Showing 7,541 - 7,560 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 7541

    Residual life prediction of defected Polypropylene Random copolymer pipes (PPR) by Abderazzak Ouardi, Fatima Majid, Nadia Mouhib, Mohamed Elghorba

    Published 2018-01-01
    “…Sudden overpressure is one of the most common problems in piping. It can affect the security of goods and the safety of people. In this context, we have performed tests of overpressures at the laboratory scale according to ASTM D1599 standard, on virgin and notched pipes, to characterize mechanically the fracture behavior of PPR pipes. …”
    Get full text
    Article
  2. 7542

    Utilizing Diagnostic Musculoskeletal Ultrasound for Assessment of the Infraspinatus Muscle and Tendon: Implications for Rehabilitation Professionals by Robert C Manske, Michael Voight, Chris Wolfe, Phil Page

    Published 2024-07-01
    “…The rotator cuff, comprising the subscapularis, supraspinatus, infraspinatus, and teres minor muscles, plays a crucial role in stabilizing the glenohumeral joint by securing the head of the humerus within the glenoid cavity of the scapula. …”
    Get full text
    Article
  3. 7543

    A case series on the basic concept and design of removable partial dentures: support and bracing considerations by Jun Takebe

    Published 2025-01-01
    “…Therefore, it is essential to emphasize the importance of providing patients with appropriate, safe, and secure removable partial dentures and have clinicians rerecognize the concept and importance of support and bracing. …”
    Get full text
    Article
  4. 7544

    Reflections on the possible application of Rome I Regulation to obligations related to crypto-assets by Michał Mariański

    Published 2024-12-01
    “… Regulation No. 2023/1114 of the European Parliament and Council of 31 May 2023 on cryptoasset markets is a crucial component of financial market regulation that has significantly contributed to increasing the legal security of its participants. This study does not aim to analyse the basic rules of crypto-asset trading or make an assessment of their legal status but rather seeks to determine how the law applicable to obligations related to crypto-assets could be determined. …”
    Get full text
    Article
  5. 7545
  6. 7546

    THE EFFECT OF FINANCIAL DEVELOPMENT ON RENEWABLE ENERGY CONSUMPTION IN CAMEROON by Nguiffo Joel Salomon, Etoa Etoa Jean Bosco

    Published 2024-05-01
    “…Our empirical results provide valuable insights into the best ways to deploy capital in the renewable energy sector, in order to provide customers with cost-competitive options, and to facilitate the implementation of policies that contribute to environmental sustainability and energy security. …”
    Get full text
    Article
  7. 7547

    GenFedRL: a general federated reinforcement learning framework for deep reinforcement learning agents by Biao JIN, Yikang LI, Zhiqiang YAO, Yulin CHEN, Jinbo XIONG

    Published 2023-06-01
    “…To solve the problem that intelligent devices equipped with deep reinforcement learning agents lack effective security data sharing mechanisms in the intelligent Internet of things, a general federated reinforcement learning (GenFedRL) framework was proposed for deep reinforcement learning agents.The joint training through model-sharing technology was realized by GenFedRL without the need to share the local private data of deep reinforcement learning agents.Each agent device’s data and computing resources could be effectively used without disclosing the privacy of its private data.To cope with the complexity of the real communication environment and meet the need to accelerate the training speed, a model-sharing mechanism based on synchronization and parallel was designed for GenFedRL.Combined with the model structure characteristics of common deep reinforcement learning algorithms, general federated reinforcement learning algorithm suitable for single network structure and multi-network structure was designed based on the FedAvg algorithm, respectively.Then, the model sharing mechanism among agents with the same network structure was implemented to protect the private data of various agents better.Simulation experiments show that common deep reinforcement learning algorithms still perform well in GenFedRL even in the harsh communication environment where most data nodes cannot participate in training.…”
    Get full text
    Article
  8. 7548

    Corruption as a Problem of Political Theory and Political Practice by A. V. Shashkova

