Showing 7,081 - 7,100 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 7081

    Improvement of Specific Multi-target Tracking Algorithm in Cross-domain Environment by MU Xiaofang, LI Hao, LIU Jiaji, LIU Zhenyu, LI Yue

    Published 2025-01-01
    “…[Purposes] Multi-target tracking in the cross-domain environment of surveillance video is a very important and challenging task in intelligent security. The difficulties of this task lie in the frequent occlusion between the objects in video frame, the unknown start and end time of the trajectory, the too small sized targets, the interactions between the objects, the apparent similarity, and the camera angle changes. …”
    Get full text
    Article
  2. 7082

    From Maximization to Optimization: A Paradigm Shift in Rice Production in Thailand to Improve Overall Quality of Life of Stakeholders by Ryoichi Doi, Supachai Pitiwut

    Published 2014-01-01
    “…The system has resulted in good health conditions for the farmers and villagers, financial security, availability of extra time, and additional opportunities and freedom and hence in the improvement of their overall quality of life. …”
    Get full text
    Article
  3. 7083

    Stability analysis of the tunnel face adjacent to longitudinal stratigraphic interface using the upper bound theorem by Jian Shi, Shilin Zhang, Binghe Zhang, Sen Teng, Mingkai Zhao

    Published 2025-01-01
    “…The secure condition of the tunnel face perpetually remains as a matter of substantial concern throughout the execution of tunnel-construction endeavors. …”
    Get full text
    Article
  4. 7084

    UAV Path Planning Based on Improved A∗ and DWA Algorithms by Xiong Bai, Haikun Jiang, Junjie Cui, Kuan Lu, Pengyun Chen, Ming Zhang

    Published 2021-01-01
    “…This work proposes a path planning algorithm based on A∗ and DWA to achieve global path optimization while satisfying security and speed requirements for unmanned aerial vehicles (UAV). …”
    Get full text
    Article
  5. 7085

    A Novel Surgical Technique for Fixation of Recurrent Acromioclavicular Dislocations: AC Dog Bone Technique in Combination with Autogenous Semitendinosus Tendon Graft by Patrick Holweg, Wolfgang Pichler, Gerald Gruber, Ellen Tackner, Franz Josef Seibert, Patrick Sadoghi, Gloria Hohenberger

    Published 2017-01-01
    “…This is the first case in literature that utilizes the artificial dog bone ligament securing the autograft in an anatomic AC reconstruction.…”
    Get full text
    Article
  6. 7086

    Revolutionizing Agriculture: A Comprehensive Review of AI-Enabled Precision Irrigation and Water Quality Forecasting by Hajar Hamdaoui, Youness Hsana, Inass Hamdi, Hanae Al kaddouri, Nour-Eddine Kouddane

    Published 2024-12-01
    “…This review emphasizes AI's role in addressing water scarcity and optimizing irrigation in agriculture by utilizing different technologies to ensure sustainable water management and food security. Future researchers will find this review valuable for understanding AI's current impact on irrigation and identifying avenues for further innovation. …”
    Get full text
    Article
  7. 7087

    Carotid Baroreceptor Stimulation for the Treatment of Resistant Hypertension by Vasilios Papademetriou, Michael Doumas, Charles Faselis, Constantinos Tsioufis, Stella Douma, Eugene Gkaliagkousi, Chrysanthos Zamboulis

    Published 2011-01-01
    “…While accumulating evidence indicates that carotid baroreceptor stimulation exerts its benefits beyond blood pressure reduction, further research is necessary to assess the spectrum of beneficial effects and evaluate potential hazards, before the extraction of secure conclusions.…”
    Get full text
    Article
  8. 7088

    Assessing taxpayers’ satisfaction with tax administration e-services by Lidija Hauptman, Nika Vetrih, Alenka Kavkler

    Published 2024-12-01
    “…The results suggest that improving tax information’s usability, clarity, and security increases taxpayers’ confidence and satisfaction. …”
    Get full text
    Article
  9. 7089

    Signal theory based encryption of faster-than-Nyquist signals for fiber and wireless transmission by Abhinand Venugopalan, Karanveer Singh, Janosch Meier, Thomas Schneider

    Published 2025-01-01
    “…The encryption is simple, fast and power efficient, and offers a solution for secure data transmission in existing and future communication networks.…”
    Get full text
    Article
  10. 7090

    “Big Challenges” and Regional Technical University: Values and Actions by R. V. Aginey, O. I. Belyaeva

    Published 2020-03-01
    “…There is a distinction between civilization and globalist paradigms of Russia positioning, as well as a distinction between well-being and security as two strategies of values generalization. …”
    Get full text
    Article
  11. 7091

    Higher Education as Soft Power Potential of Russia by M. M. Lebedeva, J. Fort

    Published 2009-12-01
    “…At the same time the USA has secured the leading role in international education. …”
    Get full text
    Article
  12. 7092

    Operational Risk Assessment of Distribution Network Equipment Based on Rough Set and D-S Evidence Theory by Cunbin Li, Gefu Qing, Peng Li, Tingting Yin

