Showing 6,801 - 6,820 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 6801

    Synthesis of antifungal imines as inhibitors of ergosterol biosynthesis by Joydeep Karan, Aditi Kundu, Robin Gogoi, Kanchikeri Math Manjaiah, Ashutosh Kumar Singh, Koyel Mondal, Rajesh Kumar, Parshant Kaushik, Priya Saini, Virendra Singh Rana, Najam Akhtar Shakil

    Published 2025-12-01
    “…Ensuring a safe and secure supply of nutritious food for the ever growing global population necessitates the development of new eco-friendly fungicides to increase global food output by minimizing plant disease losses. …”
    Get full text
    Article
  2. 6802

    The global implications of a Russian gas pivot to Asia by Steve Pye, Michael Bradshaw, James Price, Dan Zhang, Caroline Kuzemko, Jack Sharples, Dan Welsby, Paul E. Dodds

    Published 2025-01-01
    “…How this regional conflict impacts the future of natural gas markets is subject to three interconnected factors: (i) Russia’s strategy to regain markets for its gas exports; (ii) Europe’s push towards increased liquified natural gas (LNG) and the pace of its low carbon transition; and (iii) China’s gas demand and how it balances its climate and energy security objectives. A scenario modelling approach is applied to explore the potential implications of this geopolitical crisis. …”
    Get full text
    Article
  3. 6803

    Regulatory challenges in ai-based diagnostics: Legal implications of ai use in medical diagnostics by Naili Yuris Tri, Mangkunegara Iis Setiawan, Purwono, Baballe Muhammad Ahmad

    Published 2025-01-01
    “…The research results indicated that algorithmic bias, data security, and the requirement for stringent rules to guarantee the ethical and safe application of AI are the primary obstacles. …”
    Get full text
    Article
  4. 6804

    A systematised review and evidence synthesis on the broader societal impact of vaccines against Salmonella by Ezgi Dilek Demirtas, Rosanna Barnard, Jungseok Lee, Mark Jit

    Published 2025-02-01
    “…Despite variations in study design, methodology, and study quality, salmonellae infections were largely associated with negative broader societal impacts, including detriments in childhood physical development (very weak association), childhood educational development (strong to very strong association), household security (moderate association), public health spending (moderate association), and national income (moderate to strong association). …”
    Get full text
    Article
  5. 6805

    Optimal SES Selection Based on SVD and Its Application to Incipient Bearing Fault Diagnosis by Longlong Li, Yahui Cui, Runlin Chen, Xiaolin Liu

    Published 2018-01-01
    “…To distinguish the incipient fault of bearing before it steps into serious failure is the main task of condition monitoring and fault diagnosis technology which could guarantee the reliability and security of rotating machinery. The early defect occurring in the REB is too weak and manifests itself in heavy surrounding noise, thus leading to the inefficiency of the fault detection techniques. …”
    Get full text
    Article
  6. 6806

    Application of Computer-Based Techniques for Monitoring Animal Health, Behavior and Welfare: A Review by A. S. Famuyiwa, O. P. Dosunmu, D. Jimi-Olatunji

    Published 2025-01-01
    “…Advances in machine learning, IoT, and blockchain have further expanded capabilities, enabling predictive insights and ensuring data security and transparency. These technologies support early disease detection, facilitate better decision-making, and reduce human labor, addressing both productivity and welfare standards. …”
    Get full text
    Article
  7. 6807

    Stingless Bee Honey Farming and Farmer Empowerment in Sawahlunto City, West Sumatra, Indonesia by Oktavia Y., Mahdi Mahdi, Astuti N.B., Hidayat R., Yonariza Yonariza, Mutiani C., Anwar H., Goembira F., Arbain A.

    Published 2025-01-01
    “…Interviews with farmers, local officials, and researchers revealed that honey production significantly enhances farmers’ incomes, diversifies agricultural activities, and improves food security. Ecological benefits, such as enhanced pollination and biodiversity conservation, were also acknowledged. …”
    Get full text
    Article
  8. 6808

    Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version by M. Rajesh Babu, S. Moses Dian, Siva Chelladurai, Mathiyalagan Palaniappan

    Published 2015-01-01
    “…Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. …”
    Get full text
    Article
  9. 6809

    An examination of the enhanced photocatalytic performance of PEO coatings applied on Mg alloys: A review by Arash Fattah-alhosseini, Stevan Stojadinović, Razieh Chaharmahali, Andrey Gnedenkov

    Published 2024-11-01
    “…Of the various strategies for securing nanoparticles to a substrate, photocatalytic coatings have emerged as a promising solution to overcome the common limitations associated with powdered forms. …”
    Get full text
    Article
  10. 6810

    Source-independent quantum random number generators with integrated silicon photonics by Yongqiang Du, Xin Hua, Zhengeng Zhao, Xiaoran Sun, Zhenrong Zhang, Xi Xiao, Kejin Wei

    Published 2025-01-01
    “…Our research paves the way for integrated SI-QRNGs, providing a cost-effective and robust secure QRNG module for next-generation communications.…”
    Get full text
    Article
  11. 6811

    Unveiling Islamophobia: navigating its presence in Sweden by Adrián Groglopo, Fereshteh Ahmadi, Jimmy Stephen Munobwa

