Showing 6,781 - 6,800 results of 9,720 for search '"Securities ', query time: 0.12s Refine Results
  1. 6781

    Design of an Uninterrupted Power Supply with Li-Ion Battery Pack: A Proposal for a Cost-Efficient Design with High Protection Features by Thealfaqar A. Abdul-jabbar, Adel A. Obed, Ahmed J. Abid

    Published 2021-06-01
    “…Besides, li-ion batteries require a safe and secure ground to reach the best performance and decrease the explosion risk. …”
    Get full text
    Article
  2. 6782

    The Influence of Intrinsic Motivation and Supportive Leadership on Innovative Behavior through Career Sustainability and Psychological Safety of Employees in E-Commerce Companies i... by Griselda Nabila Fauzi, Putri Mega Desiana, Putri Mega Desiana

    Published 2025-01-01
    “…This study examines the influence of intrinsic motivation and supportive leadership on the innovative behavior of employees in Indonesian e-commerce companies, with career sustainability and psychological security as mediation. The data was collected through surveys of employees at Shopee, Tokopedia, Bukalapak, Blibli, and Lazada. …”
    Get full text
    Article
  3. 6783

    Money Laundering Practices and Singapore’s Steps Against Indonesian Tax Amnesty by Septyanto Galan Prakoso, Royce Kharisma Agung Wibowo, Nadia Dian Ardita, Ferdian Ahya Al Putra, Retnaningtyas Puspitasari

    Published 2025-01-01
    “…The implementation of those policies is classified as a two-pronged sword because it also ensures the privacy and security of corrupt money investments from other countries. …”
    Get full text
    Article
  4. 6784

    Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks by A. M. Balamurugan, A. Sivasubramanian

    Published 2014-01-01
    “…However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). …”
    Get full text
    Article
  5. 6785

    Exploring the relationship between learning emotion and cognitive behaviors in a digital game by Li Chen, Zehui Zhan, Han Chen, Linlin Zheng

    Published 2024-09-01
    “…The study demonstrates that high‐level learners maintained a high level of insightful emotion throughout the game, excelled at constructing strategic formations to control more significant chessboard areas, and preferred to reserve powerful pieces until the end to secure a winning advantage. Conversely, low‐level learners exhibit a predominant level of neutral emotion, especially during unrelated behaviors, and struggle to maintain a strategic overview, focusing instead on smaller, immediate gains, which hamper the application of deeper strategies.…”
    Get full text
    Article
  6. 6786

    Money Laundering Practices and Singapore’s Steps Against Indonesian Tax Amnesty by Septyanto Galan Prakoso, Royce Kharisma Agung Wibowo, Nadia Dian Ardita, Ferdian Ahya Al Putra, Retnaningtyas Puspitasari

    Published 2025-01-01
    “…The implementation of those policies is classified as a two-pronged sword because it also ensures the privacy and security of corrupt money investments from other countries. …”
    Get full text
    Article
  7. 6787

    Touristic destination image in light of the service dominant logic of marketing by Edar da Silva Añaña, Francisco Antonio dos Anjos, Melise de Lima Pereira

    Published 2018-07-01
    “…Results indicate that values related to self-respect, security and excitement influence the assessment of some TDI components, and that the last four constructs influence the likelihood of individuals to visit or to recommend the destinations.…”
    Get full text
    Article
  8. 6788

    Adaptive Coordinated Variable Speed Limit between Highway Mainline and On-Ramp with Deep Reinforcement Learning by Ming Cheng, Chenghao Zhang, Hui Jin, Ziming Wang, Xiaoguang Yang

    Published 2022-01-01
    “…This research provides insights into the management of highway capacity so as to secure traffic efficiency and reliability for the merging zone.…”
    Get full text
    Article
  9. 6789

    DETECTION AND RECOGNITION OF IRAQI LICENSE PLATES USING CONVOLUTIONAL NEURAL NETWORKS by Mohammed Hayder Abbas, Zeina Mueen Mohammed

    Published 2025-01-01
    “…Multiple agencies worldwide have quickly and widely adopted the recognition of a vehicle license plate technology to expand their ability in investigative and security matters. License plate helps detect the vehicle's information automatically rather than a long time consuming manually gathering for the information. …”
    Get full text
    Article
  10. 6790

    The Rare Coincidence: Nonrecurrent Laryngeal Nerve Pointed by a Zuckerkandl's Tubercle by Emin Gurleyik, Sami Dogan, Omer Gunal, Mevlut Pehlivan

    Published 2012-01-01
    “…Anatomical and embryological variations of the inferior laryngeal nerve (ILN), of the thyroid gland itself and unusual relations between ILN and the gland threaten operation security are discussed. The patient with toxic multinodular goiter is treated with total thyroidectomy. …”
    Get full text
    Article
  11. 6791

    An Analysis of the Social Wellbeing of Youth in Turkey Based on the “2017 Global Youth Wellbeing Index” by Hülya Eker, Esra Burcu