    Published 2015-12-01
    “…The present article names most important political consequences of corruption: shift of ideas from public development to the security of power of oligarchy, decrease of trust to the state, decrease of image of the country at the international arena, increase of its economical and political isolation, decrease of political competition. …”
    Get full text
    Article
  9. 7549

    The tip of an iceberg? Adult children’s experiences with parental suicidal behaviour in childhood by Geir Tarje Bruaset, Jennifer Drummond Johansen, Tine K. Grimholt

    Published 2025-12-01
    “…This instability imposed significant emotional and practical responsibilities on the children, forcing them to sacrifice their own development and sense of security. Responsibility was characterized as a life lasting burden. …”
    Get full text
    Article
  10. 7550

    Beyond Profession: The Impact of the Job on Probation Personnel by Münevver Eryalçın, Talip Eryalçın

    Published 2025-01-01
    “…While staff report deriving satisfaction from helping individuals break the cycle of crime and receiving positive feedback, they encounter challenges such as emotional labor, lack of professional recognition, and inadequate working conditions. Security concerns related to working with probationers were also emphasized. …”
    Get full text
    Article
  11. 7551

    Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism by Kuan LIU, Jianting NING, Wei WU, Shengmin XU, Chao LIN

    Published 2023-12-01
    “…The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a decryption outsourcing key encapsulation mechanism OASM9-HIBE based on SM9-HIBE was proposed, which supported multi-ciphertext batch auditing.The Fujisaki-Okamoto transformation technology was utilized to prove the RCCA security of OASM9-HIBE under the random oracle model.All resourcing-consuming bilinear pairing operations were safely offloaded to the cloud server in OASM9-HIBE, the k-th hierarchical user only need to perform one simple exponentiation operation to complete the final decryption.The decryption efficiency of the original SM9-HIBE was effectively improved under the premise of not changing the downward proxy generation function of the user’s private key between hierarchical.OASM9-HIBE additively achieved the property of batch auditing of multi-transformed ciphertexts by employing the key blinding technology.Theoretical analysis and evaluation of experimental data highlight the feasibility and efficiency of OASM9-HIBE, OASM9-HIBE extends the application field of SM9 series algorithms.…”
    Get full text
    Article
  12. 7552

    Copula-based Wetness-Dryness Encountering Analysis of Upstream Runoff in the Pearl River Delta by ZHANG Zhaoyi, HE Yanhu, LIN Zhuliang, CHEN Xiaohong

    Published 2021-01-01
    “…,the West River (WR),North River (NR) and East River (ER)) under the changing environment,is conducive to the allocation and regulation of water resources in the Pearl River Delta(PRD) during the dry season to ensure the water supply security of the PRD city cluster.Based on the monthly average inflow of the WR,NR and ER,the Copula functions were used to construct the two-dimensional and three-dimensional joint distribution of the inflow of the three rivers at the annual,flood and dry period scales,and the laws of the wetness-dryness encountering of the three rivers were explored.The results show that the Frank Copula function can fit the two-dimensional and three-dimensional joint distribution of the upstream inflow better.The probability of synchronized wetness-dryness two-dimensional combinations of WR,NR and ER are higher when compared to that of the three-dimensional combination of wetness-dryness.The 3-dimensional wetness-dryness encounter combinations of “extreme dryness-extreme dryness-more dryness” and “extreme dryness-more dryness-more dryness” are more likely to happen in dry years.The upstream inflow under the 3-dimensional wetness-dryness encounter combinations of “extreme dryness-extreme dryness-more dryness” and “extreme dryness-more dryness-more dryness” are less during the dry season,which would pose greater challenge for the cities water supply in the PRD.…”
    Get full text
    Article
  13. 7553

    CONTROVERSIAL ISSUES REGARDING THE EXTENSION OF THE “NEW START” TREATY: CAN THE USA AND RUSSIA PRESERVE EXISTING STRATEGIC ARMS CONTROL? by Marina Kostic

