  18. 6778

    Reconfigurable Antenna Assisted Intrusion Detection in Wireless Networks by Prathaban Mookiah, John M. Walsh, Rachel Greenstadt, Kapil R. Dandekar

    Published 2013-10-01
    “…The results show that the proposed scheme can add an additional layer of security that can significantly alleviate many vulnerabilities and threats in current fixed wireless networks.…”
    Get full text
    Article
  19. 6779

    Japan’s Foreign Policy Shifting in 2022 by Khaira Anisa, Juan Miguel Carboni Martínez

    Published 2024-07-01
    “…This article examines Japan's significant foreign policy changes in 2022, focusing on three crucial documents: the National Security Strategy (NSS), the National Defence Strategy (NDS), and the Medium-Term Defence Force Buildup Program (MTDP), issued on December 6, 2022. …”
    Get full text
    Article
  20. 6780

    Application of IoT and blockchain technology in the integration of innovation and industrial chains in high-tech manufacturing by Zepei Li, Peng Zheng, Yanjia Tian

    Published 2025-04-01
    “…The framework leverages blockchain technology to ensure data transparency and security, while smart contracts automate exception handling to enhance efficiency. …”
    Get full text
    Article