Showing 7,661 - 7,680 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 7661

    Nutritional value and antioxidant activity of ora-pro-nobis, tamarillo and green banana biomasses by Renata de Souza Ferreira, Jucenir dos Santos, Lívya Alves de Oliveira, Ceres Mattos Della Lucia, Márcia Cristina Teixeira Ribeiro Vidigal

    Published 2024-12-01
    “… The consumption of unconventional food plants (UFP) can be a strategy to promote food and nutritional security, for which it is necessary to know their nutritional composition. …”
    Get full text
    Article
  2. 7662

    Transit Station Congestion Index Research Based on Pedestrian Simulation and Gray Clustering Evaluation by Shu-wei Wang, Li-shan Sun, Jian Rong, Zi-fan Yang

    Published 2013-01-01
    “…Firstly, platform, stair, transfer tunnel, auto fare collection (AFC) machine, and security check machine were chosen as key traffic facilities through large amounts of field investigation. …”
    Get full text
    Article
  3. 7663

    Assessment of Soil Heavy Metal Pollution and Phytoremediation Potential of Dominant Species in Water-Level-Fluctuation Zone of Large Reservoir by Wenqiao Li, Youwei Zuo, Yunpeng Li, Denghao Ning, Huan Zhang, Changying Xia, Xiao Zhang, Hongping Deng

    Published 2025-01-01
    “…The results have guiding significance for the management and remediation of soil heavy metal pollution in global reservoir areas, further promoting global ecological security and sustainable development.…”
    Get full text
    Article
  4. 7664

    Sustainability decision-making in poultry slaughterhouses: A comparative analysis of AHP and fuzzy AHP by Hayati Mukti Asih, Agung Sutrisno, Cynthia E.A. Wuisang, Muhammad Faishal

    Published 2025-06-01
    “…The chicken meat industry is vital for global food security and economic growth but faces significant sustainability challenges, especially in balancing economic, environmental, and social aspects. …”
    Get full text
    Article
  5. 7665

    Impacts and challenges of industry 4.0 in manufacturing: a systematic literature review by Tamires Fernanda Barbosa Nunes, Roselaine Ruviaro Zanini, Ariane Ferreira Porto Rosa, Lizandra Garcia Lupi Vergara

    Published 2022-12-01
    “…Additionally, six potential challenges faced by manufacturing in adopting digital transformation were found: (i) management, (ii) government, (iii) implementation, (iv) workforce, (v) operation, and (vi) security. The results indicated that accurate understanding of the concepts and scope of Industry 4.0 are under construction and that knowledge sharing will be decisive in shaping the future of the transition from current business models to smart manufacturing. …”
    Get full text
    Article
  6. 7666

    Decision making about increased building automation – barriers, drivers and motivation factors by Anna-Lena Lane, Anna-Lena Lane, Andreas Selhammer, Patrik Thollander, Patrik Thollander, Mathias Cehlin

    Published 2025-01-01
    “…An important knowledge barrier was found as knowledge is needed for decisions about investments, use of BMS and decisions regarding IT security, such as handling of data. A key conclusion is the need for a facilitator, as knowledge is needed for decisions about BMS investments and for its use. …”
    Get full text
    Article
  7. 7667

    Application and Thinking of Deep Learning in Predicting Lateral Cervical Lymph Node Metastasis of Papillary Thyroid Cancer by Shengli SHAO, Jiheng WANG, Shanting LIU

    Published 2025-01-01
    “…With the establishment and sharing of large datasets, automated annotation, algorithm optimization, and resolution of data security issues, deep learning is expected to accurately predict lateral neck lymph node metastasis in PTC. …”
    Get full text
    Article
  8. 7668

    Next-generation neutron detection using a 6Li glass scintillator composite by Andrea Favalli, Brenden W. Wiggins, Metodi Iliev, Cameron G. Richards, Kristofer Ogren, Thomas D. McLean, Kiril D. Ianakiev, Markus P. Hehlen

    Published 2025-01-01
    “…Abstract Neutron detectors are crucial in fundamental science, nuclear security, safeguards, and civil applications. 3He-filled gas proportional counters are the gold standard for thermal neutron detection, prized for their efficiency, neutron/gamma discrimination, and stability; however, the scarcity of 3He has prompted the search for alternatives. …”
    Get full text
    Article
  9. 7669

    Position Verification in Connected Vehicles for Cyber Resilience Using Geofencing and Fuzzy Logic by Maria Drolence Mwanje, Omprakash Kaiwartya, Abdallah Naser

    Published 2024-01-01
    “…Position verification is essential in connected and autonomous vehicle technology to enable secure vehicle-to-everything communication. Previous attempts to verify location information have used specific hardware, traffic parameters, and statistical model-based techniques dependent on neighbouring vehicles and roadside infrastructure and whose judgements can be influenced by untrustworthy entities. …”
    Get full text
    Article
  10. 7670

    Long-Gauge Fiber Optic Sensors: Strain Measurement Comparison for Reinforced Concrete Columns by Haoran Lin, Zhaowen Xu, Wan Hong, Zhihong Yang, Yixin Wang, Bing Li