    Published 2021-02-01
    “…Its expiration on 5 February 2021 is a top security challenge and indicates a possible new strategic arms race. …”
    Get full text
    Article
  14. 7554

    Additional sources of financing for the updated national development goals by G. A. Chmut

    Published 2025-01-01
    “…The main reasons were ensuring sustainable economic and social development of the RF, improving living standards and increasing the population, ensuring state and public security as well as strengthening state and economic sovereignty.  …”
    Get full text
    Article
  15. 7555

    Advancements in genome editing tools for genetic studies and crop improvement by Asadollah Ahmadikhah, Homa Zarabizadeh, Shahnoush Nayeri, Mohammad Sadegh Abbasi

    Published 2025-02-01
    “…The rapid increase in global population poses a significant challenge to food security, compounded by the adverse effects of climate change, which limit crop productivity through both biotic and abiotic stressors. …”
    Get full text
    Article
  16. 7556

    Unbalanced protocol recognition method based on improved residual U-Net by Jisheng WU, Zheng HONG, Tiantian MA

    Published 2024-02-01
    “…An unbalanced protocol recognition method based on the improved Residual U-Net was proposed to solve the challenge of network security posed by the increasing network attacks with the continuous development of the Internet.In the captured network traffic, a small proportion is constituted by malicious traffic, typically utilizing minority protocols.However, existing protocol recognition methods struggle to accurately identify these minority protocols when the class distribution of the protocol data is imbalanced.To address this issue, an unbalanced protocol recognition method was proposed, which utilized the improved Residual U-Net, incorporating a novel activation function and the Squeeze-and-Excitation Networks (SE-Net) to enhance the feature extraction capability.The loss function employed in the proposed model was the weighted Dice loss function.In cases where the recognition accuracies of the minority protocols were low, the loss function value would be high.Consequently, the optimization direction of the model would be dominated by the minority protocols, resulting in improved recognition accuracies for them.During the protocol recognition process, the network flow was extracted from the network traffic and preprocessed to convert it into a one-dimensional matrix.Subsequently, the protocol recognition model extracted the features of the protocol data, and the Softmax classifier predicted the protocol types.Experimental results demonstrate that the proposed protocol recognition model achieves more accurate recognition of the minority protocols compared to the comparison model, while also improving the recognition accuracies of the majority protocols.…”
    Get full text
    Article
  17. 7557

    Construction of multi-modal social media dataset for fake news detection by Guopeng GAO, Yaodong FANG, Yanfang HAN, Zhenxing QIAN, Chuan QIN

    Published 2023-08-01
    “…The advent of social media has brought about significant changes in people’s lives.While social media allows for easy access and sharing of news, it has also become a breeding ground for the dissemination of fake news, posing a serious threat to social security and stability.Consequently, researchers have shifted their focus towards fake news detection.Although several deep learning-based solutions have been proposed, these methods heavily rely on large amounts of supporting data.Currently, there is a scarcity of existing datasets, particularly in Chinese, and the collected news articles are often limited to the same category.To enhance the detection of fake news, a new multi-modal fake news dataset (MFND) was developed, which comprised Chinese and English news data from ten diverse categories: politics, economy, entertainment, sports, international affairs, technology, military, education, health, and social life.The word frequencies and categories of the proposed fake news dataset were analyzed and compared with existing fake news datasets in terms of number of news, news categories, modal information and news languages.The results of the comparison demonstrate that the MFND dataset excels in terms of category information and news languages.Moreover, training and validating existing typical fake news detection methods with MFND dataset, the experimental results show an improvement of approximately 10% in model performance compared to existing mainstream fake news datasets.…”
    Get full text
    Article
  18. 7558
  19. 7559
  20. 7560

    A collaborative management model as an effort for the conservation of native plants of Java’s mountains in Mount Merbabu National Park by Gunawati Dewi, Sulaksono Nurpana, Ibrahim Mohd Hairy

    Published 2025-01-01
    “…Communities participate in various activities such as protected area security, plant monitoring, nursery development, planting, and environmental education. …”
    Get full text
    Article