Showing 7,681 - 7,700 results of 9,720 for search '"Securities ', query time: 0.08s Refine Results
  1. 7681

    Association of moderate beer consumption with the gut microbiota by Zhaoxi Liu, Jinming Shi, Lushan Wang, Jianjun Dong, Junhong Yu, Min Chen

    Published 2024-11-01
    “…Despite any potential advantages of moderating consumption of alcoholic beverages, the lowest alcohol intake is the most secure.…”
    Get full text
    Article
  2. 7682

    The Centrality of Prosocial Values in Work Motivation among Public and Private Sector Employees by Egle Vaidelytė, Vaidas Morkevičius, Egle Butkevičienė, Michiel de Vries

    Published 2022-11-01
    “…Significance: This research also shows that differences between employees adhering to intrinsic, extrinsic, and prosocial motivations are relative, as almost all employees – irrespective of where they work – assess values of job security and having an interesting job to be the most important work motivators. …”
    Get full text
    Article
  3. 7683

    Introducing the Canadian Thoracic Society Framework for Guideline Dissemination and Implementation, with Concurrent Evaluation by Samir Gupta, Christopher Licskai, Anne Van Dam, Louis-Philippe Boulet

    Published 2013-01-01
    “…The framework outlines expert methodological support for KT planning, development and evaluation including a practical guide for implementers and a novel ‘Clinical Assembly – KT Action Team’, and in-kind logistical support and assistance in securing peer-reviewed funding.…”
    Get full text
    Article
  4. 7684

    Leveraging Fog Computing for Scalable IoT Datacenter Using Spine-Leaf Network Topology by K. C. Okafor, Ifeyinwa E. Achumba, Gloria A. Chukwudebe, Gordon C. Ononiwu

    Published 2017-01-01
    “…With the Internet of Everything (IoE) paradigm that gathers almost every object online, huge traffic workload, bandwidth, security, and latency issues remain a concern for IoT users in today’s world. …”
    Get full text
    Article
  5. 7685

    A Finite Element Analysis-Based Modeling and Evaluation Method for Sternum Support Brace by Linhua Lv, Junyi Hu, Wanquan Liu, Jianqing Peng

    Published 2025-01-01
    “…Sternum support braces are commonly used in thoracic surgery to secure the chest after open chest procedures. Despite their widespread use in postoperative recovery, current modeling and performance evaluation methods have significant limitations that hinder the optimization and improvement of sternum support braces. …”
    Get full text
    Article
  6. 7686

    Comparative Analysis of Pre-trained based CNN-RNN Deep Learning Models on Anomaly-5 Dataset for Action Recognition by Fayaz Ahmed Memon, Umair Ali Khan, Pardeep Kumar, Imtiaz Ali Halepoto, Farida Memon

    Published 2024-10-01
    “… Action recognition in videos is one of the essential, challenging and active area of research in the field of computer vision that adopted in various applications including automated surveillance systems, security systems and human computer interaction. In this paper, we present an in-depth comparative analysis of five CNN-RNN models based on pre-trained networks such as InceptionV3, VGG16, MobileNetV2, ResNet152V2 and InceptionResNetV2 with recurrent LSTM units for action recognition on Anomaly-5 dataset. …”
    Get full text
    Article
  7. 7687

    Modeling of winter wheat yield prediction based on solar-induced chlorophyll fluorescence by machine learning methods by Minxue Zheng, Han Hu, Yue Niu, Qiu Shen, Feng Jia, Xiaolei Geng

    Published 2025-12-01
    “…Timely and accurate prediction of large-scale crop yields is critical for national food security. Solar-induced chlorophyll fluorescence (SIF), an indicator of photosynthesis, has emerged as a promising predictor of crop yields. …”
    Get full text
    Article
  8. 7688

    The impact of terahertz radiation on an extremophilic archaean Halorubrum saccharovorum proteome by T. N. Goryachkovskaya, S. H. Konstantinova, I. A. Meshcheriakova, S. V. Bannikova, E. A. Demidov, A. V. Bryanskaya, M. A. Scheglov, A. I. Semenov, D. Yu. Oshchepkov, V. M. Popik, S. E. Peltek

    Published 2017-02-01
    “…Terahertz radiation is increasingly used in security and inspection systems, medical and scientific appliances due to its low quant energy, which does not cause severe effects on organisms as other radiation types with higher quant energies do. …”
    Get full text
    Article
  9. 7689

    Assessing the Impacts of Climatic and Water Management Scenarios in a Small Mountainous Greek River by Angeliki Mentzafou, Anastasios Papadopoulos, Elias Dimitriou