    Published 2013-01-01
    “…Therefore, scientific assessment of power distribution equipment operation risk is significant to the security of power distribution system. In order to get the satisfactory assessment conclusions from the complete and incomplete information and improve the assessment level, an operational risk assessment model of distribution network equipment based on rough set and D-S evidence theory was built. …”
    Get full text
    Article
  13. 7093

    The urgency of addressing zoonotic diseases surveillance: Potential opportunities considering One Health approaches and common European Data Spaces by Nicola Riccetti, Serena Signorelli, Angela Fanelli, Emanuele Massaro, Manlio Bacco, Wojciech Szewczyk, Dolores Ibarreta, Juan Carlos Ciscar, Alessandro Cescatti, Sandra Coecke, Ilaria Capua

    Published 2025-04-01
    “…Consequently, this approach might foster data sharing from Member States by leveraging existing developments within data spaces in terms of, for example, data security. It could also support researchers and developers in accessing transdisciplinary, stratified, and quality-controlled data for their projects.…”
    Get full text
    Article
  14. 7094

    The fungicidal effect of Rosa Damascena Mill extracts against fungal infections invading Plants in Al Taif by Ali Dosh Mohammed Hassan, Alamri Saleh Hamdan, Al-Ghamdi Saleh Bakheet, Al-Zahrani Salma A., El-Sayed Sahar A., Melebari Mohammad, Gazi Khaled S., Alharthi Haitham Abdulrahman S., Al-Mutairi Salman Faleh, Thabet Mohammed A., Almiman Bandar Fahad

    Published 2025-01-01
    “…This data facilitate the contributing to the exploration of a more secure alternative to fungicides. Further, it will facilitate the development of regulatory approaches aimed at alleviating the detrimental consequences of fungal infections.…”
    Get full text
    Article
  15. 7095

    Improving wheat yield prediction through variable selection using Support Vector Regression, Random Forest, and Extreme Gradient Boosting by Juan Carlos Moreno Sánchez, Héctor Gabriel Acosta Mesa, Adrián Trueba Espinosa, Sergio Ruiz Castilla, Farid García Lamont

    Published 2025-03-01
    “…Plant breeding centers, in their relentless pursuit of more productive and resilient wheat varieties, have generated vast data repositories that are fundamental to ensuring global food security. This study uses these data to develop a wheat grain yield (GY) prediction model, using machine learning techniques such as Random Forest (RF), Support Vector Regression (SVR), and Extreme Gradient Boosting (XGBoost). …”
    Get full text
    Article
  16. 7096

    Dynamic hierarchical quantum secret sharing protocol based on high-dimensional GHZ state by CHEN Keqin, ZOU Zheng, CAI Binbin, LIN Song

    Published 2024-10-01
    “…The correctness of the proposed protocol was verified through mathematical proof. In addition, security analysis results showed that the proposed protocol could resist intercept-and-resend attack, measure-and-resend attack, entangle-and-measure attack, Trojan horse attack, as well as collusion attacks from internal participants.…”
    Get full text
    Article
  17. 7097

    The use of Telenomus remus (Nixon, 1937) (Hymenoptera: Scelionidae) in the management of Spodoptera spp.: potential, challenges and major benefits by Yelitza Coromoto Colmenarez, Dirk Babendreier, Francisco Ramón Ferrer Wurst, Carlos Luis Vásquez-Freytez, Adeney de Freitas Bueno

    Published 2022-01-01
    “…Abstract Spodoptera frugiperda (Smith, 1797) (Lepidoptera: Noctuidae), also known as fall armyworm (FAW) is a polyphagous pest which can cause significant losses and is considered a global threat to different crops and a risk to food security. Currently, in maize, the pest is predominantly controlled by pesticides or transgenic events. …”
    Get full text
    Article
  18. 7098

    Risk Assessment of an Existing Metro Tunnel in Close Proximity to New Shield Tunnels following Construction by Yong Xu, Ming Xia, Wei Zhang, Zheyu Li, Zhiqiang Zhang

    Published 2022-01-01
    “…The threshold of indicators in the existing tunnel structure risk assessment system was determined based on the tunnel function and structure security. Then, we described the membership vector determination method, weight vector determination method, and comprehensive evaluation vector processing method. …”
    Get full text
    Article
  19. 7099

    Trade policy uncertainty and corporate financialization: strategic implications for non-financial firms in China by Mingyao Wang, Normaziah Mohd Nor, Norhuda Abdul Rahim, Faisal Khan, Ziyu Zhou

    Published 2025-12-01
    “…This analysis emphasizes the significance of legislators in ensuring policy stability and fostering a secure business environment. Furthermore, the robustness of these results was sustained when alternative key variables and methodologies were applied.…”
    Get full text
    Article
  20. 7100

    Differentially Private Clustered Federated Load Prediction Based on the Louvain Algorithm by Tingzhe Pan, Jue Hou, Xin Jin, Chao Li, Xinlei Cai, Xiaodong Zhou

    Published 2025-01-01
    “…To address the data heterogeneity and security issues encountered in load forecasting for smart grids, this paper proposes a load-forecasting framework suitable for residential energy users, which allows users to train personalized forecasting models without sharing load data. …”
    Get full text
    Article