Showing 7,281 - 7,300 results of 9,720 for search '"Securities ', query time: 0.13s Refine Results
  1. 7281

    On Facial Expression Recognition Benchmarks by Ebenezer Owusu, Jacqueline Asor Kumi, Justice Kwame Appati

    Published 2021-01-01
    “…There are several applications of facial expressions in diverse fields including medicine, security, gaming, and even business enterprises. Thus, currently, automatic facial expression recognition is a hotbed research area that attracts lots of grants and therefore the need to understand the trends very well. …”
    Get full text
    Article
  2. 7282

    CAUSES OF PROLIFERATION OF SMALL ARMS AND LIGHT WEAPON ON NATION BUILDING ON THE PEOPLE OF UROMI (1970-1991) by Esezobor Paul, Fidelis Achoba

    Published 2023-08-01
    “…Government’s monopoly of arms and the security forces would be overwhelmed and unorganized groups and armed militias will constitute threat to the development of citizens of not only Esanland in Edo State but Nigeria as a whole. …”
    Get full text
    Article
  3. 7283

    Research on Information Fusion of Computer Vision and Radar Signals in UAV Target Identification by Yuan Wei, Tao Hong, Chaoqun Fang

    Published 2022-01-01
    “…The small size, sluggish flying speed, low flight altitude, and low electromagnetic intensity of unmanned aerial vehicles (UAVs) have put enormous strain on air traffic management and airspace security. It is urgent to achieve effective UAV target detection. …”
    Get full text
    Article
  4. 7284

    ANNULMENT OF A TRADEMARK FOR BAD FAITH by Roxana CATEA

    Published 2024-05-01
    “…Since in such cases, the name intended to be used as a trademark has already been unlawfully secured, interested parties may request its annulment, provided that the bad faith of the applicant is duly sustained with arguments and proofs. …”
    Get full text
    Article
  5. 7285

    Nonradiologist Physician Comprehension of Artificial Intelligence Utilization in Medical Imaging in Saudi Arabia by Hassan Ali Alsayegh, Yasser Nasser Asiri

    Published 2024-12-01
    “…Consultants and residents are comfortable acting on radiology reports, and privacy and security are continually maintained. Most participants were comfortable with the hybrid approach to radiological reporting.…”
    Get full text
    Article
  6. 7286
  7. 7287

    Influence of the Angular Position of a New Tunnel on Movement in the Surrounding Existing Tunnel by Nawel Bousbia

    Published 2024-12-01
    “…As a result, these elements could affect planning and security objectives.…”
    Get full text
    Article
  8. 7288

    Design of a GSM Based Energy Meter Monitoring and Tamper Detection System. by Bakenge Joshua

    Published 2023
    “…The project therefore predicts encouraging results in residential consumers’ power monitoring and theft detection that will help utilities to improve the reliability, security and operation of the power network.…”
    Get full text
    Thesis
  9. 7289

    Financial Innovations And Financial Inclusion Among Commercial Banks in Uganda by moses Agaba

    Published 2023
    “…As more clients choose mobile banking, the report advises banking institutions to develop measures to improve security in the platform. The report also advises making these platforms straightforward and simple to use in order to attract more users to the business. …”
    Get full text
    Article
  10. 7290

    Metabolomics profiling reveals p-aminobenzoic acid enhances resistance to Fusarium head blight in wheat by Yiluo Tan, Kangjun Wang, Mingming Guo, Guangxu Zhang, Xiaofeng Li, Yijun Shi, Maosheng He, Dayong Xu, Feng Chen, Jiwei Fan

    Published 2025-02-01
    “…Abstract Fusarium head blight (FHB) not only causes severe yield losses but also mycotoxin contamination in wheat, posing a serious threat to food security and public health. The mechanisms of resistance to FHB in wheat are critical for effective prevention and control of the pathogen. …”
    Get full text
    Article
  11. 7291

    LKM: A LDA-Based -Means Clustering Algorithm for Data Analysis of Intrusion Detection in Mobile Sensor Networks by Yuhua Zhang, Kun Wang, Min Gao, Zhiyou Ouyang, Siguang Chen

    Published 2015-10-01
    “…Intrusion detection system (IDS) is a kind of active network security technology to protect network from attacks. …”
    Get full text
    Article
  12. 7292