    Published 2025-01-01
    “…Transboundary cooperation, data exchange mechanisms, common policy frameworks, and monitoring, reporting, and evaluation systems, could reduce human and ecosystems’ vulnerabilities and improve the water security of the area.…”
    Get full text
    Article
  10. 7690

    Childhood Injury Prevention: Intervention in the Bedouin City of Rahat by Michal Hemmo-Lotem, Efrat Merrick, Liri Endy-Findling, Aziza Abu Freh, Claudia Jinich-Aronowitz, Liat Korn, Joav Merrick

    Published 2005-01-01
    “…The main goal was to identify hazards and dangerous obstacles in public places in Rahat, then remove or repair the obstacles found, in order to secure a safe public environment for children. “Obstacle” was defined as any barrier that could endanger the safety of a child. …”
    Get full text
    Article
  11. 7691

    Trends, contradictions, and patterns of functioning of interregional and inter-municipal cooperation institutions by R. F. Gataullin, E. R. Chuvashaeva

    Published 2025-01-01
    “…Among the patterns in the institutions development it is necessary to define their focus on functioning in the context of horizontal links globalization, growth of development sustainability and population mobility, digitalization and innovativeness, ensuring security on the basis of risk management, which implies legal integration and standards harmonization, intensive exchange of the best projects, activation of local authorities and population in projects implementation. …”
    Get full text
    Article
  12. 7692
  13. 7693

    INTERROGATING THE EFFECTS OF ARMED BANDITRY ON THE SOCIO-ECONOMIC DEVELOPMENT OF NIGERIA’S NORTH-CENTRAL REGION (2015-2022) by YUSUFU Ahmed Audu, ODAUDU Alfred Idachaba, ILEVBARE Igheoise Trust

    Published 2023-09-01
    “… Armed banditry has being a major security challenge confronting northern Nigeria in recent years. …”
    Get full text
    Article
  14. 7694

    Longitudinal photovoice examination of workplace experiences for Congolese refugee women in the United States by Shannon McMorrow, Jyotika Saksena

    Published 2025-06-01
    “…Participatory analysis with participant co-researchers and inductive manual analysis revealed four themes illustrating experiences with employment and the workplace: job (in)security, discrimination, injuries, and workplace potential. …”
    Get full text
    Article
  15. 7695
  16. 7696

    Collective Agreement for Members of Slovenian Armed Forces: Reflections on Features of Collective Negotiations in the Public Sector for the Military Profession by Ljubo Štampar

    Published 2014-12-01
    “…The most important European institutions, in terms of safety and protection of the rights in the European region, are following the trend of changes in the security environment, new tasks of the military organization, the changed nature of the military profession in the postmodern era, and defend the concept of the “citizen in uniform”. …”
    Get full text
    Article
  17. 7697

    Genesis of the Institute of Interaction of the State Border Guard Service of Ukraine with Other Law Enforcement Agencies by І. І. Baidyuk

    Published 2019-12-01
    “…The article is focused on the research of historical aspects of interaction between the State Border Service of Ukraine with other law enforcement agencies of Ukraine, which is conditioned by the importance of the tasks assigned to the State Border Service of Ukraine on the security and protection of the state borders, especially in the current conditions of integration of the state into the European space, by reforming a number of law enforcement agencies of Ukraine, the creation of new law enforcement structures and, accordingly, the need to improve existing or establish new cooperation mechanisms of interaction between the above entities. …”
    Get full text
    Article
  18. 7698

    Customs institutions development strategy: design and implementation issues by V. V. Makrusev

    Published 2022-05-01
    “…The aim of the study was to analyse the existing approaches and methodological support used to research and develop strategic planning documents on national (economic) security of the Russian Federation, and to substantiate proposals and approaches to the design of strategies and programmes for the development of public administration and administration institutions in terms of foreign economic and customs activities. …”
    Get full text
    Article
  19. 7699

    Quantization Effects on Zero-Dynamics Attacks to Closed-Loop Sampled-Data Control Systems by Xile Kang, Hideaki Ishii

    Published 2025-01-01
    “…This paper focuses on cyber-security issues of networked control systems in closed-loop forms from the perspective of quantized sampled-data systems. …”
    Get full text
    Article
  20. 7700

    International organisations on national politics: Council of Europe effects on political party in Turkiye by Selçuk Kahraman, Önder Kutlu

    Published 2024-08-01
    “…These headings are examined with the help of graphics as 8 subcategories: “law”, “fundamental rights and freedoms”, “foreign policy”, “public administration”, “fight against corruption”, “democracy”, “labour and social security” and “family and social policies”. Among these, “law” and “fundamental rights and freedoms” categories stand out as the most emphasized issues in the context of the CoE for both parties. …”
    Get full text
    Article