Showing 7,801 - 7,820 results of 9,720 for search '"Securities ', query time: 0.09s Refine Results
  1. 7801

    Investigation of Parameters of Fused Deposition Modelling 3D Prints with Compression Properties by Dereje Berihun Sitotaw, Dominik Marcel Muenks, Yordan Kostadinov Kyosev, Abera Kechi Kabish

    Published 2022-01-01
    “…Three-dimensional (3D) printing has been attracting a great deal of attention in recent years in many application fields, for example, in the aerospace, construction, industry, art, education, protection, security, and medical fields. Printing methods, materials, and parameters influence the performance quality and determine the application sector of 3D prints. …”
    Get full text
    Article
  2. 7802

    Can Sensory- and Attachment-Informed Approaches Modify the Perception of Pain? An Experimental Study by Pamela Joy Meredith, Nicole Emma Andrews, Jessica Thackeray, Sophie Bowen, Cory Poll, Jenny Strong

    Published 2021-01-01
    “…Pain perceptions of individuals using either a sensory-informed (weighted modality) or an attachment-informed (secure base priming) coping strategy were compared with those of individuals using no designated coping strategy. …”
    Get full text
    Article
  3. 7803

    Online Traffic Accident Spatial-Temporal Post-Impact Prediction Model on Highways Based on Spiking Neural Networks by Duowei Li, Jianping Wu, Depin Peng

    Published 2021-01-01
    “…Traffic accident management as an approach to improve public security and reduce economic losses has received public attention for a long time, among which traffic accidents post-impact prediction (TAPIP) is one of the most important procedures. …”
    Get full text
    Article
  4. 7804

    STATISTICAL ANALYSIS OF DEVELOPMENT TRENDS IN GLOBAL RENEWABLE ENERGY by M. D. Simonova, V. E. Zakharov

    Published 2016-06-01
    “….), as evidenced by the inclusion of the development of this segment in the state energy strategies and the revision of existing approaches to energy security. The analysis of the use of renewable energy, its contribution to value added of countries-producers is of a particular interest. …”
    Get full text
    Article
  5. 7805

    Mitigating the effects of climate change in children’s outdoor play environments by Martin Karaba Bäckström, Eva Lundgreen, Björn Slaug

    Published 2024-12-01
    “…Analysis was conducted with manifest content analysis.Results Four themes with supporting categories; 1: a new design paradigm for outdoor play environments, 2: a need for updated regulation- and security guidelines for outdoor play environments, 3: nature-based play environments are more climate change resilient, and 4: maintenance and construction of nature-based outdoor play environments. …”
    Get full text
    Article
  6. 7806

    Establishing A Personal Data Protection Agency for E-Commerce in Indonesia by Bilqis Laila Nuzul Sa'adah, Sukarmi Sukarmi, Reka Dewantara

    Published 2024-12-01
    “… The rapid growth of e-commerce in Indonesia has led to a significant increase in the collection and processing of personal data, raising concerns regarding data security and privacy rights. This study analyzes the urgency of establishing a Personal Data Protection Agency (LPDP) specifically for e-commerce users in Indonesia, considering the increasing risks to personal data in the digital marketplace. …”
    Get full text
    Article
  7. 7807

    Reducing Postharvest Loss of Stored Grains Using Plant-Based Biopesticides: A Review of Past Research Efforts by Getachew Bezabih, Neela Satheesh, Solomon Workneh Fanta, Melaku Wale, Minaleshewa Atlabachew

    Published 2022-01-01
    “…One of the main challenges regarding food security is postharvest loss due to insect pests. The overall postharvest grain losses for sub-Saharan Africa could be as high as US$4 billion/year. …”
    Get full text
    Article
  8. 7808

    Determining the crop planting calendar using T-test observation and Zoning Agro Climati and agricultural with Hotelling test in Kermanshah province by Behroz Sobhani, Vahid Safarian Zengir, Akhzar Karami

    Published 2020-06-01
    “…According to research, the station is under study, corn crop water demand in the months of June, July, August and September not secure and High temperature areas due to reduced need frequent in the months of May and June and in the lowlands due to a sharp increase in flowering time, seed maintenance and handling problems during the growing season makes this crop. …”
    Get full text
    Article
  9. 7809

    Carlos Castillo-Chavez: A century ahead by James Schatz

    Published 2013-07-01
    “…Sixteen years ago, I travelled to Cornell University with my colleague at the National Security Agency (NSA) Barbara Deuink to meet Carlos and hear about his vision to expand the talent pool of mathematicians in our country. …”
    Get full text
    Article
  10. 7810

    Survey on adversarial attacks and defense of face forgery and detection by Shiyu HUANG, Feng YE, Tianqiang HUANG, Wei LI, Liqing HUANG, Haifeng LUO