    Published 2025-01-01
    “…Long-gauge fiber optic sensors, securely mounted on the concrete surface near the tensile side, were found to accurately measure both large and small deformations, outperforming LVDTs. …”
    Get full text
    Article
  11. 7671

    Carob (Ceratonia siliqua L.) cultivation, processing, and industrial applications: A review by Lahcen Hssaini, Reda Meziani, Rachid Razouk, Ahmed Irchad

    Published 2024-12-01
    “…Carob's unique properties and diverse applications position it as a valuable resource with the potential to address contemporary challenges in food security, sustainable production, and environmental consciousness.…”
    Get full text
    Article
  12. 7672

    Digital Cognitive Behavioral Therapy for the Average Person in Developing Countries by Muhammad Abdullah, Muhammad Yahya Saeed

    Published 2024-12-01
    “…The results reveal that only 5% of individuals seek in-person therapy often, with 68% having limited knowledge of online mental health resources. 77% of survey participants have never used online mental health resources and express concerns about privacy and security. Based on the findings and literature review the study guides the development of strategies to enhance access to DCBT resources. …”
    Get full text
    Article
  13. 7673

    Newton Raphson based optimizer for optimal integration of FAS and RIS in wireless systems by Ahmed S. Alwakeel, Ali M. El-Rifaie, Ghareeb Moustafa, Abdullah M. Shaheen

    Published 2025-03-01
    “…In modern wireless networks, the integration of Reconfigurable Intelligent Surface (RIS) and Fluid Antenna System (FAS) technologies offers a promising solution to the critical challenges such as signal attenuation, interference management, and security enhancement. This paper presents an application of a novel population-based metaheuristic algorithm of Newton Raphson Based Optimizer (NRBO) to efficiently integrating of FAS and RISs in wireless systems. …”
    Get full text
    Article
  14. 7674

    Cryo-EM structure of Sudan ebolavirus glycoprotein complexed with its human endosomal receptor NPC1 by Fan Bu, Gang Ye, Hailey Turner-Hubbard, Morgan Herbst, Bin Liu, Fang Li

    Published 2025-02-01
    “…Abstract Sudan ebolavirus (SUDV), like Ebola ebolavirus (EBOV), poses a significant threat to global health and security due to its high lethality. However, unlike EBOV, there are no approved vaccines or treatments for SUDV, and its structural interaction with the endosomal receptor NPC1 remains unclear. …”
    Get full text
    Article
  15. 7675

    A Method for Trust Quantification in Cloud Computing Environments by Xiaohui Li, Jingsha He, Bin Zhao, Jing Fang, Yixuan Zhang, Hongxing Liang

    Published 2016-02-01
    “…In such environments, ownership and control over the data may lead to potential conflict between the protection of data and the provision of services. Thus, cloud security has received a great deal of attention in recent years. …”
    Get full text
    Article
  16. 7676

    Recent Research Progress on Ground-to-Air Vision-Based Anti-UAV Detection and Tracking Methodologies: A Review by Arowa Yasmeen, Ovidiu Daescu

    Published 2025-01-01
    “…Integrating this novel aerial traffic into existing airspace frameworks presents unique challenges, particularly regarding safety and security. Consequently, there is an urgent need for robust contingency management systems, such as Anti-UAV technologies, to ensure safe air traffic. …”
    Get full text
    Article
  17. 7677

    BIM-Based Machine Learning Application for Parametric Assessment of Building Energy Performance by Panagiotis Tsikas, Athanasios Chassiakos, Vasileios Papadimitropoulos, Antonios Papamanolis

    Published 2025-01-01
    “…To improve energy efficiency, proper building design should be secured at the early design phase. Digital tools are currently available for performing energy assessment analyses and can efficiently handle complex and technically demanding buildings. …”
    Get full text
    Article
  18. 7678
  19. 7679

    Identifying and understanding the nonlinear behavior of memristive devices by Sahitya Yarragolla, Torben Hemke, Fares Jalled, Tobias Gergs, Jan Trieschmann, Tolga Arul, Thomas Mussenbrock

    Published 2024-12-01
    “…Abstract Nonlinearity is a crucial characteristic for implementing hardware security primitives or neuromorphic computing systems. …”
    Get full text
    Article
  20. 7680

    Machine Learning-Based Detection of Anomalies, Intrusions, and Threats in Industrial Control Systems by Denis Benka, Dusan Horvath, Lukas Spendla, Gabriel Gaspar, Maximilian Stremy

    Published 2025-01-01
    “…Advanced preventive measures are necessary because, despite their significance, many ICS continue to rely on outdated technologies with few security features. This paper proposes a machine learning (ML)-based approach to anomaly detection in ICS communication networks, focusing on techniques such as 1D Convolutional Neural Networks (CNNs), Long Short-Term Memory (LSTM) networks, Support Vector Machines (SVMs), and Isolation Forest (iForest) algorithms. …”
    Get full text
    Article