    Improving VANETs Connectivity with a Totally Ad Hoc Living Mobile Backbone by Joilson Alves Junior, Emilio C. G. Wille

    Published 2015-01-01
    “…The vehicular ad hoc network (VANET) for intelligent transportation systems is an emerging concept to improve transportation security, reliability, and management. The network behavior can be totally different in topological aspects because of the mobility of vehicular nodes. …”
    Get full text
    Article
  13. 7293

    Strained two-dimensional tungsten diselenide for mechanically tunable exciton transport by Jin Myung Kim, Kwang-Yong Jeong, Soyeong Kwon, Jae-Pil So, Michael Cai Wang, Peter Snapp, Hong-Gyu Park, SungWoo Nam

    Published 2024-12-01
    “…Abstract Tightly bound electron-hole pairs (excitons) hosted in atomically-thin semiconductors have emerged as prospective elements in optoelectronic devices for ultrafast and secured information transfer. The controlled exciton transport in such excitonic devices requires manipulating potential energy gradient of charge-neutral excitons, while electrical gating or nanoscale straining have shown limited efficiency of exciton transport at room temperature. …”
    Get full text
    Article
  14. 7294

    Trade-off or synergy? The impacts of coal energy consumption on compound system vulnerability: A perspective from coal resource base assessment by Zhaorui Jing, Xiangyu Min, Sijia Li, Junying Li, Wen Song

    Published 2025-01-01
    “…The management partition will be divided into five zones and the capacity reduction trajectory into advancing, developmental, and stable phases, aims to ensure national energy security and foster sustainable coordinated development in the region.…”
    Get full text
    Article
  15. 7295

    Recognition of Reconstructed Frontal Face Images Using FFT-PCA/SVD Algorithm by Louis Asiedu, Felix O. Mettle, Joseph A. Mensah

    Published 2020-01-01
    “…Modern face recognition modules/algorithms have been successful in many application areas (access control, entertainment/leisure, security system based on biometric data, and user-friendly human-machine interfaces). …”
    Get full text
    Article
  16. 7296

    Decentralisation and beyond: The impact of blockchain on global economies, banking, and governance by Sharma Mohit, Patidar Sanjay

    Published 2024-01-01
    “…While blockchain offers solutions for critical digital needs such as user verification, data security, and intellectual property management, its widespread adoption remains constrained by a limited understanding of its benefits. …”
    Get full text
    Article
  17. 7297

    Blinding HT: Hiding Hardware Trojan signals traced across multiple sequential levels by Ying Zhang, Minghui Ge, Xin Chen, Jiaqi Yao, Zhiming Mao

    Published 2022-01-01
    “…However, there may be Hardware Trojans (HTs) in IP cores, which will cause critical security problem. There are already many HT detection methods which claim to detect all publicly available HT benchmarks. …”
    Get full text
    Article
  18. 7298

    Understanding ChatGPT: Impact Analysis and Path Forward for Teaching Computer Science and Engineering by P. Banerjee, Anurag K. Srivastava, Donald A. Adjeroh, Ramana Reddy, Nima Karimian

    Published 2025-01-01
    “…In this paper, common classroom problems and their respective responses from ChatGPT in the domains of Computer Science, Cyber Security, Data Science, and Electrical Engineering are analyzed to determine the categories of queries for which ChatGPT offers reliable responses and those for which it may be factually incorrect. …”
    Get full text
    Article
  19. 7299

    Data on insect biodiversity in a Chinese potato agroecosystem from DNA metabarcoding by Changjin Lin, Chenxi Liu, Lilin Chen, Hongmei Cheng, Muhammad Ashfaq, Paul D. N. Hebert, Yulin Gao

    Published 2025-01-01
    “…Abstract Potato (Solanum tuberosum) is a staple crop important in global food security. As a leading potato producer, China faces significant challenges from insect pest infestations that compromise yield and quality. …”
    Get full text
    Article
  20. 7300

    Research on Intelligent Monitoring and Protection Equipment of Vital Signs of Underground Personnel in Coal Mines: Review by Yuntao Liang, Yingjie Liu, Changjia Lu, Dawei Cui, Jinghu Yang, Rui Zhou

    Published 2024-12-01
    “…With the development of technology, the application of intelligent security technology in coal mine safety has broad prospects. …”
    Get full text
    Article