    Published 2025-12-01
    “…Political and media narratives often manufacture immigration as a social problem, framing the construction of meaning through the discourses of cultural differences as social, political and security problems. Of specific concern is how Muslims and immigrants from predominantly Muslim countries are perceived as the undesirable ‘Other’. …”
    Get full text
    Article
  12. 6812

    "CYCLIST ON THE MARSH": LESSONS AND PROSPECTS OF THE LAST EU ENLARGEMENT by A. I. Tevdoy-Bourmouli

    Published 2013-08-01
    “…Specific historic experience of the applicants pre-determined a considerable specialty of west-European fashioned democratic regimes in those countries, weakness of consensus and tolerance culture which has already rooted itself in the West-European society, and which has to a considerable degree secured stable development of Western Europe over the last decades. …”
    Get full text
    Article
  13. 6813

    Trust evaluation model of cloud user based on behavior data by Zhenguo Chen, Liqin Tian, Chuang Lin

    Published 2018-05-01
    “…The user authentication can provide a certain degree of security, but when the user information was leaked, this method will not be effective. …”
    Get full text
    Article
  14. 6814

    Mitigating the implementation of SDGs program no. 13 in Indonesia: An overview of social dynamics and local wisdom by Negara Anita Puspita, Ariza Irena Sulistya, Nurjaya Luh Asri Ningsih Widhi, Ubaidillah Moh. Farich, Wijaya Rama, Lestari Vissia Poppy Puspita, Saputro Erwan Adi, Sukirmiyadi, Nurherdiana Silvana Dwi

    Published 2025-01-01
    “…The review explores key sectors including waste management, forest fire prevention, population dynamics, food security, and urban planning. Findings highlight that while local wisdom-based practices like “Tri Hita Karana” and customary land-use regulations are effective in mitigating environmental damage, scaling these approaches across diverse communities remains a challenge. …”
    Get full text
    Article
  15. 6815

    Operational Risk Assessment for International Transport Corridor: A Case Study of China-Pakistan Economic Corridor by Yang Lei, Chengfeng Huang, Yuan Wu

    Published 2019-01-01
    “…The risk management and control should focus on these three types of risks and strengthen the security management along the route. Strengthen policy docking and communication, maintain political stability, and strengthen antiterrorism cooperation.…”
    Get full text
    Article
  16. 6816

    Analysis of attacks on device manager in software-defined Internet of Things by Tri-Hai Nguyen, Myungsik Yoo

    Published 2017-08-01
    “…Although being the one that performs one of the most crucial services, the device managers in current primary controllers have a big security issue as they do not include any device verification, authentication, or authorization routines. …”
    Get full text
    Article
  17. 6817

    A dual benchmarking study of facial forgery and facial forensics by Minh Tam Pham, Thanh Trung Huynh, Thanh Tam Nguyen, Thanh Toan Nguyen, Thanh Thi Nguyen, Jun Jo, Hongzhi Yin, Quoc Viet Hung Nguyen

    Published 2024-12-01
    “…Abstract In recent years, visual facial forgery has reached a level of sophistication that humans cannot identify fraud, which poses a significant threat to information security. A wide range of malicious applications have emerged, such as deepfake, fake news, defamation or blackmailing of celebrities, impersonation of politicians in political warfare, and the spreading of rumours to attract views. …”
    Get full text
    Article
  18. 6818

    Analysis of cyber incidents in Senegal from 2005 to 2023 by Ciré Sall

    Published 2024-12-01
    “…Based on the findings, the author recommends, inter alia, improved Senegalese government monitoring and reporting of cyber threats, with an emphasis on cooperation between the state’s Computer Security Incident Response Team (CSIRT-Senegal, or SNCSIRT) and the CSIRT-Universitaire established by tertiary institutions in the country.   …”
    Get full text
    Article
  19. 6819

    Trust and Distrust in a Democratic State of Law by Marta Krasoń, Robert Krasoń

    Published 2024-12-01
    “…The key task of public administration, aimed at inspiring and intensifying trust, is to obtain and secure the common good in the state on the basis of, and within the limits of, the applicable legal regulations, which at the same time set out the methods and scope of social protection in the individual spheres of operation of the legislative, executive, and judicial authorities.…”
    Get full text
    Article
  20. 6820

    ASSESSMENT AND ANALYSIS OF DIGITAL TRANSFORMATION OF REGIONAL ECONOMIC SYSTEMS OF THE RUSSIAN FEDERATION: METHODOLOGICAL APPROACHES AND THEIR APPROBATION by M. R. Safiullin, A. A. Abdukaeva, L. A. Elshin

    Published 2020-02-01
    “…A distinctive aspect of the proposed algorithm is the orientation of the developed tools to study the five main directions of digitalization, defined by the Order of the Government of the Russian Federation of July 28, 2017 (No. 1632-r): regulatory regulation, personnel for the digital economy, formation of research competencies and technological foundations, information infrastructure, information security. Based on the results of the study, the main qualitative and quantitative characteristics have been identified, that assess the development of the digital economy in the constituent entities of the Russian Federation at the present stage of development; a toolkit has been offered, that allows you to determine key areas of regional policy aimed at intensifying the processes of digitalization of business processes.…”
    Get full text
    Article