    Published 2023-12-01
    “…The ‘2017 Global Youth Wellbeing Index’ (GYWI) is an international index explaining the social wellbeing status of the youth of different countries in terms of ‘civil participation’, ‘economic opportunities’, ‘education’, ‘health’, ‘information and communication technologies’, ‘safety and security’, and ‘gender equality’. In the current study, the social wellbeing of the youth in Turkey was analyzed on the basis of the data related to the specified domains of this index. …”
    Get full text
    Article
  12. 6792

    Implementation of Static Line Voltage Stability Indices for Improved Static Voltage Stability Margin by Natakorn Thasnas, Apirat Siritaratiwat

    Published 2019-01-01
    “…This paper presents an approach for enhancing the static voltage stability margin and reducing the power losses of the system with voltage security-constrained optimal power flow (VSC-OPF) that is based on static line voltage stability indices. …”
    Get full text
    Article
  13. 6793

    « Conquérir la galère. » Espace public et discipline de l’intime chez des femmes sans papiers en Île-de-France by Joanne Le Bars

    Published 2024-11-01
    “…The violence of the disciplinary system engendered by undocumented situation leads to a subjective revolution for undocumented women and puts emotional security and decision-making sovereignty in tension. …”
    Get full text
    Article
  14. 6794

    Forearm multimodal recognition based on IAHP‐entropy weight combination by Chaoying Tang, Mengen Qian, Ru Jia, Haodong Liu, Biao Wang

    Published 2023-01-01
    “…Abstract Biometrics are the among most popular authentication methods due to their advantages over traditional methods, such as higher security, better accuracy and more convenience. The recent COVID‐19 pandemic has led to the wide use of face masks, which greatly affects the traditional face recognition technology. …”
    Get full text
    Article
  15. 6795

    Transformation of business under the influence of artificial intelligence by Buha Vesna, Lečić Rada, Berezljev Ljiljana

    Published 2024-01-01
    “…Research results of Forbes Advisor (2023) indicate that the most common use of AI is in Customer Service, Cyber Security, Digital Personal Assistants, Customer Relationship Management (CRM), etc. …”
    Get full text
    Article
  16. 6796

    Distributionally Robust Self-Scheduling Optimization with CO2 Emissions Constraints under Uncertainty of Prices by Minru Bai, Zhupei Yang

    Published 2014-01-01
    “…As a major energy-saving industry, power industry has implemented energy-saving generation dispatching. Apart from security and economy, low carbon will be the most important target in power dispatch mechanisms. …”
    Get full text
    Article
  17. 6797

    Efficiency and Progressivity Measures of the Flat Tax with a Special Focus on Bosnia and Herzegovina by Lejla Lazović-Pita

    Published 2015-12-01
    “…Progressivity indicators are very low and are a result of the flat PIT and flat social security contributions (hereafter: SSCs). Finally, for the case of Bosnia and Herzegovina (B&H), efficiency and progressivity measures can be enhanced indicating that PIT reforms should be brought together with SSCs reforms. …”
    Get full text
    Article
  18. 6798

    Passive biometric electronic lock via UHF RFID by Xiang ZOU, Jinsong HAN, Yuhang QU, Jian XIAO, Xian XU

    Published 2021-04-01
    “…A biometric lock design method was proposed based on the internal features of human body, namely PBLock.It used the backscattered RF signals to collect the impedance characteristics of human fingertips through the contact between human fingers and tags.The advantage of such authentication method is that the human impedance was not easy to be stolen, and it was fully integrated with the hardware characteristics of the device (RFID tags), which greatly increased the difficulty for the attacker to copy and clone.To ensure the availability and efficiency of the system, an optimization authentication mechanism was proposed by cutting tag antenna, which effectively improved the impedance sensitivity.Moreover, the feasibility of passive drive was discussed by using the electromagnetic energy advantage of RFID system.Through a large number of experimental evaluations, the authentication accuracy of PBLock can reach 96%, and the average time cost of a single authentication is 1.4 seconds.Some attack models were presented based on practical environment.The results show that PBLock can effectively prevent counterfeiting attack, impersonation attack and replay attack, which provides an opportunity for the secure application of new biometric electronic locks.…”
    Get full text
    Article
  19. 6799

    Recent Web Platforms for Multi-Omics Integration Unlocking Biological Complexity by Eugenia Papadaki, Ioannis Kakkos, Panagiotis Vlamos, Ourania Petropoulou, Stavros T. Miloulis, Stergios Palamas, Aristidis G. Vrahatis

    Published 2024-12-01
    “…Finally, the paper proposes directions for future research and development, emphasizing the importance of more advanced, user-friendly, and secure platforms that can better serve comprehensive healthcare needs.…”
    Get full text
    Article
  20. 6800

    Farmers’ intentions to adopt Triple S for sweetpotato seed conservation by Sarah Mayanja, Janet Mwende, Norman Kwikiriza, Julius Okello, Guy Hareau, Joseph Ssekandi

    Published 2024-12-01
    “…This constrains the crop’s potential to contribute to food security. Triple S (sand, storage, sprouting) is a root-based technology addressing seed scarcity. …”
    Get full text
    Article