    Published 2023-08-01
    “…Face forgery and detection has become a research hotspot.Face forgery methods can produce fake face images and videos.Some malicious videos, often targeting celebrities, are widely circulated on social networks, damaging the reputation of victims and causing significant social harm.As a result, it is crucial to develop effective detection methods to identify fake videos.In recent years, deep learning technology has made the task of face forgery and detection more accessible.Deep learning-based face forgery methods can generate highly realistic faces, while deep learning-based fake face detection methods demonstrate higher accuracy compared to traditional approaches.However, it has been shown that deep learning models are vulnerable to adversarial examples, which can lead to a degradation in performance.Consequently, games involving adversarial examples have emerged in the field of face forgery and detection, adding complexity to the original task.Both fakers and detectors now need to consider the adversarial security aspect of their methods.The combination of deep learning methods and adversarial examples is thus the future trend in this research field, particularly with a focus on adversarial attack and defense in face forgery and detection.The concept of face forgery and detection and the current mainstream methods were introduced.Classic adversarial attack and defense methods were reviewed.The application of adversarial attack and defense methods in face forgery and detection was described, and the current research trends were analyzed.Moreover, the challenges of adversarial attack and defense for face forgery and detection were summarized, and future development directions were discussed.…”
    Get full text
    Article
  11. 7811
  12. 7812

    Constructing competing discourses on the Russo-Ukrainian war: journalistic translation in wartime by Angela Kamyanets

    Published 2024-12-01
    “…The findings reveal that the former article portrays the war as Ukraine’s fight for independence and a battle to uphold international law, whereas the latter predominantly depicts it as territorial aggression that threatens global nuclear security. The former article employs a wide range of evaluative devices to underscore Russia’s brutality and condemn the delayed provision of Western weapons to Ukraine. …”
    Get full text
    Article
  13. 7813

    National Interest and European Law in the Legislation and Juridical Practice on Health Care Services – In the Light of the Reforms of the Hungarian Health Care System by István Hoffman

    Published 2015-03-01
    “… The priority of the national interest in the field of the health care policy is secured by the rules of the TFEU, the Charter of Fundamental Rights of the European Union and by the secondary law as well. …”
    Get full text
    Article
  14. 7814

    REGIONS IN INTERNATIONAL POLITICS: A FRAMEWORK FOR INTEGRATING SYSTEMIC, REGIONAL, DYADIC, AND MONADIC APPROACHES by T. J. Volgy, J. P. Rhamey, Jr.

    Published 2018-11-01
    “…Regional powers objective try to create security and stability in their regional areas which increases the overall stability. …”
    Get full text
    Article
  15. 7815

    Analisis Penerimaan Hulu Talent Yayasan Hasnur Centre Menggunakan TAM by Arif Muhammad Iqbal, Brina Miftahurrohmah

    Published 2024-08-01
    “…TAM (Technology Acceptance Model) digunakan dalam pengujian setiap faktor yang memberikan pengaruh penerimaan Hulu Talent dengan 4 variabel utama, yaitu PU (Perceived Usefulness), PE (Perceived Ease of Use), BI (Behavioral Intention to Use), dan AU (Actual System Usage) kemudian menambahkan variabel SC (Security) untuk keamanan privasi dalam menjaga kepercayaan karyawan menggunakan sistem. …”
    Get full text
    Article
  16. 7816

    PROFILES AND PREFERENCES OF ON-LINE MILLENIAL SHOPPERS IN BULGARIA by Patricia R. Loubeau, Robert Jantzen, Elitsa Alexander

    Published 2014-05-01
    “…Like other regions of the world, concern about financial transactions security is a major barrier limiting the willingness to shop on-line in Bulgaria. …”
    Get full text
    Article
  17. 7817

    The German and Austrian Historiography on Russia's Participation in the Holy League War by V. I. Kuznetsov

    Published 2021-12-01
    “…Russia was trying to secure its national interests in dealings with the European partners, which did not fit well with the relations between Vienna and Constantinople, Venice, and Constantinople, as well as the plans of Jan III Sobieski to compensate for the loss of Ukraine at the expense of the Danube lands. …”
    Get full text
    Article
  18. 7818
  19. 7819

    Preventing and managing antimicrobial resistance in the African region: A scoping review protocol. by Chinwe Juliana Iwu-Jaja, Anelisa Jaca, Ishmael Festus Jaja, Portia Jordan, Phelele Bhengu, Chidozie Declan Iwu, Joseph Okeibunor, Humphrey Karamagi, Prosper Tumusiime, Walter Fuller, Ali Ahmed Yahaya, Charles Wiysonge, Laetitia Gahimbare

    Published 2021-01-01
    “…<h4>Introduction</h4>Antimicrobial resistance (AMR) constitutes a significant threat to global health and food security, typically associated with high morbidity and mortality rate. …”
    Get full text
    Article
  20. 7820

    OUTBREAK OF TOBAMOVIRUSES AND POTEXVIRUSES ASSOCIATED WITH DISEASE EPIDEMICS IN TOMATO PRODUCTION AREA OF IRAQ by Hasaneen K. Obaid, Mustafa Adhab

    Published 2025-01-01
    “…The survey showed a presence of Tomato brown rugose fruit virus (ToBRFV), Tobacco mosaic virus (TMV), Pepper mild mottle virus (PMMoV), Cymbidium mosaic virus (CymMV), Odontoglossum ringspot virus (ORSV), Cucumber green mottle mosaic virus (CGMMV), Pepino mosaic virus (PepMV) and Potato virus X (PVX) in tomato fields in Iraq. ToBRFV secured the highest relative incidence in tomato fields (7 governorates) followed by PepMV and CymMV and PMMoV (6 out of 7 governorates) and CGMMV, TMV (5 governorates), and PVX (3 governorates). …”
    Get full text
    Article